Cyber Defence Briefing - SA

Thursday, May 8, 2014 3 years ago 08:30 - 13:30

MWR's Cyber Defence Briefing is a session to inform and update you on the current and developing threats organizations are faced with.

Calendar

This MWR Briefing has past, but you can sign up to be notified of future events, or register for another of our upcoming events by visiting our MWR Briefings page.

MWR invites you to attend our Cyber Defence Briefing which will inform and update you on the threats organizations are faced with. We will look at the current and emerging threats, how adversaries can gain privileged access to your networks to exfiltrate data and how most leading companies are structuring their defence programmes.

Presentations will include:

Current and Emerging Threats – Exploring the latest trends in cyber security from the revelations of US surveillance by the NSA to advanced new malware developed by nation states used in cyber-espionage.

The cyber security landscape has changed; new threats are emerging using advanced techniques and tactics to infiltrate and attack organizations across the globe. This talk will additionally explore the themes of control, trust and power on the internet and the roles these have played in defining the information society we live in.

Network Infiltration Tactics – Exploring techniques and tactics employed by threat actors that have changed and adapted to new technologies and businesses.

With the increase in adequate perimeter security controls, organizations need to shift their focus deeper into the network to prevent successful breaches. This talk will be a technical discussion on how a real world attacks are conducted and how a cyber-espionage campaign can combine multiple attack vectors to gain a foothold on your sensitive assets. Understanding how these attacks are performed are key to developing an effective defensive strategy.

Phish’d – How you can protect your organisation against Phishing Attacks

Phishing is a key entry vector for many APT attacks. During this presentation MWR will demonstrate the custom platform built and designed to test organizations phishing defences and user awareness. Phish’d specifically allows phishing campaigns to be simulated, user behaviour tracked and key failings in user awareness to be measured and improved over a period of time.

You Don’t Know What You’ve Got Till it’s Gone – Detecting and preventing data exfiltration by advanced attackers

Nation state sponsored attackers pose a serious threat as few organizations have the controls necessary to detect or deter advanced attackers. After gaining access to a network, most commonly through spear phishing, attackers will seek out sensitive information and then exfiltrate it to their systems. This talk will cover the tactics advanced attackers use for data exfiltration and give an overview of the controls that will give your organization the greatest number of chances to detect attackers before it’s too late.

Adaptive Defence Programmes – An overview of core principles required to defend against advanced threats and cybercrime attacks.

This key presentation gives an overview of the core principles needed to defend against APT and advanced cyber crime attacks. Importantly it will look at why most of the current solutions fail to defend adequately unless implemented with a clear understanding of attack methods. This presentation uses multiple examples from current defence programmes to underline the substantial method and structure required to correctly align the layers of controls, to mitigate the true risk posed by sophisticated threat actors.

 

What is the MWR Briefing?

MWR Briefings challenge perceptions and offer insights into the fast-paced arena of information security.

 

+ learn more

Home featured
Accreditations

As members of CHECK we are measured against high standards set by CESG for the services we provide to Her Majesty's Government.
We are certified in the ISO 9001 quality management system (QMS) in the UK, ensuring reliable delivery of our products and services.
We are certified to comply with ISO 14001 in the UK, an internationally accepted standard that outlines how to put an effective environmental management system in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR are approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.