Select Your Track
- TRACK: INSIDER THREAT, PHISHING & MALWARETRACK: INSIDER THREAT, PHISHING & MALWAREFriday, June 9th | Join Chris Dale for the Insider Threat, Phishing & Malware Track to discover the latest tools, solutions and techniques available to combat today's insider threat and malware attacks.
- TRACK: ZERO TRUSTTRACK: ZERO TRUSTFriday, June 9th | Join Matt Bromiley for the Zero Trust Track to explore the latest trends and capabilities of how your organization can benefit from a zero trust architecture.
Event Agenda | Insider Threat, Phishing & Malware Track
Timeline (EDT) | Session Details |
---|---|
10:30AM | Welcome & Opening Remarks Chris Dale, Event Chair, SANS Institute |
10:45AM | Session One | Defending the Perimeter Within: Understanding and Combating Insider-Driven Malware Threats This session will explore the complex interplay between insider threats and malware attacks. We will start by examining the different types of insider threats and how they contribute to the spread of malware, touching on negligent and malicious insiders. Then, we will explore the behavior of prevalent malware distributed via phishing emails and USB media devices. By analyzing real-world malware in a sandbox environment, attendees will clearly understand these threats' behavior.By attending this session, you will learn the following:
Fatih Akar, Security Product Manager, VMRay |
11:25AM | Session Two | Who’s Attacking Whom? Learn How to Prevent and Mitigate Insider Threats External attacks aren’t the only threats to your business. Malicious, negligent, and compromised employees also create significant risk. Many security teams lack the visibility and tools they need to rapidly detect and mitigate insider threats.Join Devo to learn how to:
|
12:05PM | Break |
12:20PM | Session Three | How to Use Anomaly Detection for Better Threat Detection—Especially in the CloudWhat’s the advantage of anomaly-based threat detection? We're sharing examples of things anomaly detections catch, but rules-based detections are blind to. Learn how Uptycs engineers detections for scaling cloud environments and ways to hone them. We'll discuss security examples that show how anomaly detections outperform traditional methods of threat detection, including a cloud supply chain incident, and associated third party risks that are increasingly prevalent in cloud accounts. You'll learn how to:-Uncover alerts found using anomaly detections that were missed by traditional detection methods-Use anomaly frameworks to secure supply chain and address insider threats and third-party access use cases Craig Chamberlain, Director of Algorithmic Threat Detection, Uptycs |
12:50PM | Session Four | Automating Your Response to Phishing Attacks Phishing scams are an ongoing, persistent problem for security teams as today's most pernicious cyberattacks, including ransomware and credential theft, are delivered via a phishing email. To underline this, the latest FBI Internet Crime Complaint Center (IC3) report, identifies phishing as the top incident reported in 2022, with an associated dollar loss of $52 million. Join us for this session to find out how you can streamline response to phishing attacks and leverage machine learning to predict and anticipate future attacks. Life is short, so don't waste it chasing phish, and spending needless hours dealing with phishing incident cleanup. Let us show you how you can drastically cut the time spent on phishing incidents by up to 80 percent. Emran Mazumder, Technical PMM, Palo Alto Networks |
1:20PM | Break |
1:35PM | Panel | Beyond Firewalls: Navigating the Complexities of Cybersecurity As cyber threats continue to evolve, traditional approaches to cybersecurity are less and less efficient. While firewalls have long been a cornerstone of network security, they are just one piece of a larger puzzle. Today's organizations must contend with a wide range of threats, from phishing and malware to insider attacks and sophisticated cybercriminals. This panel discussion will explore the complexities of modern cybersecurity and offer insights into the latest strategies and technologies for defending against cyber threats. Join us as we go beyond firewalls and delve into the cutting-edge approaches that are driving the future of cybersecurity. Moderator: Chris Dale, Event Chair, SANS Institute Panelists: Fatih Akar, Security Product Manager, VMRay |
2:20PM | Closing Remarks Chris Dale, Event Chair, SANS Institute |
Event Agenda | Zero Trust Track
Timeline (EDT) | Session Details |
---|---|
10:30AM | Welcome & Opening Remarks Matt Bromiley, Event Chair, SANS Institute |
10:45AM | Session One | Why Full Packet Capture Data is the Ultimate Verification for Zero Trust Zero-trust is one of the most talked about policies or cyber security best-practises in the industry, but in reality organizations are trying to figure out what it really means for their business. What exactly is the zero-trust model all about? And how can we simplify it down to make it meaningful for our teams and implement realistic processes and tools around it? We will cover some of the most important concepts and some suggestions for your team to walk away with. Michael Morris, Director of Technology Alliances, Endace |
11:25AM | Session Two | The Ultimate Guide to Zero Trust Access for the Hybrid WorkforceThe hybrid workforce is here to stay, but so are the security challenges that come with it. How can you protect your users, devices, and data from threats that can originate from anywhere and anyone? The answer is Zero Trust access, where trust is never assumed and connections are established based on context. In this session, you will learn:
Register now and learn how to achieve secure and productive hybrid work with SASE and become a zero trust expert. John Spiegel, Director of Strategy and Field CTO, Axis SecurityJaye Tillson, Director of Strategy, Axis SecurityDarren Tidwell, Solutions Architect, Axis Security |
12:05PM | Break |
12:20PM | Session Three | Least Privilege Access: The Most Important Yet Underrated Pillar of Zero Trust The principle of least privilege is the north star for workforce access management, but can feel out of reach for most. In this session we’ll break down why it’s the most important yet underrated pillar of zero trust and the steps you can take to implement it right now. Join Alex Bovee, CEO and cofounder of ConductorOne, to dive into 3 practical steps towards least privilege:
|
12:50PM | Session Four | Unifying Security for the Hybrid Workforce: A Paradigm Shift with Versa Zero Trust Everywhere As our workforce evolves to a hybrid model, security organizations are grappling with how to manage secure network access for users who split time between home and office. While cloud-delivered Zero Trust Network Access (ZTNA) solutions are being widely adopted to secure remote users, onsite branches and campuses continue to utilize a less-secure/more implicit trust model using legacy Network Access Control (NAC) solutions. Come learn:
Jon Taylor, Director and Principal of Security, Versa Networks |
1:20PM | Session Five| 5 Stage Approach to Zero Trust Security in OT Zero Trust Architecture (ZTA) is a powerful yet often misunderstood concept and its suitability for OT environments like ICS and SCADA is often unclear to practitioners. However, as these concepts start to make their way to OT-relevant regulations and standards like the TSA Security Directives and NIST SP 800-82, it is becoming more important for OT security practitioners and leaders to get up to speed and consider this approach in their OT security strategy. This session covers the applicability of ZTA in Industrial OT environments and a 5-stage approach to realizing this powerful framework.Del Rodillas, Senior Director of Product Management, Industrial Cybersecurity, Palo Alto Networks |
1:50PM | Break |
2:05PM | Panel | Details Coming Soon! Moderator: Matt Bromiley, Event Chair, SANS Institute Panelists: Michael Morris, Director of Technology Alliances, Endace John Spiegel, Director of Strategy and Field CTO, Axis Security Jaye Tillson, Director of Strategy, Axis Security |
2:50PM | Closing Remarks Matt Bromiley, Event Chair, SANS Institute |