Agenda | December 2, 2022 | 11:00 AM - 2:45 PM EST
Timeline (EST) | Session Details |
---|---|
11:00 AM | Welcome & Opening RemarksChris Dale, Principal Instructor, SANS Institute |
11:20 AM | Exposure Management - The Integration of Threat Intelligence, Attack Surface and Vulnerability Management into Threat Management ProgramsThreat management programs aiming to establish visibility, detection, investigation and response are becoming more complex as infrastructure and workforces expand and adapt. This not only makes threat management more challenging, but can also dramatically increase our exposure to attack. So how can we do a better job of proactively understanding and reducing the risks and exposures associated with this disparate environment, while simultaneously significantly reducing the stress on our threat management systems and teams? Join us to hear what we have learned from thousands of engagements in this developing field, which we are referring to as Exposure Management. This approach has the goal helping organizations reduce risk and inefficiencies and get the most out of the tools, processes and people that they have. All while enabling the business to evolve and thrive. Sanara Marsh, Director, Product Marketing, Randori, an IBM Company |
11:55 AM | Break |
12:15 PM | Automating the Attacker’s Perspective - An Inside Look Into How Hackers Prioritize Targets at ScaleJoin, Evan Anderson, Co-Founder & Principal Technologist at Randori, an IBM Company, for an exciting session that dives into the fast-paced world of offensive security. It’s clear from talking with hundreds of organizations that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, switch teams for a day as we pull back the curtain behind the system that keeps one of the world’s most advanced attack platforms on target 24/7/365. Through examples, Evan will show how Randori, IBM X-Force Red, (and real attackers) are leveraging AI and decades of experience to discover, classify and prioritize millions of targets daily across some of the world’s largest organizations. He’ll break down the 6 “tempting” factors every vulnerability team should be using to prioritize risk. Evan Anderson, Principal Technologist, Randori, an IBM Company |
12:50 PM | Shadow IT Elimination: 5 Workflows Every Security Team NeedsIn this practical session, Randori Director of Product Marketing, Sanara Marsh, will break down 5 proven workflows, taken from most effective security teams, you can adopt to minimize your Shadow IT Risk. Attendees will gain in-depth insight into how to integrate ASM with vulnerability management, asset management, ticketing, threat intelligence and cloud providers. Each will include real-world examples of how companies like Air Canada, Lionbridge, NOV, and more are using these workflows to eliminate Shadow IT. Isabella Rocha, Technical Product Marketing Manager, Randori, an IBM Company |
1:25-1:40 PM | Closing RemarksChris Dale, Principal Instructor, SANS Institute |