SANS Financial Services Security Vendor Briefing

  • Friday, 14 Oct 2016 8:30AM EDT (14 Oct 2016 12:30 UTC)
  • Speaker: NULL
Financial institutions continue to be the target of the most advanced attacks by motivated threat actors. Unfriendly nation-states breach systems to seek intelligence or intellectual property. Hacktivists aim to make political statements through systems disruptions, while organized crime groups, cyber gangs, and other criminals breach systems for monetary gain.

Join the SANS Institute as we bring the SANS Financial Services Security vendor briefing to the Financial Community in the New York City area. This 1/2 day event provides a unique opportunity to engage in dialogue around cybersecurity issues specific to the Finance Industry, and learn about key solution capabilities/customer success stories.

Through the latest research efforts, in-depth technical knowledge and vendor solutions, attendees will walk away with strategic and tactical actions aimed to address key concerns for the Financial Industry such as:

  • How can financial organizations manage these threats while maturing their prevention, detection and reaction capabilities?
  • How can they operationalize threat intelligence in the most effective way?
  • What are the strategies needed to elevate their cyber resilience while ensuring they keeping pace with regulatory requirements?
    • Agenda:
      Friday, October 14, 2016
      Time Event
      8:00am - 8:30am Registration & Coffee Networking
      8:30am - 9:00am Maturing The Threat Management Lifecycle
      Modern attacks are sophisticated and covert, conducted by criminals or nation states bent on stealing valuable data (or in some cases, total destruction of data) from targeted companies. In this scenario, proactivity is the most promising way forward. In this opening session, Ismael Valenzuela will share practical tips on how to mature the process of threat management in Financial organizations with the objective of continuously refining threat detection and response capabilities. Presenter: Ismael Valenzuela, Director, Global Foundstone Service Line at Intel Security, GSE & SANS Instructor
      9:00am - 9:45am Out-Innovate Your Adversaries with Recorded Future Intel Goals
      Threat intelligence can maximize your resources to help leaders and teams make better decisions. WithRecorded Future, we show how you can deliver the actionable intelligence to incident response, threathunting, vulnerability management, and SOC teams--stopping adversaries before they can compromiseyour systems and assets, and saving your organizations time and money.
      Presenter: John Wetzel, Threat Intelligence Analyst, Recorded Future
      9:45am - 10:15am Networking Break
      10:15am - 11:00am Your Money or Your Data - DDoS & The Era of Cyber Extortion
      Cyber extortion has reached new proportions, with a wide variety of methods like DDoS and ransomware variants being used to extort individuals and organizations. Recently uncovered ransomware-DDoS hybrid attacks like Cerber, showcased how attackers added DDoS capabilities to ransomware. Cybersecurity experts predict these attacks to only increase. But stories made public provide limited knowledge of initial attack vector or details. This session presents real cases of cyber extortion on financial institutions and high net worth individuals, including hacking techniques for full network compromise and deployment of ransomware kits. Attendees will walk away from this session with knowledge of the tools and strategies needed for elevating their cyber resilience.
      Presenter: Steve Gates, Chief Research Intelligence Analyst, NSFOCUS
      11:00am - 11:45am Developing Contextual Threat Intelligence
      Hashes, IPs, Domains, oh my, what am I to do with all this data. Analyze it. In order to have contextual threat intelligence you need to understand your audience and the requirements for intelligence consumption. Open Source Intelligence provides a platform for collecting intelligence data, but without analysis and requirements, collection efforts could produce a wild goose chase and provide little value. Military and Business Intelligence and Big Data all strive to solve one thing. What is the question (requirements) you need answered. Do I have data in the dark web? Are they selling it? What are my greatest risks? Is is exploitable? Has that exploit been used? Rob will discuss the contextual threat intelligence process, and share some tips and tools that will help you achieve Actionable threat intelligence that isn't about the bits and bytes.
      Presenter: Rob Gresham, Senior Consultant, Intel Security
      11:45am - 12:15pm Regulatory Risk Management: Reasonable and Appropriate Care in 2016
      Are you keeping pace with regulatory enforcement actions? In this presentation, David Hoelzer will walk you through the particulars of one of the most important consent orders affecting the Financial Services sector. He will discuss what the order means for enterprises today and explain how it serves as a roadmap for information security behaviors within an organization.
      Presenter: Dave Hoelzer, Owner, EnclaveForensics - Dean of Faculty, Program Faculty at SANS Technology Institute