Cyber Hack

The Cyber Hack is a LIVE security lab dedicated to demonstrating the techniques used by cyber criminals to break into your company’s corporate network and the steps you can take to prevent them.

Get ahead of the cyber curve and arm yourself with the knowledge you need to defend yourself from today's most dangerous hackers.

Witness live adaptive pentesting & domain trust exploitation. See well-known vectors such as phising and social engineering in action, as well as less well-known methods such as the 'SMB shakedown', USB attacks, payload encoding and the leveraging of common system misconfigurations.

// ACCESS THE CYBER HACK FOR JUST $99 WITH A BRIEFING & EXPO PASS

OR SEE IF YOU QUALIFY FOR A COMPLIMENTARY PASS...

DO YOU QUALIFY?

Cyber Hack Speakers

Adam Hogan
Adam Hogan

Field Security Engineer CrowdStrike

View

Adam Hogan
Heather Gantt-Evans
Heather Gantt-Evans

Senior Manager of Cyber Threat Management Ernst & Young, LLP

View

Heather Gantt-Evans

Heather is a CISSP-certified senior manager with a Masters in Technology Management in the Advisory Risk practice of Ernst & Young, LLP. She is a Subject Matter Expert for EY’s Cyber Threat Management competency with a focus on Cyber Exercises, Cyber Threat Intelligence (CTI) and Next-generation Security Operation Centers (SOCs). She specializes in the custom operationalization of intelligence but has the breadth and depth of experience to consult on a wide range of SOC and cyber security best practices, processes and challenges. She is most passionate about next-gen SOCs and leveraging cyber exercises, CTI, threat hunting, proactive fortification missions, analytics and robotic process automation to maximize security insights, increase productivity, decrease noise and improve defensive actions.

Michael Knapp
Michael Knapp

Director of Sales Engineering Forcepoint

View

Michael Knapp
Morey J. Haber
Morey J. Haber

Chief Technology Officer BeyondTrust

View

Morey J. Haber

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Parker Cook
Parker Cook

Solutions Engineer SentinelOne

View

Parker Cook

Cyber Hack Seminars

  • Wed 31th Oct 09:30 - 10:00
  • How to Build Effective Defensive Strategies Against Privileged Attacks Morey J. Haber  |   BeyondTrust  |   Cyber Hack

    Cyber Hack Theatre

    Wed 31th Oct 09:30 to 10:00

    How to Build Effective Defensive Strategies Against Privileged Attacks

    Cyber-attacks continue to increase in sophistication and are occurring in such volume that the daily newsfeed is littered with tales of new breaches and the cyber infonomics ramifications. Central to almost each of these stories is an element of privilege abuse and misuse that resulted in either the initial exploit, or that was implicated in allowing an initial foothold to metastasize into a security event inflicting widespread reputation and economic damage.

    Based on strategies developed by BeyondTrust and presented in the recently published book, “Privileged Attack Vectors,” security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged as attack vectors, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Wed 31th Oct 11:30 - 12:10
  • Piracy, Yesterday and Today Adam Hogan  |   CrowdStrike   |   Cyber Hack

    Cyber Hack Theatre

    Wed 31th Oct 11:30 to 12:10

    Piracy, Yesterday and Today

    The pirate companies of the 1600s were criminals opportunistically exploiting the new world of sail. This makes them far more similar to the adversaries of cyberspace than traditional thieves or organized crime. Pirates were forced to innovate or die, turned into some of the most progressive companies the world had ever seen. There is a lot of learn from this stunning level of innovation. I believe that understanding how these criminals organize offers insight into what we can learn about cyber criminals - and how to combat them.

    Speaker

    Photo Speaker Name Profile
    Adam Hogan Adam Hogan View Profile
  • Wed 31th Oct 01:00 - 01:50
  • Exercise the cyber demogorgons Heather Gantt-Evans  |   Ernst & Young, LLP  |   Cyber Hack

    Cyber Hack Theatre

    Wed 31th Oct 01:00 to 01:50

    Exercise the cyber demogorgons

    As businesses become more digitally dependent, security ops become more intertwined with the business. To test, measure and validate this alignment, we present a model of cyclical, intensity increasing and threat scenario-driven exercises designed to stress test the entire business’ ability to respond. Today, cyber-incidents are business incidents, cyber threats are business threats.

    Speaker

    Photo Speaker Name Profile
    Heather Gantt-Evans Heather Gantt-Evans View Profile
  • Wed 31th Oct 02:00 - 02:50
  • Advanced Attackers And Evolving Enterprise Defenses Parker Cook  |   SentinelOne   |   Cyber Hack

    Cyber Hack Theatre

    Wed 31th Oct 02:00 to 02:50

    Advanced Attackers And Evolving Enterprise Defenses

    Advanced attackers are always looking for ways to stay hidden. The growing use of traffic encryption — over 50% of Web traffic today is encrypted — provides a simple trick for attackers to hide their threats and communications channels. Exploit kits, malware, adware, callbacks, as well as command & control channels leverage encrypted communications to infiltrate organizations and exfiltrate information.
     
    Look into encrypted traffic, without the need for a proxy or additional agents and ensure full coverage of threats hiding within covert channels. Learn how EPP capabilities can be extended to provide an integrated workflow from visibility & detection to response & remediation. A single agent, single console architecture provides deployment simplicity and operational agility to improve productivity and minimize business impact of threats.

    Speaker

    Photo Speaker Name Profile
    Parker Cook Parker Cook View Profile
  • Thu 1th Nov 11:30 - 12:10
  • Putting the Human Back Into Network Security Michael Knapp  |   Forcepoint   |   Cyber Hack

    Cyber Hack Theatre

    Thu 1th Nov 11:30 to 12:10

    Putting the Human Back Into Network Security

    Network security technology is shifting from just being a way to keep threats out of your network to providing operational insights that can make your people more effective and your organization more efficient. With the growth of unmanaged devices like phones, tables, appliances and Internet of Things (IoT) gadgets, the network often is the only place where sensing and enforcement can be done consistently. Advances in behavioral monitoring, analytics and machine learning are converging, enabling security to go beyond the old black-and-white, threat-centric approach of separating activities into “good” and “bad.” Now, security is becoming context-based, addressing the fuzzy “gray” area where today’s greatest productivity and greatest risks are found.

    Speaker

    Photo Speaker Name Profile
    Michael Knapp Michael Knapp View Profile
Top