Upload
tripwire
View
1.626
Download
1
Embed Size (px)
Citation preview
FROM
2016 BROUGHT TO YOU BY
industry insights
PAUL EDON
BRIEFING THE GENERAL: 10
QUICK TIPS FOR IMPROVING
YOUR BOARD’S CYBER LITERACY
Many boards can improve the knowledge, awareness and confidence to connect security to the business.
Edon shared tips on how to effectively interact with the board to bring security issues front and center.
@ T R I P W I R E I N C / # I N F O S E C 1 6
NEXT-GEN CISO: HOW TO BE A SUCCESSFUL SECURITY LEADER OF THE FUTURE
This session featuring industry-leading CISOs discussed the evolution of this role, including the
critical skills and qualities of an effective, next-generation CISO.
@ T R I P W I R E I N C / # I N F O S E C 1 6
PAUL EDON
IS SECURITY YOUR
COMPETITIVE
ADVANTAGE?
@ T H O M L A N G F O R D / # I N F O S E C 1 6
Langford discussed how organisations can
differentiate themselves by ensuring employees are fully aware of what security means to the
company, and creating a security-focused culture.
PAUL EDON
CHASING RAINBOWS – FORGETTING ABOUT
THE RAIN
@ Q U E N T Y N B L O G / # I N F O S E C 1 6
Taylor highlighted some of the recent headline-grabbing stories, and
what organisations can do to proactively address the potential of losing valuable information.
PAUL EDON
COMPLETE DEFENSE:
GROUND TROOPS WITH
AIR SUPPORT
@ T R I P W I R E I N C / # I N F O S E C 1 6
Ebrahimi discussed how to eliminate “blind spots”
from network to endpoint, respond faster to incidents through
tighter integration, and create stronger security through partnerships.
PAUL EDON
CONNECTING SECURITY TO THE BUSINESS
@ A M I S E C U R E D / # I N F O S E C 1 6
In this session, Singh created a mind map of Endpoint Detection and
Response (EDR), including the critical components of threat
intelligence, vulnerability management, software discovery and more.
PAUL EDON
CRYPTOGRAPHY, QUANTAM
COMPUTING & THE FUTURE
OF CYBER SECURITY
CONTROLS
@ J A Y A B A L O O / # I N F O S E C 1 6
Jaya discussed the evolution of cyber
security controls against a background of
increasingly complex risk and vulnerabilities, multiple attack vectors and sophisticated threat
actors.
DATA BREACH SURVIVOR: REAL WORLD TRIPS, TRICKS
& ADVICE
Edon shared practical strategies security
professionals can utilise to effectively recover
from security incidents, as well as key
information that must be communicated to
business stakeholders.
@ T R I P W I R E I N C / # I N F O S E C 1 6
ENDPOINT DETECTION
AND RESPONSE
FOR DUMMIES
@ T R I P W I R E I N C / # I N F O S E C 1 6
In this session, Hermosillo provided valuable tips and
advice on how to approach the basics for building a strong EDR
platform that aligns with your organisation’s security program.
HEADLINES, BREACHES & THE
BOARD: YOU’VE GOT THEIR
ATTENTION – NOW WHAT?
@ T R I P W I R E I N C / # I N F O S E C 1 6
In this panel discussion, industry experts gave
real-world insight into how to engage senior management in a way that focuses on the most important aspects of
cybersecurity.
ICS SECURITY: PROTECTING YOUR CRITICAL
INFRASTRUCTURE
Davies described the growing threat
landscape of industrial control system
environments, as well as approaches and
strategies for protecting mission-critical systems.
@ S T E P H E N F D A V I E S / # I N F O S E C 1 6
PAUL EDON
KNOWING THE UNKOWN:
MONITOR YOUR
ENDPOINTS FOR ENEMIES
@ M R T R A V / # I N F O S E C 1 6
Although we can prepare for zero-days, new
tactics or techniques are, by definition, “unknown
unknowns.” In this presentation, Smith
shined a light on how to bring these unknown
attacks to light.
PAUL EDON
INCREASING INSIGHT: IMPROVING INCIDENT
RESPONSE CAPABILITIES WITH DYNAMIC FILE ANALYSIS
@ T R I P W I R E I N C / # I N F O S E C 1 6
Wood demonstrated how sandboxing capabilities allow
automatic detection of zero-day threats and give unprecedented
access to global threat intelligence for faster incident response.
UNDERSTANDING & AVOIDING
THE THREAT OF
RANSOMWARE
Ransomware is increasingly targeting organisations of all sizes, and many
businesses have no strategy for defence or
recovery. Wood highlighted the 7 key defenences to adopt.
@ P E T E R W O O D X / # I N F O S E C 1 6
PAUL EDON
INTEGRATING BREACH DETECTION & ENDPOINT
PROTECTION TO WIN THE CYBER WAR
@ T R I P W I R E I N C / # I N F O S E C 1 6
In this case study, Moles explained how a
technology integration of Tripwire and Lastline
allowed an organisation to adequately detect and
defend against new threats.
SECURE CODING &
DEVELOPMENT: EMBEDDING
APPLICATION SECURITY INTO
BUSINESS PROCESSES
@ T R I P W I R E I N C / # I N F O S E C 1 6
Panelists discussed the reasons for the
disconnect between security & development, as well as the steps that can be taken to drive a
secure application development process.
FOR THE LATEST SECURITY NEWS, TRENDS AND INSIGHTS, VISIT US AT:
TRIPWIRE.COM/BLOG
GRAPHIC RECORDINGS BY: MEETING MAGIC @MEETINGMAGICLTD