Digital transformation is a journey. The path to digital transformation is littered with vulnerabilities. Securing the cloud is of course a different prospect than securing the perimeter. A distributed workforce needs to be made security aware in different ways than on prem. And the entire prospect of business and security changes with dual a focus on zero trust and business enablement. This session discusses all of the above and more.
Fileless attacks and fileless malware have grown in sophistication, especially in their ability to obfuscate and hide from both traditional and next-generation anti-virus. Join us to discover the techniques being used by APT32/OceanLotus to attack their victims and learn how to replicate them to better test your defenses. In this very short demonstration, you will learn techniques to make a weaponized document that is designed to not just bypass AV but also human threat hunters through a sophisticated method of obfuscation and the use of built-in trusted tools. The document is capable of allowing the attacker to gain remote access to the victim system and exfiltrate sensitive data. You will get to see, firsthand, the attack compromise both a Windows PC as well as a MacOS.
Attend this session to:
When it comes to securing today’s dynamic workforce, demand eclipses supply for skills & expertise. Moreover, board level executives are grappling with the ongoing challenge of translating technical insights into meaningful decision-making, having to strike the perfect balance between mitigating technical risks and accelerating digital transformation all while maintaining a high level of innovation.
Join Justin Fier, Director of Cyber Intelligence and Analytics at Darktrace, as he unpacks how AI augments teams by mimicking human thought processes - automating investigation and reporting of cyber incidents in a world-first capability, the Cyber AI Analyst.
Has your organization considered IAST, RASP, etc. solutions as part of your program, and what has your experience been so far?
Understanding the value provided by different types of vulnerability detection and exploit prevention technologies that are available today is critical to every security organization. This discussion will focus around Interactive Application Security Testing and Real-time Application Self Protection.
Attend this session to:
Join us for this session and learn more on: