Focus on Security Virtual Event
October 8th, 2021
”Protecting Your Organization from Ransomware”
Presented by: Mark Finlayson | Sr. Security Advisor | Candoris
Ransomware attacks have significantly risen over the past five years. In the fall of 2019, the tactics, techniques, and procedures that ransomware threat actors employ have become increasingly hostile in an effort to meet their goals.
To make matters worse, the pandemic exponentially increased the attack surface of most companies. Learn how to defend your organization from the crippling effects of ransomware, how to react if your network becomes compromised, and what to do to recover if ransomware takes hold of your network and data.
How to protect DNS, and how to use DNS to improve your existing layered security approach.
Presented by Tom Grimes, Infoblox
Infoblox will show why it's critical to protect your DNS infrastructure, how to protect DNS, and how to use DNS to improve your existing layered security approach. The training will address the most common challenges organizations face to mitigate DNS security threats.
Attendees will learn how modern DNS security threats circumvent typical security architecture and why DNS-specific security controls are needed today. Infoblox approaches these issues with Cloud and Premise-based technology that uses Reputation, Signature, and Behavior to defend against zero-day DNS exploits.
In addition, the demonstrations will cover:
|
Social Engineering: Thinking Like a Hacker
Cindy Casey Gwynedd Mercy University
Professor of Practice
Program Coordinator
Computer Information Science
Computational Sciences
Cindy Casey is a Professor of Practice, Program Coordinator of Computer Information Science, and director of Computational Sciences at Gwynedd Mercy University. Cindy earned her MS in Economic Crime Forensics as well as a graduate certificate in Cybersecurity from La Salle University. In addition to a graduate certificate in Digital Forensics from DeSales University and a BS in Computing Security and Technology from Drexel University, Cindy is currently a doctoral student pursuing a degree in Artificial Intelligence at Capitol Technology University in Washington, DC. Selected conference proceedings and journal publications include the IEEE Wireless Telecommunications Symposium in Europe, the Conference on Digital Forensics, Security, and Law (ADFSL), and the International Conference on Digital Forensics and Cyber Crime.
Social engineering can be summarized as the art of manipulation. By convincing an individual to divulge sensitive information or permit access to a restricted area, the criminal uses an unsuspecting participant to achieve his goal. Hackers use social engineering for reconnaissance or to covertly gather information about their target. Kevin Mitnick, the infamous hacker and one time FBI fugitive, asserts that humans are the biggest threat to security. So, if humans are the Achilles’ heel or weakest link in security, it is only logical that when trying to gather information, taking advantage of unsuspecting humans is the best place to begin. Through techniques like shoulder surfing, bad actors can learn a great deal about their victim. However, what if there were even easier ways for hackers to obtain sensitive information? When targeting newer technologies, the weakest link may no longer be humans per se, but rather how humans interact with these new technologies. This presentation will discuss what social engineering is and how to think like a hacker. Are you or your company unknowingly giving sensitive information way?
How To Conduct An Information Security Risk Assessment
Presented by Matt Frederickson
Understanding how an information security risk assessment works can provide insight into where your organization's current weaknesses are. While it is always a good idea to bring in a fresh set of eyes via a third party, knowing how to do one yourself will go a long way with shrinking your risk surface.
Cybersecurity Skills Gap
Presented by Rob Bruder
Rob Bruder is the Deputy Chief Information Security Officer for the State of New Jersey and the Chief Operations Officer of the NJCCIC where he provides recommendations and improvements intended to enhance the State's cyber security posture. Rob is an instructor for Bucks County Community College's IT academy where he teaches Redhat Enterprise Linux and Intro to Computer Forensics courses.
Scott N. Schober, President/CEO
Berkeley Varitronics Systems, Inc.
Scott Schober is the President and CEO of Berkeley Varitronics Systems, a 49-year-old, New Jersey-based provider of advanced, world-class wireless test and security solutions. He is the author of three best-selling security books: Hacked Again, Cybersecurity is Everybody’s Business, and Senior Cyber. Scott is a highly sought-after author and expert for live security events, media appearances, and commentary on the topics of ransomware, wireless threats, drone surveillance and hacking, cybersecurity for consumers, and small business. He is often seen on ABC News, Bloomberg TV, Al Jazeera America, CBS This Morning News, CNN, Fox Business, and many more networks. Scott also serves as the CSO and Chief Media Commentator for Cybersecurity Ventures and sits on several cyber advisory boards for various companies.
Resolving Ransomware
How to spot a ‘phishing’ attack
Security is achieved in layers…
Enable two-factor authentication
Do not use public Wi-Fi networks
Importance of proper regular data backups
Install a secure VPN
Who goes there? Threat Hunting on your home network
Scott Lynch
When Scott left active duty he joined a P-3 squadron to enjoy the benefits of being an aviator while working full time at a Satellite Communications company based out of Philadelphia. Part of the lure of coming to Universal Space Network was the founder, Charles "Pete" Conrad, Apollo 12 Astronaut and third man to walk on the moon. The enticement of getting to continue to travel the world working at remote satellite ground stations whilst being a part of the space program marked the beginning of a 20-year career working in everything from ground station antennas, satellite operations, to mission integration and launch support operations.
This led to working in IT security permanently over 10 years ago. Since coming on board at Universal Space Network, the company was acquired by its new patent Swedish Space Corporation where Scott spends his time working as the global Security Operations manager for a truly global satellite communications network. Scott manages the CSIRT team and SOC for SSC in support of our global customer base from NASA, ESA, DoD and beyond. Scott has also been a Cisco Instructor for over 10 years teaching the next generation of network engineers. When Scott is not traveling the world for SSC he loves to spend time with his family.
Abstract: Ever wondered what is happening on your home network? What happens on your network when your asleep but your devices are still online? In this talk we will look at ways to utilize Open Source Software (OSS) to build, deploy and monitor your home network utilizing Network Security Monitoring (NSM) tools like Security Onion. Security Onion is an OSS tool that when deployed can monitor and collect network packets and intrusion data and display it in human readable format in a Security Incident and Event Management (SIEM) platform graphical user interface. We will discuss how you can use this to get visibility into your networks traffic, internal and external threats and how you could scale this to support enterprise networks at work.
The IT Academy at Bucks County Community College offers affordable training for advanced technology certification programs, as well as other technology courses, with knowledgeable instructors that bring real-world experience into the classroom. |