Network Security and Ransomware

Network Security and Ransomware

The network is the heart of the enterprise, and has never been better defended but it still remains extremely vulnerable. The programme in this theater provides access to some of the best experts and vendors who will share the latest technologies and practices to help all of us understand how to protect our networks against a terrifying array of new threats from targeted DDos attacks to the latest evolving Ransomware.

Network Security and Ransomware Speakers

Brent Feller
Brent Feller

Senior Solutions Engineer eSentire

View

Brent Feller
Morey J. Haber
Morey J. Haber

Chief Technology Officer BeyondTrust

View

Morey J. Haber

With more than 20 years of IT industry experience, Mr. Haber joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition and currently overseas strategy for both vulnerability and privileged identity management. In 2004, Mr. Haber joined eEye as the Director of Security Engineering and was responsible for strategic business discussions and vulnerability management architectures in Fortune 500 clients. Prior to eEye, he was a Development Manager for Computer Associates, Inc. (CA), responsible for new product beta cycles and key customer accounts. Mr. Haber began his career as a Reliability and Maintainability Engineer for a government contractor building flight and training simulators. He earned a Bachelors of Science in Electrical Engineering from the State University of New York at Stony Brook.

Network Security and Ransomware Seminars

  • Wed 31th Oct 09:30 - 10:00
  • Brought to you by CrowdStrike

    Network Security and Ransomware Theatre

    Wed 31th Oct 09:30 to 10:00

  • Wed 31th Oct 10:50 - 11:20
  • Minimizing the detection to recovery timeframe Brent Feller  |   eSentire   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Wed 31th Oct 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates.

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join, Sean Blenkhorn, eSentire Director of Solution Engineering for Managed Detection and Response services who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Brent Feller Brent Feller View Profile
  • Wed 31th Oct 11:30 - 12:00
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    Network Security and Ransomware Theatre

    Wed 31th Oct 11:30 to 12:00

    The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks

    With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
     
    This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
     
    Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.

  • Thu 1th Nov 09:30 - 10:00
  • How to Protect Next Generation Technology from Modern Threats Morey J. Haber  |   BeyondTrust  |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 1th Nov 09:30 to 10:00

    How to Protect Next Generation Technology from Modern Threats

    Next generation technology such as the cloud, DevOps, and IoT are not immune to privilege security threats, vulnerabilities, and poor cyber security hygiene. Managing privileges and vulnerability assessments are therefore critical layers in identity and asset centric cyber defense. Privileged Access Management (PAM) and Vulnerability Management (VM) together provide a complete approach to preventing NextGen breaches by unifying visibility and control across on-premise, cloud, IoT, and DevOps environments with reliable and predictable threat management.

    Based on a recent survey by BeyondTrust, security professionals will learn how privileges, passwords, and vulnerabilities are being leveraged against next generation technologies, and how you can take measurable steps to defend against them.

    Speaker

    Photo Speaker Name Profile
    Morey J. Haber Morey J. Haber View Profile
  • Thu 1th Nov 10:50 - 11:20
  • Minimizing the detection to recovery timeframe Brent Feller  |   eSentire   |   Network Security and Ransomware

    Network Security and Ransomware Theatre

    Thu 1th Nov 10:50 to 11:20

    Minimizing the detection to recovery timeframe

    Avoid the potential effects sophisticated threat actors can have on business operations and new breach notification mandates.

    While recent trends have shown attackers are more frequently using simple tools and tactics to make a big impact to the overall global cost of data breaches, sophisticated threat actors utilizing advanced techniques to avoid detection could potentially have the greatest impact to an organization’s bottom line in 2018. While commodity threats continue to make the case for investment in preventative technologies, stricter regulations around breach notifications all but mandates increased investment in advanced detection and response capabilities. Now more than ever is minimizing the detection to response timeframe of utmost importance to ensure an organization is able to not only detect threats but contain and respond in a timeframe that minimizes the potential risk of impacting their clients and suffering the business altering implications of compliance violations.

    As organizations begin to address this transition, knowing where to start is a challenge. We invite you to join, Sean Blenkhorn, eSentire Director of Solution Engineering for Managed Detection and Response services who will cover the best path going forward and real-life examples of how advanced detection and response capabilities were able to thwart attackers and satisfy even the most stringent emerging regulatory requirements.

    Speaker

    Photo Speaker Name Profile
    Brent Feller Brent Feller View Profile
  • Thu 1th Nov 11:30 - 12:00
  • Brought to you by CrowdStrike

    Network Security and Ransomware Theatre

    Thu 1th Nov 11:30 to 12:00

Top