SANS Community Nights are a great way to stay in touch with your local InfoSec community and to hear the latest in technical wizardry, industry intelligence, and thought leadership from our amazing instructors.
Join us at:
NH Collection Roma Centro
Via dei Gracchi 324
00192 Roma
View the agenda below:
Tuesday 7th May 2024
17:30 – 18:00
Registration and Drinks
18:00 – 19:00
“Share Qualitative Tactical and Operational Intelligence to a Broad Community, Also with AI” with Kevin Holvoet
19:00 – 20:00
“Exploring the Link Between Corruption and Cybercrime” with Jason Jordaan
Abstract(s):
Share Qualitative Tactical and Operational Intelligence to a Broad Community, Also with AI
Intelligence can only be called intelligence if the product can be consumed, actions can be taken, or decisions can be made and the product can be shared in a timely manner with everyone who needs to receive it. At the Centre for Cybersecurity Belgium, we had to find a way to share intelligence with our most critical companies in Belgium and international partners very fast and in a reliable way as part of the Early Warning System. We chose MISP to share both tactical and operational intelligence. In this presentation we will go into an overview of how you can make MISP highly available, build a community around it, and create qualitative events with enough context to make it usable. Of course we're including AI to make our process faster and more automated.
Exploring the Link Between Corruption and Cybercrime
We are confronted by so many cyber threat actors, with the primary focus being on external threats, and when it comes to internal threats, the focus is often on internal negligence. But the reality is we are seeing in more and more cases that external threat actors are actually simply corrupting internal staff members, often in trusted IT and security positions, to overcome even the most sophisticated cyber security systems. Considering that many cybercrime groups operate as organised crime groups, which are already willing to use corruption to achieve their aims, it is not surprising that they are willing to engage in corruption to facilitate their cybercrimes. This talk will explore this concept in detail, showing how corruption related to cybercrime works, how organised crime groups identify targets, and talk about a case study that the presenter was involved in, where a cybercrime group used corruption to pull of a major hack of several government departments.