Continuous Monitoring and Real-World Analysis
- Seth Misenar and Eric Conrad
- Thursday, August 6th, 7:15pm - 8:15pm
Repeat after me, I will be breached. Most organizations realize this fact too late, usually after a third party informs them months after the initial compromise. Treating security monitoring as a quarterly auditing process means most compromises will go undetected for weeks or months. The attacks are continuous, and the monitoring must match.
Modern threats require a paradigm shift in the way we perform analysis and monitoring. This talk will help you face the problem and describe how to move your organization to a more defensible security architecture that enables continuous security monitoring.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Lunch & Learn: Short presentations given during the lunch break.
Monday, August 3
|General Session- Welcome to SANS||Rob Lee||Monday, August 3rd, 8:15am - 8:45am||Special Events|
|Hunting Your Adversary - How to Operate and Leverage an Incident Response Hunt Team||Rob Lee, Fellow, SANS Institute||Monday, August 3rd, 7:15pm - 9:15pm||Keynote|
Tuesday, August 4
|Prevent - Detect - Respond||Justin Kallhoff, CEO and Founder, Infogressive||Tuesday, August 4th, 12:30pm - 1:15pm||Lunch and Learn|
|iOS Game Hacking: How I Ruled the Worl^Hd and Built Skills For AWESOME Mobile App Pen Tests||Josh Wright||Tuesday, August 4th, 7:15pm - 8:15pm||SANS@Night|
|Instant Expert: Legitimately and Ethically||Ted Demopoulos||Tuesday, August 4th, 8:15pm - 9:15pm||SANS@Night|
Wednesday, August 5
|Adopting an Attacker Mindset with Core Impact Pro®||Joe DiGregorio, Customer Experience Engineer, Core Security||Wednesday, August 5th, 12:30pm - 1:15pm||Lunch and Learn|
|Identity is the New Perimeter||Dean Thompson, VP of Technical Services||Wednesday, August 5th, 12:30pm - 1:15pm||Lunch and Learn|
|Instant Layered Security For Your Cloud Servers||Michael Young, Cloud Security Evangelist||Wednesday, August 5th, 12:30pm - 1:15pm||Lunch and Learn|
|Uncovering "Unknown Unknowns": Detecting Compromise Before it Becomes a Crisis||Jim Penrose, EVP of Cyber Intelligence||Wednesday, August 5th, 12:30pm - 1:15pm||Lunch and Learn|
|The 14 Absolute Truths of Security||Keith Palmgren||Wednesday, August 5th, 7:15pm - 8:15pm||SANS@Night|
|The Internet of Evil Things||Johannes Ullrich||Wednesday, August 5th, 8:15pm - 9:15pm||SANS@Night|