Staying ahead of the evolving threat landscape is key to strengthening resilience to security risks. And guess what? SIEMs are part of the problem.
Protecting the business is not just about being able to respond to threats, it’s understanding, mapping and measuring your business’s ever increasing attack surface and exposures. To stay ahead, you need to differentiate the risky from the risk free, the minor misconfigurations or massive holes that are easily targeted.
Join Gavin Millard, Deputy CTO of VM, as he shares insights on what that one flaw that leads to a breach could be.
Privileged Access Management (PAM) is the most effective way to combat identity and privilege-based attacks, by securing passwords and other secrets, granular access control, session management, and other Zero Trust strategies.
But, trying to implement all PAM capabilities at the same time would be a daunting project and cause friction for users.
Join Delinea to learn how you can benchmark your current security practices, set your priorities, and build a roadmap to accelerate your PAM maturity.
What will you learn?
Detecting a cyberattack before real damage is done; it’s possible! Sadly enough, we don’t hear much about these stories and positive outcomes. Negotiating a ransom really is not the only outcome after all there’s a red line that can be found in every cyberattack.
So, what approach should security leaders take to mitigate these challenges?
Join this session to learn how a modern Threat Detection capability can reveal the traces left behind, so you have time to react instead of negotiating.
Het grootste datalek ooit bij onderzoeksbureau Blaauw vanuit critical supplier Nebu BV. Wat is de noodzaak van het actief monitoren van je critical suppliers?
Join us for this session to find out how crowdsourced intelligence combined with machine learning could protect your organisation from the latest live email threats that aren’t stopped by traditional security technology. We’ll share some of the latest threat trends and look at our unique solutions that access the intelligence from our 35+ million global reporters.
Detecting a cyberattack before real damage is done; it’s possible! Sadly enough, we don’t hear much about these stories and positive outcomes. Negotiating a ransom really is not the only outcome after all there’s a red line that can be found in every cyberattack.
So, what approach should security leaders take to mitigate these challenges?
Join this session to learn how a modern Threat Detection capability can reveal the traces left behind, so you have time to react instead of negotiating.
To stop an adversary, you must first understand their tactics, techniques, and motivations. We have to adapt, fast!
2022 was a year of explosive, adaptive and damaging threats. Adversaries continue to be relentless in their attacks as they become faster and more sophisticated. CrowdStrike’s 2023 Global Threat Report uncovers notable themes, trends and events across the cyber threat landscape, including: 33 newly named adversaries, 200+ total adversaries tracked and 95% increase in cloud exploitation.
APIs are ruling the world. More and more companies choose to leverage APIs to fuel digital transformation, increase collaboration and grow their markets, often driven by government directives. This reliance on APIs leads to direct exposure of the business logic to the outside world, expanding the attack surface available to hackers, and traditional security solutions can’t keep up with today’s attacks. API security requires a new approach where context is key. During this presentation, you will learn how to effectively implement an API Security architecture with Salt.
Managing local accounts and sudo rights on Linux systems is complex and fraught with errors, which often makes those servers particularly vulnerable to cyberattacks. If cybercriminals access powerful root accounts, they can leverage super user privileges to exfiltrate sensitive data and move laterally to compromise the rest of your IT environment.
Leveraging a PAM solution allows for greater consistency, visibility, and control over Linux systems. By centralizing identity and access management for Linux, you not only save countless hours of manual work but also reduce the risk of privileged-based attacks on your servers.
Join this session to learn how a layered approach to PAM gives you additional protection at the server level for greater cyber resilience.
What will I learn?
Get answers to these important questions:
Get ready to go on a hunt for adversaries with the CrowdStrike® Falcon OverWatch™team – our very own elite team of threat hunting experts, hunting relentlessly to see and stop the most sophisticated threats.
In this session, you’ll have the opportunity to learn the secrets to effective threat hunting, based on OverWatch’s proprietary SEARCH methodology.
Additional Information: Nowhere to Hide is led by the OverWatch team, and they’ll be using scenarios derived from real-world OverWatch case studies. In addition to the hands on exercises, the workshop includes a deep dive into OverWatch’s threat hunting methodology, and walks through each attack in detail to highlight what OverWatch uncovered.
When (not if!) your public APIs are under attack, very likely it will be via one of the attack methods on the OWASP API top 10. How do these attacks actually work? During this session you will get a look from the attacker viewpoint, enriched with some real-life examples. After this session you will have a real good understanding why your traditional WAF or API Gateway are having a very hard time stopping these attacks, as most of them go unnoticed.
Join us for this session to find out how crowdsourced intelligence combined with machine learning could protect your organisation from the latest live email threats that aren’t stopped by traditional security technology. We’ll share some of the latest threat trends and look at our unique solutions that access the intelligence from our 35+ million global reporters.
Productivity suites like M365 & G-Suite are where work happens. It is also where risk occurs.
More than 90% of attacks involve email; and often, they are engineered to succeed in today’s M365 and G-Suites dependent world.
Learn how to Work Protected and safeguard against phishing and Business E-Mail Compromise.
Edwin van Andel neemt je mee op een rit door het prachtige -maar soms behoorlijk enge- landschap van bugs, mislukkingen en wonderen, gelegen in de mistige vallei van informatie beveiliging. Cyber!
Er zullen verhalen zijn over verkeerd gerichte focus. Er zullen anonieme pijlen vliegen naar de wonderlijke bugs die gevonden zijn bij de clientèle van Zerocopter’s bug-bounty platform. En we zullen naar de zonsondergang staren over de onsterfelijke velden van domheid.
Edwin geeft voorbeelden van prachtig aan elkaar geketende exploits, ronduit stomme ontwerpen, mislukkingen en de soms grappige reacties van de eigenaar. Plezier, gelach en zeker tranen, terwijl we afkoelen en samen zwemmen in wateren vol IoT. Terwijl hij altijd terugkeert bij de boodschap van al zijn presentaties: Hackers kunnen helpen.
Stap jij in voor een rit van 45 minuten door deze verborgen bossen? Zoals altijd inclusief visuele domheid!