Looking Ahead, Cyber Security for 2016 and Beyond
TOPIC: Explaining the threat landscape - Twenty Observation in Twenty Minutes
The threat landscapes continue to change and evolve. Perhaps nothing has evolved more than Ransomware, a threat first seen in 2005 that has come to dominate the threat landscape. This presentation will make twenty observations on the current threat landscape. Mostly based on data collected by Symantec into its Internet Security Threat Report (ISTR), with a special emphasis on current research on Ransomware, a picture will emerge of the threats we face today and what to do about them.
TOPIC: Vendor as a Vector
In a significant number of reported breaches, attackers continually wage successful campaigns that target and then leverage suppliers or third parties as vectors. This talk will explore a few of these breaches in depth, as well as best practices and processes to mitigate the threats. Although many of the best practices will no doubt be familiar to a seasoned security practitioner, some elements involve teaming with other parts of the business. We will help you to identify these internal partners while discussing how to build a successful vendor cyber risk management program. The points explored in this talk should prove extremely valuable to businesses of all sizes and their service providers alike.
Topic: DDoS at the Edge
-- Adventures in Defending 7% of the Internet
DDoS attacks and other security threats are not a matter of if, but a matter of when. Cyber extortion schemes like DDoS-for-Bitcoin ransoms are becoming increasingly popular, and leave businesses with the difficult decision of whether to give in to attackers’ demands or risk becoming inaccessible during peak shopping days. This talk will examine a real case in which a Fortune 500 client faced a massive Bitcoin extortion attack during their peak online shopping season and how their web properties were protected.