<img src="http://www.shrfbdg004.com/63997.png" style="display:none;">

Cybersecurity Workshops

Beyond the Phish: Strategies for Identifying and Preventing Prevalent Security Threats  

 

Digital Forensics for Breach Resolution

 

SOCs: Comprehensive Threat and Log Monitoring and Management

Wombat Security
Mike Nobers

 

FireEye
Jason Forcht

 

Alert Logic
Paul Fletcher

Go beyond the phish with Wombat Security in this deep-dive workshop that will discuss the results of Wombat's recently released 2016 Beyond the Phish report. This session will cover information on the different types of attacks facing end-users today, share feedback from infosec professionals on top security threats facing their organizations, and provide you with end-user readiness toools when encountering non-phishing security threats.

 

The question is no longer Am I at risk? You are. The new question is Am I prepared? Given the rapidly evolving threat landscape, organizations are increasingly challenged to protect their key assets. They need someone they can trust to help them respond to cyber breaches and proactively evaluate the effectiveness of their security program and operations. You may be asking, If I am a breach victim, what do I do? What will the forensic security engineer look for when they engage? Moreover, how do they ply their craft in what is now commonly called “the breach hunt”? Find out the answers and see how human intelligence and forensic tools can paint a picture of what occurred and why.

 

What type of security do you really NEED? Protecting web apps and intellectual property? Meeting statutory and regulatory objectives? Finding vulnerabilities on unpatched machines? The ability to identify network threats before they are exploited? Get access to up-to-date threat intel relevant to your network? If these questions have you answering yes, this session is one you will not want to miss!

 Nov. 2

breakout-demo.svg 

2:30 PM 

 

 Nov. 2

breakout-demo.svg

12:00 PM 

 

Nov. 2 

breakout-demo.svg

 2:30 PM