Day 1 | March 16, 2021, Tuesday

9:00 am - 10:00 am Agnostic Intelligence: Actioning The Insights That Matter

Angela Lewis - Manager, Global Intelligence and Threat Analysis, The Walt Disney Company

Remediation-based, orchestrated, automated and customized threat intelligence is the goal. Most organizations have a few steps to go before reaching that goal. Cyber Security executives have realized that raw data is not intelligence. The discipline is not called Threat Raw Data, it’s called Threat Intelligence. The job of any intelligence professional is to simplify things, to narrow the scope. Angela shares lessons learned and a path forward for threat intelligence.

  • Supporting diverse interests (region, line of business, focus, etc.)
  • Realizing that everyone needs actionable information
  • Translating intelligence to various stakeholders in their own language and requirements
  • Liaising with key decision makers to ensure they’re getting the key information that they need
  • Understanding the intelligence cycle is a circle- combining what’s happening in the space with the impact on decision-making
  • Continuing to adjust actions post decision no matter happens 
img

Angela Lewis

Manager, Global Intelligence and Threat Analysis
The Walt Disney Company

10:00 am - 11:00 am Securing & Hardening 2021 Endpoints

Joseph Carson - Chief Cybersecurity Scientist, Thycotic

In 2021 endpoints will continue to be a top target for cybercriminals. Take a journey through the mind of an Ethical Hacker, how to exploit endpoints, what you can do to reduce the risks and improve endpoint protection.

This session is intended to provide a few of the attack paths that adversaries use to gain control and abuse endpoints so they can laterally move onto other sensitive systems within your network. It could lead to elevating privileges to steal the keys to the kingdom and gain full domain admin access, deploy nasty harmful Ransomware to bring your business to its knees until you pay a ransom or steal sensitive company data and threaten to release it publicly or abuse it.

Let’s get visibility into the how so you can put the strict security controls and harden your companies endpoints. Here are just a few of the risks that organizations face from cyberattacks. It is always important to take a risk-based approach and consider which of these risks pose the biggest threat to your business, employees, and customers:

  • Malware
  • Financial Fraud
  • Ransomware
  • Compliance Failure
  • Data Breach
  • Data Poisoning
  • Insider Threats
  • Service/Application Downtime
  • Revenue/Brand Loss
img

Joseph Carson

Chief Cybersecurity Scientist
Thycotic

11:00 am - 12:00 pm Locating Company-Customized Information

While industry threat intelligence is better than ever, even multi-source industry TI isn’t customized for your particular organization. While many providers showcase customized insight, cyber security leaders have cast doubt on the veracity of those claims.

  • Surveying in-house talent to uncover and unpack previously unknown and inert in-house threat data
  • Empowering that talent to share intel with in-house peers
  • Blending advanced in-house threat data to fortify current threat intelligence
  • Sharing that advanced and fortified threat intelligence with industry peers

12:00 pm - 1:00 pm Orchestrating Quality Customized Insights

Once located, customized enterprise insight puts an organization within global corporate enterprise leadership for threat intelligence. But the information is simply a tool. Having the talent on staff to realize insights from basic data is key to avoiding impactful breaches all while justifying ROI.

  • Applying traditional ROI metrics to threat intelligence
  • Conceiving of a realistic timeline for TI investment to be realized
  • Applying cogent project management of TI program to ensure deadlines are met
  • Ensuring the continued evolution of return on TI investment 

True threat intelligence involved collaboration with peers in industry, cross industry, with law enforcement and with regulatory bodies. It is understood that to call it “intelligence,” TI has to be a public/private community effort. TI also has to be a human/machine community effort. Gopal shares how IoT Threat Intelligence is evolving.

  • What is the Internet of Things (IoT)
  • Providing intelligence to non-living things comes with a cost
  • Ascertaining the implications of the explosion of devices coming online
  • Understanding the unintended consequences of granting access to IoT ‘users'
  • Grappling with the implications of the totality of the four dimensions of IoT
  • The Device
  • The connectivity
  • The security of connectivity
  • The security issues of API
  • Continuing to evolve with IoT developments 
img

Gopal Padinjaruveetil

Chief Information Security Officer
AAA Auto Club