How the West was Pwned
- G. Mark Hardy
- Tuesday, May 13th, 8:15pm - 9:15pm
Can you hear it? The giant sucking sound to the East? With it are going more than just manufacturing jobs -- it's our manufacturing know-how, intellectual property, military secrets, and just about anything you can think of. If we're so technologically advanced, how are the People's Republic of China (PRC) and others able to continue to pull this off? Why do we keep getting pwned at our own game?
The Mandiant APT1 report released last year detailed research into People's Liberation Army (PLA) Unit 61398 and their significant penetration into western networks. It was followed quickly by a series of political and diplomatic statements denouncing China's actions, which China flatly denied. Where's the truth? We'll try to find it.
There's a lot of talk about cyber war, but there may not be a war. If a victor can extract tribute from the vanquished, war isn't necessary. Today, intellectual capital is a proxy for tribute. We'll look at some specifics about what operations have been run against us and progress in efforts to create an international legal framework for cyberwar in case the bits start flying.
The following bonus sessions are open to all paid attendees at no additional cost. There are many different types of events that fall into these categories:
- SANS@Night: Evening presentations given after day courses have ended. This category includes Keynotes.
- Special Events: SANS-hosted events and other non-technical recreational offerings. This category includes, but is not limited to, Receptions and Information Tables.
- Vendor: Events hosted by external vendor exhibitors.
- Lunch & Learn: Short presentations given during the lunch break.
Emerging Trends in Information Security
At Security West 2014, we'll offer 3 different discussions on Emerging Trends in Information Security and an opening night address by John Pescatore. Here's your chance to influence these discussions on trends in cyber threats, technology, business vulnerabilities, device and software security, and more. Your insights may be featured during the SANS@Night panel discussions!
Share Your Thoughts About Emerging Trends in Information Security
|Registration Welcome Reception||—||Friday, May 9th, 5:00pm - 7:00pm||Reception|
|General Session - Welcome to SANS||Rob Lee||Saturday, May 10th, 8:15am - 8:45am||Special Events|
|Emerging Security Trends: Crossing the Chasm to Protecting a "Choose Your Own IT" World||John Pescatore||Saturday, May 10th, 7:15pm - 8:15pm||Keynote|
|Will The Real Next Generation Security Please Stand Up?||Moderator: John Pescatore, Panelists: Paul Henry, Phil Hagen, and Seth Misenar||Saturday, May 10th, 8:15pm - 9:15pm||Keynote|
|Security Awareness Metrics: Measuring Human Behavior||Lance Spitzner||Sunday, May 11th, 7:15pm - 8:15pm||SANS@Night|
|Emerging Trends Panel: Offense Informs Defense... but How?||Ed Skoudis, Mike Poor, and a panel of Pen Testing and Cyber Defense faculty||Sunday, May 11th, 7:15pm - 8:15pm||SANS@Night|
|Continuous Ownage: Why you Need Continuous Monitoring||Eric Conrad and Seth Misenar||Sunday, May 11th, 8:15pm - 9:15pm||SANS@Night|
|Securing The Kids||Lance Spitzner||Sunday, May 11th, 8:15pm - 9:15pm||SANS@Night|
|Vendor Solutions Expo||—||Monday, May 12th, 10:30am - 10:50am||Vendor Event|
|Vendor Solutions Expo||—||Monday, May 12th, 12:15pm - 1:30pm||Vendor Event|
|Vendor Solutions Expo||—||Monday, May 12th, 3:00pm - 3:20pm||Vendor Event|
|The 13 Absolute Truths of Security||Keith Palmgren||Monday, May 12th, 7:15pm - 8:15pm||SANS@Night|
|Emerging Trends in Forensics and Incident Response||Rob Lee and a panel of DFIR faculty||Monday, May 12th, 7:15pm - 8:15pm||SANS@Night|
|The State of Eavesdropping on Cellular Networks||Christopher Crowley||Monday, May 12th, 8:15pm - 9:15pm||SANS@Night|
|An Introduction to PowerShell for Security Assessments||James Tarala||Monday, May 12th, 8:15pm - 9:15pm||SANS@Night|
|Fortinet Next Generation Firewalls||Jeff Eckley, Inside Sales Manager, Infogressive||Tuesday, May 13th, 12:30pm - 1:15pm||Lunch and Learn|
|‚Operationalize Open Intelligence ‚ YARA + Fidelis XPS‚||Mike Nichols, Senior Technical Product Manager||Tuesday, May 13th, 12:30pm - 1:15pm||Lunch and Learn|
|Symantec Lunch and Learn||—||Tuesday, May 13th, 12:30pm - 1:15pm||Lunch and Learn|
|Retina Vulnerability Management: The Best-Kept Secret in Security||Jason Williams, Security Engineer with BeyondTrust||Tuesday, May 13th, 12:30pm - 1:15pm||Lunch and Learn|
|SANS Technology Institute Open House||David Hoelzer||Tuesday, May 13th, 7:15pm - 7:45pm||Special Events|
|Closing the Door on Web Shells||Anuj Soni||Tuesday, May 13th, 7:15pm - 8:15pm||SANS@Night|
|GIAC Program Overview||Seth Misenar||Tuesday, May 13th, 7:45pm - 8:15pm||Special Events|
|How the West was Pwned||G. Mark Hardy||Tuesday, May 13th, 8:15pm - 9:15pm||SANS@Night|
|Evolving Threats||Paul A. Henry||Wednesday, May 14th, 7:15pm - 8:15pm||SANS@Night|
|A Small Business No Budget Implementation of the SANS 20 Security Controls||Russell Eubanks||Wednesday, May 14th, 7:15pm - 8:15pm||SANS@Night|
|How to Spy on your Employees with Memory Forensics||Jake Williams||Wednesday, May 14th, 8:15pm - 9:15pm||SANS@Night|