Loading…
Attending this event?
Streaming: https://mssvideo.vcu.edu/RVAsec
Business [clear filter]
Tuesday, June 4
 

11:00am EDT

Prioritization Myths Busted with Better Vulnerability Data
A good prioritization plan should let you know where to start when tackling risk. And yet, people don't know where to start when developing a good prioritization plan! Even worse, we make a number of bad assumptions when trying to navigate this labyrinth.

Which method is the best? Are many methods better than one? How many is too many? What does “best” even mean?

Ask 10 different practitioners these questions and you might get 10 different answers. There’s no better example of this situation than with the plethora of vulnerability prioritization methods available today. Luckily, we’ve been able to collect an unprecedented amount of data on vulnerabilities, and it’s taught us a lot about what makes sense, and what doesn’t.

Join us as we use this vulnerability data to dispel myths, avoid pitfalls, and conjure some solid recommendations that will put you on a better path.

Speakers
avatar for Ben Haynes

Ben Haynes

Data Scientist, Flashpoint
Ben Haynes is a data scientist at Flashpoint, leveraging analytics and his cybersecurity expertise to solve practical problems in the industry. Previously, he worked at Risk Based Security, where he dedicated his time to enhancing and implementing the organization’s cybersecurity... Read More →


Tuesday June 4, 2024 11:00am - 11:50am EDT
Ballroom A/B

1:00pm EDT

Verified for Business Continuity: How to Remediate Risk Safely Across the Enterprise
Remediation can feel like a high-wire act, balancing the need to close exposures against the imperative of maintaining business continuity. This talk addresses the quintessential challenge: how can organizations utilize their existing arsenal of security tools to remediate vulnerabilities, misconfigurations, and exposures without halting the business engine? Glean insights from a seasoned industry expert on leveraging security logs, configurations, and threat intelligence to unearth exposures, teaching CISOs to navigate this delicate balance.

Speakers
avatar for Oren Koren

Oren Koren

CPO & Co-Founder, Veriti Security
Oren Koren is the Co-Founder and Chief Product Officer of Veriti. Oren brings 19 years of experience in cybersecurity, advanced threat analysis, and product management. Prior to founding Veriti, Oren was a Senior Product Manager at Check Point Software Technologies, where he led AI-based... Read More →


Tuesday June 4, 2024 1:00pm - 1:50pm EDT
Ballroom C/D

2:00pm EDT

Once Upon a Cyber Threat: The Brothers Grimms Teachings on APT Awareness
Two hundred years ago, the first volume of fairy tales was published by the Brothers Grimm, introducing to the world a realm of magic, dark forests, and powerful villains to haunt everyone's dreams.  

We never imagined this realm would exist in the digital age. "Once Upon A Cyber Threat"  delves into the realm of advanced persistent Threat Groups (APTs), drawing parallels between the world of poisoned apples, breadcrumb trails, and magic mirrors and today's modern cyber threats. Serving not a tale of caution but a call to action and a lesson in storytelling, creating an outline that can help every security professional impart the caution, wisdom, and resilience we need to become the narrators that transformed Brother Grimm's tales into the happy ever after stories we know today.

Speakers
avatar for Ell Marquez

Ell Marquez

Researcher, Operation Safe Escape
Ell Marquez is a proud Hacking Is Not and Crime and Operation Safe escape advocate. She has traveled the world for five years, educating security practitioners on subjects from on-prem infrastructure to the cloud and everything in between. I've traveled the world educating security... Read More →


Tuesday June 4, 2024 2:00pm - 2:50pm EDT
Ballroom C/D

3:00pm EDT

Defending Against the Deep: Is Your Workforce Ready For Generative AI Adversaries?
Gain insight into the evolving landscape of cybersecurity in the age of AI Generated Content. From defending against multi-vector cyber attacks to empowering your workforce through AI-powered cybersecurity awareness, Defending Against the Deep delves into the intricacies of Generative AI. Together, we will look at case studies, a technical demonstration of current capabilities, keys for leveling up your workforce, and an opportunity to test your ability to recognize AI Generated Content. In this talk, explore how the same technology used for malicious intent can be harnessed for good, offering innovative solutions to safeguard enterprise environments.

Speakers
avatar for Tucker Mahan

Tucker Mahan

Director of Emerging Technology, MAXX Potential
Tucker currently leads emerging technology initiatives at MAXX Potential, expanding capabilities and coaching others to build careers in technology.He is a lifelong learner with a passion for all things Technology, and loves to share his ever-evolving knowledge on the subject. When... Read More →


Tuesday June 4, 2024 3:00pm - 3:50pm EDT
1st Floor, Magnolia Room
 
Wednesday, June 5
 

10:30am EDT

Apples to Apples
In this speech, we will uncover many of secrets the security services industry doesn't want you to know.  We will follow three real world case examples to show why it's important to know how to compare "apples to apples" when getting the help you need to evaluate, remediate, and mature your security program.

Speakers
avatar for Pyr0 (Luke McOmie)

Pyr0 (Luke McOmie)

Vice President | Offensive Security, Blue Bastion | Ideal Integrations
Mr. McOmie started in offensive security in 1994 and is a trusted advisor, security leader and mentor. With a career focus in offensive security and a strong technical background, he is recognized for his excellence in developing and executing enterprise security strategies and leading... Read More →


Wednesday June 5, 2024 10:30am - 11:20am EDT
Ballroom A/B

11:30am EDT

Strategic Alliances: How GRC Teams Can Empower Offensive Security Efforts
Collaboration between Governance, Risk, and Compliance (GRC) teams and offensive security teams is vital for a strong security stance. This presentation highlights the role of GRC teams in augmenting offensive security efforts. Traditionally, GRC teams are seen as policy makers, compliance assessors, and risk managers. Their role, however, significantly contributes to offensive security strategies, going beyond these conventional duties. The presentation emphasizes how GRC teams can enhance offensive security through risk-informed strategies, ensuring that offensive measures align with policies and compliance, optimizing resources, and bridging communication between technical and executive teams. The session aims to provide cybersecurity professionals and organizational leaders with a thorough understanding of the importance of GRC teams in offensive security and practical approaches for integrating these functions within their organizations.

Speakers
avatar for Darryl MacLeod

Darryl MacLeod

vCISO, Lares
Darryl MacLeod works for the Lares Advisory Services team and has over 20 years of experience in the IT security sector, having been responsible for developing, managing, and assessing information security programs for all levels of enterprise and government-level organizations. He... Read More →


Wednesday June 5, 2024 11:30am - 12:20pm EDT
Ballroom C

1:00pm EDT

The Human Experience of Security Operations
Security Operations has become the talk of the town now that there are CoPilots, Unified Consoles, and VC money pouring into the field.  While many of those things address technical aspects what about the business of security operations?  Specifically the people involved.  Chris Tillett has spent 2 years interviewing SOC leaders and analysts and would like to share his results from this data driven approach.

Speakers
avatar for Chris Tillett

Chris Tillett

Principal Engineer, Palo Alto Networks
Chris currently works for Palo Alto Networks in R&D, helping customers stay ahead of threat actors and helping our products stay customer focused. His experience with UEBA and IAM helped drive the ITDR module to not only focus on Identity based attacks, but also the entire Identity... Read More →


Wednesday June 5, 2024 1:00pm - 1:50pm EDT
Ballroom C/D

2:00pm EDT

Scaling Your Creative Output with AI: Lessons from SANS Holiday Hack Challenge
The rise in prominence of AI-powered content generation tools over the past year was tough to miss, and, heck, you have probably already created some cool stuff with them. Putting these tools to work in a meaningful, scalable way, however, can prove challenging.


In this talk, I will equip you with the technical knowledge required to build AI-enhanced tools, we'll discuss strategies for identifying opportunities for said tools, and we'll look at real-world examples from SANS Holiday Hack Challenge, the best darn free, seasonal hacking challenge in the world.

Speakers
avatar for Evan Booth

Evan Booth

Builder, Architect, Counter Hack
Evan Booth is a builder and architect at Counter Hack, a company devoted to building fun and engaging challenges that educate and evaluate information security professionals. Armed with a profound fascination with how things are built, Evan has spent the past 20 years working on the... Read More →


Wednesday June 5, 2024 2:00pm - 2:50pm EDT
Ballroom C/D
 
Filter sessions
Apply filters to sessions.