SecWest 2022 Bonus Session: Connected Everything: Zero Trust Security Hygiene for Infrastructure Access for IT & OT

  • Friday, 06 May 2022 3:30PM EDT (06 May 2022 19:30 UTC)
  • Speaker: Sandro Janita

The state of IT/OT security has evolved. Keeping up with this evolution requires adopting a Zero Trust secure access framework. This discussion will focus on how today’s distributed IT/OT environments are challenging organizations to provide secure remote access for 3rd parties and global partners to monitor and administer IT/OT systems. We will discuss the following key elements of defining a secure framework for implementing remote access for IT/OT:
• The relevance of Zero Trust to today’s IT/OT environments
• Employing agile remote access methods to allow fast onboarding and offboarding for remote access
• Centralizing access to prevent bad hygiene such as the use of shared passwords
• The importance of transactional visibility into user activity for SSH and RDP allowed access

>>>>Download a copy of the presentations here!

SANS_Security_West_2022_-_Reg_Page_(1).png

Sponsor

appaegis_logo.png

Full List of SANS 2022 Bonus Sessions

Date

Time (PDT)

Schedule

May 6

12:30PM

SecWest Bonus Session: Connected Everything: Zero Trust Security Hygiene for Infrastructure Access for IT & OT

The state of IT/OT security has evolved. Keeping up with this evolution requires adopting a Zero Trust secure access framework. This discussion will focus on how today’s distributed IT/OT environments are challenging organizations to provide secure remote access for 3rd parties and global partners to monitor and administer IT/OT systems. We will discuss the following key elements of defining a secure framework for implementing remote access for IT/OT:
• The relevance of Zero Trust to today’s IT/OT environments
• Employing agile remote access methods to allow fast onboarding and offboarding for remote access
• Centralizing access to prevent bad hygiene such as the use of shared
• The importance of transactional visibility into user activity for SSH and RDP allowed access

Register Here >>

May 6

12:30PM

SecWest Bonus Session: Evolve your SOC and Defend Your Cloud Environment

Are you straining to scale your security analysts and defenses to stop attackers? If so, you’re not alone. Combating today’s threats requires new approaches to protecting your cloud environment and how your SOC manages its data, analytics and expertise. Join Devo as we explore innovative ways your security team can thrive in the era of the shift to the cloud, massive data growth, talent shortage, and constantly evolving threats with:

•A SIEM solution that scales and ingest all your data to deliver full visibility into threats
•Analytics and curated detections to uplift your team’s performance and address cloud security use cases
•Innovative adversary simulation tools to test attacks and practice defenses

Register Here >>

May 6

12:30PM

SecWest Bonus Session: Pentera 101: Changing the Game of Offensive Security

This session is to walk through a demonstration of Pentera: The Automated Security Validation solution. Organizations over the years have been following a defense in depth model to protect their critical assets. While this strategy makes sense; the tools, processes, and procedures surrounding this initiative have grown significantly. How confident can organizations be that each layer and the enormous effort undertaken is working effectively? Jay Mar-Tang will take the time to walk through how Pentera can validate which risks are present, which mitigative efforts are working efficiently, and how security practitioners of all expertise can leverage Pentera both internally and externally to know with certainty how strong the security posture actually is.

Register Here >>

May 6

6:30 PM 

SecWest Keynote: Threat Hunting with ML and AI

Join David Hoelzer for an exploration of some real-world applications of machine learning and artificial intelligence in cybersecurity. Can these techniques be useful today? Is it possible to use these technologies to accelerate threat hunting and incident investigations? Come to this talk and demonstrations to find out why the answer is a resounding “Yes!”

Register Here >>