Public and hybrid cloud adoption is exploding, but so are cloud hacks and breaches. Cloud assets are at risk from the same types of threats targeting physical networks, but traditional security protecting premises-based networks doesn't work in dynamic and elastic cloud environments.
What's more, cybercriminals are...
Brett Johnson, referred to by the United States Secret Service as "The Original Internet Godfather" has been a central figure in the cybercrime world for almost 20 years. He founded and was the leader of Counterfeitlibrary.com and Shadowcrew.com. Working alongside the top cyber criminals of our time, he helped design,...
During this workshop, Troutman Sanders partner Ron Raether will discuss the benefits of table top exercises. He then will explain how to conduct an effective exercise walking through mock incidents and explaining the process. Participants will:
Walk through several common incident scenarios and observe lessons to be...
With the adoption of the EMV standard for payment cards, the associated card fraud has increasingly gone down. This has resulted in cyber criminals shifting focus to other forms of fraud such as gift card fraud and fraud related to online retail purchases which are processed as Card Not Present (CNP) transactions....
When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? The CERT Insider Threat Center at Carnegie Mellon University is one of the...
During this session, we walk through applied use of indicators of compromise for several recent malware campaigns. The presentation starts with weak/tactical indicators, which are low cost for attackers to change and build, to strong/strategic indicators, which significantly increase costs to attackers.
This...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join...
Businesses that use industrial control systems, such as the oil & gas industry, have the same cybersecurity exposures that are found in non-industrial businesses: theft of intellectual property, exposure of customer and employee information, exposure of financial information, etc. However, these businesses have the...
"Cyber" has been treated as "just an IT issue" for far too long. It is not "just an IT issue"-cyber is an overall business risk issue that must be properly managed to comply with many laws and regulations, meaning it is also a legal issue. In this session we will examine:
The most impactful recent legal and...
What are the keys to successful threat-intelligence sharing between the public and private sectors? The government has focused a great deal of attention on how to adequately automate and share threat intelligence. This session explores how the private sector can use the government's experience and apply it, and...
DDoS, enterprise IoT, cyber fraud, industrial controls. Summit attendees over the course of the past two days have been educated on many of the bleeding-edge threats and threat actors, and they have gained insight on the latest tools to detect and respond to attacks. But how do they act upon this information? How do...
Security hygiene can be poor, and criminals know it. Fraudulent activity costs are in the billions worldwide across industries, and over 16 million consumers in the US were victims of identity theft or fraud in the past year. Learning to onboard new data at the speed of the business will ensure your fraud team can...
Many models of security still have their roots in older infrastructure. But with the death of the network perimeter and the rapidly approaching end to passwords, there has to be a new view of the security landscape to prepare for this future - especially with new devices coming in ever-changing forms.
This...
What is the state of DDoS, as observed by network and security professionals directly responsible for operating and securing global networks?
This session covers a range of issues, from threat detection and incident response to managed services, staffing and budgets. Hear about the daily operational challenges, as...
Financial fraud can be notoriously hard to detect and easy to cover up. But does blockchain technology with its distributed digital ledger now offer a new tool to help organizations reduce risk and prevent fraud?
This session describes:
More about blockchain and its uses beyond digital currencies;
The value of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.