Thursday, May 8, 2014 5 years ago 08:30 - 13:30
MWR invites you to attend our Cyber Defence Briefing which will inform and update you on the threats organizations are faced with. We will look at the current and emerging threats, how adversaries can gain privileged access to your networks to exfiltrate data and how most leading companies are structuring their defence programmes.
Presentations will include:
Current and Emerging Threats – Exploring the latest trends in cyber security from the revelations of US surveillance by the NSA to advanced new malware developed by nation states used in cyber-espionage.
The cyber security landscape has changed; new threats are emerging using advanced techniques and tactics to infiltrate and attack organizations across the globe. This talk will additionally explore the themes of control, trust and power on the internet and the roles these have played in defining the information society we live in.
Network Infiltration Tactics – Exploring techniques and tactics employed by threat actors that have changed and adapted to new technologies and businesses.
With the increase in adequate perimeter security controls, organizations need to shift their focus deeper into the network to prevent successful breaches. This talk will be a technical discussion on how a real world attacks are conducted and how a cyber-espionage campaign can combine multiple attack vectors to gain a foothold on your sensitive assets. Understanding how these attacks are performed are key to developing an effective defensive strategy.
Phish’d – How you can protect your organisation against Phishing Attacks
Phishing is a key entry vector for many APT attacks. During this presentation MWR will demonstrate the custom platform built and designed to test organizations phishing defences and user awareness. Phish’d specifically allows phishing campaigns to be simulated, user behaviour tracked and key failings in user awareness to be measured and improved over a period of time.
You Don’t Know What You’ve Got Till it’s Gone – Detecting and preventing data exfiltration by advanced attackers
Nation state sponsored attackers pose a serious threat as few organizations have the controls necessary to detect or deter advanced attackers. After gaining access to a network, most commonly through spear phishing, attackers will seek out sensitive information and then exfiltrate it to their systems. This talk will cover the tactics advanced attackers use for data exfiltration and give an overview of the controls that will give your organization the greatest number of chances to detect attackers before it’s too late.
Adaptive Defence Programmes – An overview of core principles required to defend against advanced threats and cybercrime attacks.
This key presentation gives an overview of the core principles needed to defend against APT and advanced cyber crime attacks. Importantly it will look at why most of the current solutions fail to defend adequately unless implemented with a clear understanding of attack methods. This presentation uses multiple examples from current defence programmes to underline the substantial method and structure required to correctly align the layers of controls, to mitigate the true risk posed by sophisticated threat actors.