Many security experts believe that properly deployed honeynets deliver enormous value for a modicum of up-front effort. This is a cyber-defense product that helps thwart attempts by attackers to gain information about a private network. They allow you to cull invaluable information that any security defender will find useful. When properly implemented and fine-tuned, a honeynet is incredibly low noise and high value. Come learn how honeynets work and best practices for implementing them at this session.
This session will cover advanced user and entity behavior analytics (UEBA) solutions and best practices for implementing policies and techniques to augment your security operating model so that you can automate response to suspicious activity in real-time and preempt malicious threats. You will learn how you can use UEBA to further reduce your attack surface, reduce your ongoing risk, improve security team efficiency, and help prevent data loss.
Blockchain technology backs up Bitcoin, but there is huge interest in the financial world in making distributed ledger technology work for them. The blockchain is now being hyped as the solution to inefficient information processing systems or where immutable record keeping is needed. However most people do not understand how the technology works, how secure it really is, how it might be applied to real world applications, or what potential problems there are with the technology. Come to this session and get an overview on blockchain security.
Design Thinking is a methodology used by designers to solve complex problems, and find desirable solutions. A design mindset is not problem-focused, it’s solution focused and action oriented towards creating a preferred future. Design Thinking draws upon logic, imagination, intuition, and systemic reasoning, to explore possibilities of what could be—and to create desired outcomes that benefit the user and member. Structured Innovation and Design Thinking are more than just catch phrases. They are a foundation for solutions that succeed, attract budget, and build culture. Mark Berman will spend the hour facilitating an active conversation to shine light on the risk and opportunities the cloud brings to secure the credit union applying new thinking to the increasingly complex world of CyberSecurity.
Finding exposures that can lead to compromise is easier the fixing them. Fixing requires prioritization, alignment with business priorities, and the ability to measure progress in risk reduction. Being great at defense is no longer sufficient, as targeted attacks can bypass even the best defense. We also need to be great at detecting and responding to attacks. In many cases, we need to be effective with limited resources and limited visibility. Eric will share recent findings from security research and penetration testing, talk about trends in IT that make our lives more convenient and riskier, and provide actionable information on how to mitigate, fix and respond in the complex environment we find ourselves in.