ITWeb Security Summit 2014 - Johannesburg

Tuesday, May 27, 2014 5 years ago ,

Join Jon Butler, Nils and Matteo Michelini as they talk mPOS security and Cyber Risk.

We are proud sponsors of this years 9th annual ITWeb Security Summit taking place on the 27th & 28th May at Sandton Convention Centre, Johannesburg.

The summit promises to bring together international and local security professionals, practitioners, industry experts and analysts to share experiences, acquire knowledge and gain an understanding of the key tools, techniques and strategies needed to safeguard organisations’ most valuable asset – information.

3 of our team have been asked to present at the security summit, more details on their discussion topics can be found below.

Current state of the art and future challenges to detect and mitigate cyber risks – Matteo Michelini

Mass-malware, targeted attacks, advanced persistent threats, state-sponsored attacks, cybercrime…the threat landscape is rapidly changing and companies are facing big challenges to align their security operations strategies in order to mitigate cyber risks.

The session will cover:

  • Challenges in building an internal incident response team – the drivers to develop an internal response capacity and how to shape it correctly.
  • How to shape threat intelligence to meet the business requirements and retrieve meaningful information to drive the development of attack detection and response capabilities.
  • How incident response has to evolve to ensure effectiveness against targeted and state-sponsored attacks.
  • An overview of advanced threats and how they are evolving.
  • A case study that will cover most of the above areas will be presented to show how to address common mistakes and misunderstandings while developing the Incident Response capacity.

Mission: mPOSible Security vulnerabilities in the mobile Point-of-Sale device market – Jon Butler & Nils

Mobile Point-of-Sale (mPOS) devices represent the next step in bringing the processing of card payments to individuals and small businesses.

Typically, these devices are used alongside tablets and smart phones to process card transactions. However, with the questionable state of mobile device security, how do mPOS devices fare in keeping sensitive customer data safe?

This talk will provide a comprehensive overview of the security of the current mPOS device market and detail the approach taken by MWR when assessing these devices. We will demonstrate several of the vulnerabilities found during this research – these will show how an attacker can completely undermine the security of the majority of the devices on the market today.

Check out the ITWeb Security Summit Website for a closer look at the agenda and more.



Accreditations & Certificates

MWR is an accredited member of The Cyber Security Incident Response Scheme (CSIR) approved by CREST (Council of Registered Ethical Security Testers).
MWR is certified under the Cyber Incident Response (CIR) scheme to deal with sophisticated targeted attacks against networks of national significance.
We are certified to comply with ISO 9001 and 14001 in the UK, internationally accepted standards that outline how to put an effective quality and environmental management systems in place.
MWR is certified to comply with ISO 27001 to help ensure our client information is managed securely.
As an Approved Scanning Vendor MWR is approved by PCI SSC to conduct external vulnerability scanning services to PCI DSS Requirement 11.2.2.
We are members of the Council of Registered Ethical Security Testers (CREST), an organisation serving the needs of the information security sector.
MWR is a supplier to the Crown Commercial Service (CCS), which provides commercial and procurement services to the UK public sector.
MWR is a Qualified Security Assessor, meaning we have been qualified by PCI to validate other organisation's adherence to PCI DSS.
As members of CHECK we are measured against high standards set by NCSC for the services we provide to Her Majesty's Government.
MWR’s consultants hold Certified Simulated Attack Manager (CCSAM) and Certified Simulated Attack Specialist (CCSAS) qualifications and are authorized by CREST to perform STAR penetration testing services.