9:00 am - 9:15 am CT 2:00 pm - 2:15 pm UTC | Welcome & Opening Remarks |
9:15 am - 10:00 am CT 2:15 pm - 3:00 pm UTC | Keynote | Leave Only Footprints: When Prevention Fails Prevention eventually fails. Bypassing tools such as Windows Defender Antivirus may be challenging, but it can be done. What then? What's left? Modern attack frameworks typically leave telltale signs of their presence. This talk will explore how a properly orchestrated Windows event logging environment will shine light on both attempted and successful exploitation in a modern Windows environment, focusing on leveraging Microsoft Sysmon logs and other event logs to centrally hunt malice in a Windows environment. Sysmon adds critical threat hunting capabilities to any Windows environment, including full command-line logging, logging the hash of every running process and DLL, and much more. Sysmon 14 added the ability to block specific actions often used by malware, including downloading executables and shredding (overwriting and then deleting) files.
Show More
|
10:00 am - 10:20 am CT 3:00 pm - 3:20 pm UTC | Break |
10:25 am - 11:00 am CT 3:25 pm - 4:00 pm UTC | Drop It Like It's Qbot: Separating malicious droppers, loaders, and crypters from their payloads for better initial access detection This talk will delve into the differences between malware delivery vehicles - droppers, downloaders, and crypters - and their payloads. It's common in the industry to track evil payloads, but less common to nitpick over exactly where the delivery vehicle stops and the payload starts. Using threat intelligence to identify and track the differences between the two can pay big dividends in early initial access detection. For example, crypters are a type of software used to encrypt, obfuscate, and change evil payloads to make them harder to detect. In this talk you'll hear about one crypter that is used to deliver many threats including Remcos, RedLine, and AsyncRAT. Identifying and tracking this crypter's unique behavior means it can be detected earlier in its infection chain, even before it delivers its payload. You will leave the talk understanding how you can use threat intelligence to help you pinpoint and track malware delivery vehicles, like in the example above. You'll be armed with specific detection opportunities for droppers, loaders, crypters, and current prevalent threats like Qbot. This talk is for a wide audience, from those new to cybersecurity to experienced security analysts.
Show More
|
11:05 am - 11:40 am CT 4:05 pm - 4:40 pm UTC | Clockwork SOC: Reducing Stress, Burnout, and Turnover on SOC Teams Teambuilding is a critical process for any SOC given the workload and risk of burnout. It is up to SOC managers and architects to find strategies to create better processes and workplace. This talk will offer helpful tips to get your SOC functioning like clockwork.
Show More
|
11:45 am - 12:25 pm CT 4:45 pm - 5:25 pm UTC | Hunting OneNote Malware: A Practical Guide for Blue Teams In today's rapidly evolving threat landscape, OneNote malware is an emerging concern for organizations that rely on this popular note-taking application. This presentation will provide a comprehensive overview of OneNote malware, exploring its various forms and the methods employed by adversaries to compromise systems. Attendees will gain valuable insights into the anatomy of OneNote malware attacks, including the tactics, techniques, and procedures (TTPs) commonly used by threat actors. We will also discuss the latest trends in OneNote malware campaigns, revealing their objectives and potential impacts on targeted organizations. Crucially, this presentation will offer practical guidance for Blue Teams on detecting and mitigating OneNote malware threats. We will demonstrate how to leverage various tools, techniques, and best practices to enhance your organization's security posture. This includes understanding the TTPs, implementing effective threat hunting methodologies, and adopting a proactive and layered security approach. We will also discuss some hunting queries to hunt OneNote malware. By the end of this presentation, attendees will be better equipped to defend their organizations against OneNote malware threats and to implement robust security measures that minimize potential risks. This talk is aimed at Threat Hunters, Security Analysts, Incident Responders, and IT professionals seeking to expand their knowledge on OneNote malware and enhance their organization's defenses.
Show More
|
12:25 pm - 1:25 pm CT 5:25 pm - 6:25 pm UTC | Lunch |
1:30 pm - 2:30 pm CT 6:30 pm - 7:30 pm UTC | Blueprint Live |
2:30 pm - 2:40 pm CT 7:30 pm - 7:40 pm UTC | Break |
2:40 pm - 3:15 pm CT 7:40 pm - 8:15 pm UTC | Zero Trust Architecture: Beyond Proxy or Point Solutions We all know Zero Trust Architecture is not a point solution but yet many vendors sell them as one Product or Solution. Most Zero Trust Products are deployed as Proxy Solution but Zero Trust is more than just securing at the edge or Proxy. In this presentation, we will cover What is Zero Trust Architecture ,various components of ZTA /Micro Segmentation and how they all relate together. 1. Proxy / Edge (SASE) 2. Network Segmentation ( Broader Segmentation at Wireless/ Corporate to Micro Segmentation at Application) 3. Identity & Device Trust 4. System Security ( Identity, Device, Application and Responding to Incidents to limit the damage) 5. Modern Identity & Access Control techniques 6. Moving from Enterprise to Application/Cloud( BeyondProd approach) Author will also share various challenges in deploying each of these components.
Show More
|
3:15 pm - 3:50 pm CT 8:15 pm - 8:50 pm UTC | Blurple Teaming: Open Source Continuous Security Testing in the SOC We'll begin this talk with a brief history of purple teaming, TTPs, and security testing, and the technical and organizational pitfalls that hinder scalability. We'll then immediately dive into an introduction of open source Verified Security Tests (VSTs) (https://github.com/preludeorg/test) - a more structured, scale-ready format of the TTP. VSTs have characteristics that encourage scale and safety. In the context of this presentation, we'll focus on VSTs that are designed to test the efficacy of defensive technologies. Verified Security Tests can be mapped to classification systems, such as MITRE ATT&CK, CVE or NIST controls. Mapping tests provides a natural grouping so you can analyze results through a lens you're familiar with. The second component to introduce are open source probes (https://github.com/preludeorg/libraries) - temporary processes that requires no special privileges and no installation to run. A probe can just be started. Probes are designed to be very lightweight - measuring between 1-50KB on disk - and to run anywhere you have code. As such, probes can deploy out on devices ranging from laptops to servers to cloud environments and OT infrastructure. Combining probes and VSTs provides a foundation for continuous security testing of production endpoints. This presentation will then dive into a brand new concept, Blurple Teaming: deploying continuous security testing at scale, integrating defensive controls, and embedding the process within the SOC to better improve defenses. By attaching an EDR control, users are able to send all missed detections to a vendor in real time. Every time a VST should have been caught - but wasn't - the event can be sent to a vendor for analysis. By running VSTs continuously, you can validate whether or not a fix is deployed in a reasonable time period. After outlining the technology/process, we'll begin an interactive session where attendees can follow along a quickstart tutorial for deploying probes and running verified security tests. By the end of the session, attendees will have been able to deploy multiple probes, create a schedule of VSTs, and begin collecting results.
Show More
|
3:50 pm - 4:00 pm CT 8:50 pm - 9:00 pm UTC | Day 1 Wrap-Up |