Monday, December 10, 2018
11:00 am - 11:45 am Registration
11:45 am - 1:15 pm Networking Lunch
1:15 pm - 1:25 pm Orientation
1:25 pm - 1:35 pm Chairperson's Opening Remarks
1:35 pm - 2:05 pm True Cyber-Resilience: Merging the Capabilities of Cybersecurity, Business Continuity and Enterprise Resilience
The growing number of information security breaches and attacks are a top threat to business operations. Integrating incident response and continuity planning with enterprise risk management empowers well-coordinated actions in the case of an actual event. Accountability, transparency and continuous improvement are key attributes to sound risk management. The core of information security risk management merges governance, emerging technologies, system hardening and cultural awareness. Enterprises control readiness and must balance sustainable programs that safeguard information along with meeting the organizational business objectives.
In this session:
- Leveraging investments and creating a consistent cyber defense
- Emphasizing best practices with authentication, patching, vulnerability management and penetration testing
- Improving security training and providing clear protocols of escalation
Providing consistent and coordinated information
2:05 pm - 2:35 pm Evolving Threat Hunting: Ransomware, Wannacry, Continual Creepers, What’s Next?
Cyber criminals continue to successfully penetrate and exploit corporate networks mining for data. Proactive hunting and mitigating of potential security incident is necessary since current cyber threats are often missed by traditional tools. Threat hunting assumes a breach with the focus on quickly detecting and responding with clear visibility of the network and endpoints. In this session, explore the necessary proactive stance along with the current types of threats.
•Developing corporate threat hunting capabilities as an integral tool
•Gaining insights into leading threat trends
•Exploring the weaponizing of AI, malware, and other threat vectors
2:40 pm - 3:10 pm Business Meetings
3:10 pm - 3:40 pm Business Meetings
3:40 pm - 4:10 pm Business Meetings
Master Class4:15 pm - 5:00 pm Levers of Human Deception: Science and Methodology Behind Social Engineering Erich Kron - Security Awareness Advocate KnowBe4
No matter how much security technology we purchase, we still face a fundamental security problem: people. This webinar will explore the different lever that social engineers and scam artists pull to make us more likely to do their bidding.
Join Enrich Kron CISSP, Security Awareness Advocate at KnowBe4, as he provides fun and engaging examples of mental manipulation in everyday life: from the tactics used by car dealers, to sophisticated social engineering and online scams. Additionally, he'll look at how to ethically use the very same levers when educating our users.
- The Perception vs. Reality Dilemma
- Understanding the OODA (Observe, Orient, Decide, Act) Loop
- How social engineers and scam artists achieve their goals by subverting OODA Loop's different components
- How we can defend ourselves and our organizations
Erich KronSecurity Awareness Advocate