Wednesday, October 16, 2019 09:00 - 20:00 London
Register your interest in attending our next Briefing. It’s taking place on Wednesday, October 16th at IET London: Savoy Place.
At this full-day event, you can expect:
Refreshments and lunch will be provided, and there will be a drinks reception after the event too.
We pride ourselves in being research-led and sharing our findings at our events. All the talks at our Briefing have one thing in common… helping you protect your organization from the most prevalent and advanced cyber threats.
The traditional on-premise, corporate environment is a battlefield well-known to attackers and defenders alike, but 'cloud-first' digital transformations bring new threats, attack vectors, and risks. Though some existing security concepts translate to the cloud, a mindset shift is required to effectively detect and respond to attacks.
This talk considers the fundamental differences between protecting cloud and on-premise environments, detailing the offensive techniques a motivated attacker will utilize to undermine your cloud security. We'll also give guidance on how to improve and continuously validate detection and response capabilities necessary to deliver resilient cloud environments.
Mobile app development has evolved from linear processes to more dynamic models delivering rapid and continuous deployments. Arguably the volume of application updates has rendered traditional security approaches infeasible, with testing unable to keep pace with releases. Security risks becoming an obstacle rather than an enabler.
In this talk we’ll share an alternative approach which incorporates security into a development cycle, giving your organization the confidence to release by default, while establishing a continuous level of assurance across your entire application portfolio, past and present.
There’s no denying botnets – networks of compromised computers – present a risk and a headache to businesses and the general public that has grown with the proliferation of connected devices. The question is, what can we do about them on a larger scale? In a world where we often focus on ourselves and our own organizations, the opportunity to develop solutions benefitting us all can pass us by.
With defending society from cyber-attack being one of our main objectives, our Labs team has undertaken extensive research into botnets, leading to the development of a solution that tracks these devices and their infections, C2, and spam email activities across the globe, in real time. Our Associate Director of Research, James Loureiro, will explain what this means and how that information has allowed us to protect society as a whole.
With the costs of breaches on the rise and ever-increasing prevalence of high impact security incidents across multiple industries; the effectiveness of an organizations response efforts has come more in to the spotlight.
This talk will share experience from real cases against modern threat actors that the MWR Incident Response Team has conducted over the past few years. You’ll see how the attacks unfolded and how the decisions made during the response process directly affected the outcome of the incident.
By the end of the talk, you’ll know how to better prepare your business to respond to incidents in the future and how to prepare for incidents before they occur.
Nowadays many organizations run phishing exercises as part of their security programme, raising awareness of the social engineering technique in a bid to drive down click rates and increase reporting rates. Some characterize phishing as a ‘people problem’, focusing on individual susceptibility perhaps at the expense of other controls necessary to prevent, detect and respond to attacks. No wonder the technique remains effective, with Verizon reporting that phishing played a role in a third of all confirmed breaches last year.
In this talk, we will explain how to step beyond raising awareness towards risk reduction. Adopting the attacker’s perspective allows organizations to identify the attacker actions that precede and follow user interaction, and ultimately develop a broader set of countermeasures that measurably reduce exposure.
BigIP F5 products are used by large corporations and governments worldwide, but they’re not without vulnerabilities. Misinterpretations of dodekalogue - the rules that define TCL language interpretation - can leave it exposed, leaving organizations open to a significant level of compromise.
In this talk, details of the flaws discovered by our security researcher, Christoffer Jerkeby, will be shared. Advice, guidance, and tooling will be given on how to identify vulnerabilities, qualify their exploitability and quantify the impact. And we’ll cover how to effectively remediate them too.
There will also be an exclusive demonstration of the end-to-end attack chain that illustrates the devastating impact; if the vulnerabilities are leveraged by an attacker.