Monday, March 23
10:00 AM - 11:00 AM
Steve Ocepek, Manager, Incident Response, SecureState
Kerstyn Clover, Staff Consultant, SecureState
•Better understand the most prominent cyber-attack vectors
•Learn about Indicators of Compromise (IOCs) and how they can be used to detect attacks
•Ideas for how to better protect the organization against these attacks
•Knowledge of various resources, including logs and packet traces, that can be used for detection and prevention
11:15 AM – 12:15 PM
Eric Smith, Senior Partner and Principal Security Consultant, LARES Consulting
Josh Perrymon, Senior Adversarial Engineer, LARES Consulting
•Case studies on badge access control systems: inherent flaws in their design and demonstration of direct and blended attacks against them
•How flaws lead to facility and system compromise, even against the most secure access control systems and card types
•A look at custom built tools
•Interactive discussion of current mitigation strategies and industry needs to thwart attacks
1:30 PM – 2:30 PM
Ryan Trost, Sr. Director, Cyber Intelligence Solutions Architect, SRA International
Jon DiMaggio, Director of Cyber Intelligence, IntelThreat
•Powerful tradecraft tricks to remain anonymous while hunting adversary breadcrumbs through open source intelligence efforts
•Why operationalizing threat intelligence is just as important as detection efforts
•Open source intelligence techniques used to track and identify new adversary infrastructure and personas
•Build an effective adversary persona to better understand their targeting mission
•Create a cyber-threat intelligence foundation to build upon
3:15 PM – 4:15 PM
John Buckley, MEng CEng CEH CISSP, Founder & CEO, Secure Direction Ltd.
•An appreciation of how highly secure hardware appliances can protect your organization’s cryptographic keys
•Challenges and weaknesses inherent in traditional methods for protecting keys using virtual cloud infrastructure
•Commoditization of cryptographic services and how highly secure appliances can be rented in the public cloud
•Demo of key concepts of an end-to-end deployment of a cloud HSM service
Tuesday, March 24
8:30 AM – 9:45 AM
Francis Brown, CISA, CISSP, MCSE, Managing Partner, Bishop Fox
Rob Ragan, Senior Associate, Bishop Fox
•Overview of the best RFID hacking tools available
•Stealing RFID proximity badge info from unsuspecting passers-by
•Replaying RFID badge info and creating fake cloned cards
•Brute-forcing higher privileged badge numbers to gain data center access
•Attacking badge readers and controllers directly
•Planting PwnPlugs, Raspberry Pis, and similar devices as physical backdoors to maintain internal network access
•Creating custom RFID hacking tools using the Arduino
•Defending yourself from RFID hacking threats
10:00 AM – 11:00 AM
Rob “Mubix” Fuller, Senior Red Teamer
•Free (or mostly free), innovative, and highly effective protections, mitigation, or detection mechanisms that actually work
•Methods, tactics, and software setups that will significantly decrease intrusions
•Learn the concept of "Evil Canaries"
•Changes you can deploy or start deploying immediately
2:00 PM – 3:00 PM
Dr. Anton Chuvakin, Research Director, Gartner for Technical Professionals (GTP)
•How to use network forensics tools (NFT) for detecting and investigating threats
•How to use endpoint detection and response tools (ETDR) for detecting and investigating threats
•Key processes related to these tools
3:30 PM – 4:30 PM
Gus Hunt, Hunt Technologies, LLC & eSentire, Inc.
•Learn how and why today’s attack types are more devastating than ever before
•See real-world metrics and case studies pulled from nearly 350 financial organizations
•Identify how to safely move major computing workloads to commercial cloud infrastructure
•Learn to create a security-as-a-service platform that supports increasingly demanding cyber security requirements
Wednesday, March 25
9:45 AM – 10:45 AM
Rich Thompson, Director, Professional Services, Guidance Software
•Live demo of an attack on a simulated Point of Sale network
•Learn a method to identify unusual activity taking place on these devices
•Forensic tools that help unearth information about an attack, its purpose, and its scope.
•Proven techniques to secure POS devices
•Types of technology most suited for securing POS systems
11:00 AM – 12:00 PM
Ryan Lackey, Product Engineer, CloudFlare
•Hear how mobile and SaaS are expanding the scope of API security
•Learn which technologies can provide visibility and control to third-party APIs
•Understand unique API security requirements and mitigation techniques
•Expose hidden APIs on mobile, cloud, and Internet of Things infrastructure
•Take-away criteria to evaluate before your next buying decision