Stop Spear-Phishing and Watering Hole Attacks - Put the User in a Bubble
- Nick Keller, Director of Sales, Mid-Atlantic
- Tuesday, April 9th, 12:30pm - 1:15pm
Location: Room 9/10
Speaker Bio -: Nick Keller is a Director of Sales for Invincea with 8 years of cyber security experience helping large commercial enterprises mitigate their security risk. Before joining Invincea, Nick was instrumental in helping ArcSight/HP achieve significant success in the Mid-Atlantic. Prior to Arcsight, Nick worked for Andersen Consulting, Informix and Netscape, in an enterprise sales role. He is a skilled and experienced software professional and seen as a valued customer advisor and advocate.
Presentation Description ‚ Your employees are the primary target of attack by a variety of adversaries bent on doing your organization harm. This is a fact that simply cannot be challenged based on the last 24-36 months‚ worth of breach disclosures. Spear-phishing and watering hole attacks have been at the root of virtually every major attack disclosed during this time - whether the RSA breach, the campaign disclosed by Kaspersky labeled "Red October," the "Nitro" attacks, attacks against the energy sector, The New York Times, The Washington Post, The Wall Street Journal, The White House, Facebook, Apple, etc, etc, etc.
We've got a user problem on our hands that we need to rapidly solve. We're currently losing the battle to our adversaries because the endpoint has become the new perimeter and our endpoint defenses are largely antiquated.
However, innovation is here that you must take a look at...come hear why the NSA recently won a SANS National Security Award for its work with Invincea in combatting APTs and user-targeted attacks.
Join Nick Keller and Phil Purdy of Invincea for an informative discussion that will cover:
- Recent examples of user targeted attacks and thoughts on why they've succeeded
- How advances in virtualization enable the creation of segregated environments for your users to run highly targeted applications such as the web browser, PDF reader,
Office suite, etc.
- How behavioral based malware detection is being used in these segregated environments to spot and kill zero-days - including the recently announced Java 7 exploit
- Methods for turning thwarted attacks into rich forensic information that can feed your entire infrastructure and extend its usefulness
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
- Lunch & Learn: Short presentations given during the lunch break.
Monday, April 8
Tuesday, April 9
|Vendor Showcase||—||Tuesday, April 9th, 10:30am - 10:50am||Vendor Event|
|Stop Spear-Phishing and Watering Hole Attacks - Put the User in a Bubble||Nick Keller, Director of Sales, Mid-Atlantic||Tuesday, April 9th, 12:30pm - 1:15pm||Lunch and Learn|
|Vendor Showcase||—||Tuesday, April 9th, 3:00pm - 3:20pm||Vendor Event|
|Infosec Rock Star: How to be a More Effective Security Professional||Ted Demopoulos||Tuesday, April 9th, 7:15pm - 8:45pm||SANS@Night|