Battle of Midway / Your strategy to Cloud Security: Using Battle of Midway board game to help build a better Cloud defense model. How Cloud host instance forensic acquisition presents certain challenges to your forensics teams. Talk about how traditional forensic methods are not effective in the cloud. Discussion on process and infrastructure required to do this level of inspection.
By the end of this talk you will be able to apply these strategies to activities such as Threat Hunting.
We do not guarantee you will be a better Battle of Midway game player but you will walk away with a Cloud defense strategy.
Michael Mimo, Copyright Clearance Center, Sr. Director of Information Technology
Please join Towerwall Inc and MassBay Community College for the 8th Annual Information Security Summit!
Don’t miss this annual regional event! Register today! Tickets: $99
The Information Security Summit is a regional event with the goal of giving participants from New England an update on the latest developments, trends, and status in information security. With the growing popularity of disruptive technologies, including mobility and cloud computing, social networking, and big data analytics, the accompanying data security and privacy issues become fundamental concerns.
Attendees of this event will earn 4 CPE credits.
2020 KEYNOTE SPEAKER: Diana Kelley, Cybersecurity Field CTO, Microsoft
Presentation Topic: Shifting Sands — Shoring up Cyber-defense in a Rapidly Changing Threat Landscape
The security threat landscape is constantly evolving, and Microsoft has deep data insights from the 8 trillion security signals that we analyze every day to over a decade tracking and analyzing software vulnerabilities, exploits, malware, unwanted software, and attacker group methods and tactics via the Security Intelligence Report.
Attackers use a variety of dirty tricks, both new (coin-mining) and old (phishing), in their ongoing quest to steal data and resources from customers and organizations. Hybrid attacks, like the Ursnif campaign, living off the land attacks (Astraroth) and blended social and technical approaches. As defenders got smarter against ransomware attackers pivoted to using ransomware for destructive and distraction purposes.
In this session we’ll discuss the latest threat intell insights and provide recommendations for controls and strategies organizations can put in place to help protect and defend against the shifting sands of emerging threats.
Stay tuned — breakout session topics, speaker lineup, and more Summit 2020 details to come as we grow closer to the event!