HUNTING FOR ADVERSARY ACTIVITY,
THURSDAY FEBRUARY 28, 2019 | Churchill War Rooms
Join us for a Threat Hunting Meetup at the historic Churchill War Rooms in London.
Security Operations Centers must evolve if they hope to hunt for and deal with sophisticated, file-less threats capable of evading standard security measures. Only the right combination of technology, intelligence and people is key to the team’s ability to detect, hunt and eliminate threats and immediately execute a cyber crisis response plan.
In this session, we will delve into the findings of the 2018 Global Threat Report which offers one of the industry's most comprehensive reports on today's most damaging cyberattacks and dangerous adversaries. The highly anticipated report, which is due to be published in mid-February, provides valuable insights into the evolving threat landscape and includes recommendations that will help you be better prepared for the security challenges your organization faces now and in the future.
This event will provide a technical deep dive into the report findings including nation-state adversaries and the tools, tactics and procedures (TTPs) they are employing and the key trends observed by CrowdStrike experts.
WHO SHOULD ATTEND?
This session is suitable for information security decision-makers including CISO, CIO, SOC Manager; mid-level information security management including SOC managers and technical information security practitioners including SOC analysts.
WHAT SHOULD YOU EXPECT?
The content will be technical and educational. The adversary TTPs and threat concepts discussed are generally applicable regardless of chosen technology. You will advance your threat hunting skills and methods to the next level.
CPE credits are available for this workshop.
Have any questions? Simply email firstname.lastname@example.org
Registration is now closed. This event has reached full capacity.
Commences at 8:30am
The Changing Threat Landscape - Jerry Dixon
Strategic highlights from our Global Threat Report
Mind the Gap - Kieran Mongan
Defining cybercrime risk and creating a robust and adaptable security program framework.
Building a Resilient Incident Response Program - David Boda
Building a program that can defend against a breach
Concludes at 10:30am. Followed by refreshments and networking
Please, in order to be able to read our free chapter, put your email in the form below and you'll receive in your inbox our awesome free sample.
ABOUT THE VENUE
This event is held in the secret underground headquarters where Prime Minister Winston Churchill lived and worked during World War II. A tour of this unique venue is possible after the event. For more information, visit the Churchill War Rooms Museum website.
|Welcome and Introductions||09.30|
|The Continued Rise of “Big Game Hunting”
|The Attack Lifecycle and Responding to the Incident
|Combating the Adversary
|Refreshments and Networking
|Registration and breakfast
||08.30 – 09.00
|MISHA GLENNY, author of McMafia will discuss the geo-political and macro-economic trends in cybersecurity along with predictions for the years ahead.||09.00 – 09.45|
|GEORGE KURTZ will discuss recent global attacks and advanced targeted intrusions. Mr Kurtz will also provide insight into the macro cybersecurity trends that are being tracked by CrowdStrike today.
||09.45 – 10.15|
|STEVE BENTON as General Manager of BT Security, Mr. Benton will describe the trends, tactics, techniques and procedures that are routinely deployed against this global telecommunications company and its clients and how he responds to increasing sophisticated cyberattacks.
||10.15 – 10.45
|ERIC SHEEHAN will discuss his experience in defending one of the UK's major airports from cyberattack. Mr. Sheehan will share with his peers the practical insights and lessons learnt in implementing a robust cyber strategy.||10.45 – 11.15
|Q&A Followed by refreshments||11.15 – 11.30