Small Business: The New Target -- What Can They Do?
- Robert L Comella
- Sunday, March 10th, 8:45pm - 9:30pm
Small businesses account for more than half of the people employed in the private sector of the United States. According to Entrepreneur Magazine it may be as much as 80%. During the last 15 years, I had the opportunity to work with dozens of them. Traditionally, their information systems are less secure due to reduced awareness, staff, and capital. Unfortunately, no business is too small to experience incidents, and all it takes is one major one to put a small business out of business. What can these organizations do?
The simple answer is: A great deal. Sites who took a little time to harden their systems and review their policies saw reductions in costly downtime. Some reduced their downtime from one or two days per quarter to less than one day per year. The increase in productivity easily paid for the tools required to obtain it.
While it is possible to spend thousands of dollars on security, many solutions simply require some time to implement. Others require only small capital investments. This presentation is for those who wish to learn what they can do to protect their small business.
Robert L. Comella is an IT consultant, project manager, trainer and speaker with expertise in open and closed sourced solutions. Robert‚s primary focus is information security. A master of science candidate at SANS Technology Institute, Robert has attained the following certifications: GSE: GIAC Security Expert; GIAC GCIH, GCUX, GCFA, as well as other GIAC certifications; and CISSP. Robert is a contributing writer and researcher of ‚Protecting Your Business from On-line Fraud‚, currently posted on the SANS website. Robert is also a SANS Mentor, exam question author, and advisory board member. In his professional career, Robert is a Software Installation Specialist at Workwise Inc. Workwise produces RBERP, a top of the line ERP manufacturing software package. Robert has worked with RBERP for fifteen years -- first as a customer, now as an employee where he installs the product. In addition, Robert is an expert in the Configureator, SSRS reporting, Security and many other aspects of the product. Robert also is an independent consultant and principal of Gremlins‚ Computer Solutions (GCS), located near Pittsburgh Pennsylvania. GCS specializes in education, open source solutions and DIYguides. GCS has provided technical expertise to organizations small to large, admin to production. As a member of the Pittsburgh chapter of InfraGard, he maintains a relationship with local FBI cyber-crime experts.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
- Lunch & Learn: Short presentations given during the lunch break.
|General Session - Welcome to SANS||Dr. Eric Cole||Sunday, March 10th, 8:15am - 8:45am||Special Events|
|There's a reason they're called persistent.||H. Michael Nichols, Technical Product Manager||Sunday, March 10th, 12:30pm - 1:15pm||Lunch and Learn|
|Dream Big||Suliman Al-Mazroua||Sunday, March 10th, 12:30pm - 1:15pm||Lunch and Learn|
|Fortinet Next Generation Firewalls||Infogressive Founder & CEO Justin Kallhoff||Sunday, March 10th, 12:30pm - 1:15pm||Lunch and Learn|
|The Good, the Bad and the Broken||Bill Olson, CISSP - Subject Matter Expert for VM||Sunday, March 10th, 12:30pm - 1:15pm||Lunch and Learn|
|Splunk Lunch & Learn||—||Sunday, March 10th, 12:30pm - 1:15pm||Lunch and Learn|
|Rapid7 Lunch & Learn||Paul Chu||Sunday, March 10th, 12:30pm - 1:15pm||Lunch and Learn|
|APT: It is Not Time to Pray, It is Time to Act||Dr. Eric Cole||Sunday, March 10th, 7:15pm - 9:15pm||Keynote|
|Project Management Approach to Yearly PCI Compliance Validation||Michael Hoehl||Sunday, March 10th, 7:15pm - 7:55pm||Special Events|
|Phish Stories: Technical Intervention when Humans Fail||Rich Graves||Sunday, March 10th, 8:00pm - 8:40pm||Special Events|
|Small Business: The New Target -- What Can They Do?||Robert L Comella||Sunday, March 10th, 8:45pm - 9:30pm||Special Events|
|Vendor Solutions Expo||—||Monday, March 11th, 12:00pm - 1:30pm||Vendor Event|
|Vendor Solutions Expo||—||Monday, March 11th, 5:00pm - 7:00pm||Vendor Event|
|Social Zombies: Rise of the Mobile Dead||Kevin Johnson & Tom Eston||Monday, March 11th, 7:15pm - 8:15pm||SANS@Night|
|Knock-off Phone Forensics -Some Handsets Aren't What They Appear To Be||Heather Mahalik||Monday, March 11th, 7:15pm - 8:15pm||SANS@Night|
|Please Keep Your Brain Juice Off My Enigma: a True Story||Ed Skoudis & Josh Wright||Monday, March 11th, 7:15pm - 8:15pm||SANS@Night|
|Over-Zealous Social Media Investigations: Beware the Privacy Monster||Ben Wright||Monday, March 11th, 8:15pm - 9:15pm||SANS@Night|
|Introduction to Windows Kernel Exploitation||Stephen Sims||Monday, March 11th, 8:15pm - 9:15pm||SANS@Night|
|How to Become a SANS Instructor||Eric Conrad||Tuesday, March 12th, 12:30pm - 1:15pm||Lunch and Learn|
|Making the GRC Grade - How to Realize Continuous Compliance||Wallace Sann, Director of Systems Engineering||Tuesday, March 12th, 12:30pm - 1:15pm||Lunch and Learn|
|The Evolution of Vulnerability Management||Jack Daniel, Product Manager||Tuesday, March 12th, 12:30pm - 1:15pm||Lunch and Learn|
|The Windows Desktop: A Hacker‚s Best Friend? It Doesn‚t Have To Be.||Derek Melber, Microsoft MVP||Tuesday, March 12th, 12:30pm - 1:15pm||Lunch and Learn|
|APTs As a Threat||Aaron Ansari, Director, Eastern US & Canada||Tuesday, March 12th, 12:30pm - 1:15pm||Lunch and Learn|
|Stop Spear-Phishing and Watering Hole Attacks||Chadd Milton||Tuesday, March 12th, 12:30pm - 1:15pm||Lunch and Learn|
|Women in Technology Meet and Greet||Karen Fioravanti||Tuesday, March 12th, 5:30pm - 6:30pm||Special Events|
|GIAC Program Overview||Jeff Frisk, GIAC Program Director||Tuesday, March 12th, 7:15pm - 8:15pm||Special Events|
|Hacking Your Friends and Neighbors For Fun||Joshua Wright||Tuesday, March 12th, 7:15pm - 8:15pm||SANS@Night|
|Panel - How Do We Secure The Human||Panel Members||Tuesday, March 12th, 7:15pm - 8:15pm||SANS@Night|
|Securing the Kids||Lance Spitzner and Rich Wistocki||Tuesday, March 12th, 8:15pm - 9:15pm||SANS@Night|
|InfoSec in the Financial World: War Stories and Lessons Learned||Bryan Simon||Tuesday, March 12th, 8:15pm - 9:15pm||SANS@Night|
|Open Mic Night||Brought to you by SANS Online Training||Tuesday, March 12th, 8:30pm - 10:30pm||Special Events|
|SANS Technology Institute Open House||Ray Davidson||Wednesday, March 13th, 7:15pm - 8:15pm||Special Events|
|Who's Watching the Watchers?||Mike Poor||Wednesday, March 13th, 7:15pm - 8:15pm||SANS@Night|
|Human Nature and Information Security: Irrational and Extraneous Factors That Matter||Lenny Zeltser||Wednesday, March 13th, 7:15pm - 8:15pm||SANS@Night|
|Why Our Defenses Are Failing Us. One Click Is All It Takes...||Bryce Galbraith||Wednesday, March 13th, 8:15pm - 9:15pm||SANS@Night|
|You Can Panic Now. Host Protection is (Mostly) Dead.||Rob Lee||Wednesday, March 13th, 8:15pm - 9:15pm||SANS@Night|
|"Hall of Shame" Apps in the Apple App Store and Google Play||Tom Eston||Wednesday, March 13th, 8:15pm - 9:15pm||SANS@Night|
|Tales from the Crypt: TrueCrypt Analysis||Hal Pomeranz||Thursday, March 14th, 7:15pm - 8:15pm||SANS@Night|
|Finding Unknown Malware||Alissa Torres||Thursday, March 14th, 7:15pm - 8:15pm||SANS@Night|
|Honeypots For Home Use||James Leyte-Vidal||Thursday, March 14th, 7:15pm - 8:15pm||SANS@Night|
|Physical Repair of Mobile Devices - Practical Tips & Tricks For When Good Evidence Gets Broken||Det. Cindy Murphy||Thursday, March 14th, 8:15pm - 9:15pm||SANS@Night|
|Hunting and Sniper Forensics||Jason Lawrence||Thursday, March 14th, 8:15pm - 9:15pm||SANS@Night|