Loading Events

How to Discover & Mitigate APTs in Enterprise Networks

Home » Events » How to Discover & Mitigate APTs in Enterprise Networks

Sponsor

Interested in getting your message in front of a targeted audience? Click on the link to explore sponsorship opportunities.

Details

Date and Time

September 24 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Organizer

Candice Benson

Sponsorship Contact

 

Send an email to

Overview

This session is a high-level overview of the tools, tactics, thinking and analytical skills that are needed to discover, isolate and eliminate Advanced Persistent Threats (APT) in enterprise network environments. A focus of this session will be how to discover brand new APT malware when the existence of such malware is not known or suspected and when the malware is not detected by anti-virus software, Intrusion Detection Systems (IDS) and other traditional defenses.

Moderator

Jorge Orchilles – Chief Technology Officer, SCYTHE

Jorge Orchilles is the Chief Technology Officer of SCYTHE and co-creator of the C2 Matrix project. He is a SANS Certified Instructor and the author of Security 564: Red Team Exercises and Adversary Emulation. He was a founding member of MITRE Engenuity Center of Threat-Informed Defense. He is a Fellow at the Information Systems Security Association (ISSA) and National Security Institute. Prior, Jorge led the offensive security team at Citi for over 10 years. He also co-authored Common Vulnerability Scoring System (CVSS)and A Framework for the Regulatory Use of Penetration Testing in the Financial Services Industry, and author of Microsoft Windows 7 Administrator’s Reference. Jorge holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science. Jorge speaks English, Spanish, and Portuguese, in decreasing levels of fluency. When he’s not hacking, teaching, or writing, you’ll find him watching and playing soccer.

See Jorge Orchilles‘s full profile.

Speaker/s

Kevin Noble – Managing Director, Ankura

Kevin Noble is a Managing Director at Ankura and has experience leading intelligence driven security operations through advances in architecture and data sciences to greatly improve threat detection. Kevin’s current objective is to bind Ankura’s cyber practice of highly cultivated incident response capability with the Managed Detection and Response service. Prior to joining Ankura, Kevin led UnitedLex’s Managed Detection and Response service, a security operations group, which was acquired by Ankura in 2020.

See Kevin Noble‘s full profile.

Olaf Hartong – Defensive Specialist and security researcher, FalconForce

Olaf Hartong is a Defensive Specialist and security researcher at FalconForce. He specialises in understanding the attacker tradecraft and thereby improving detection. He has a varied background in blue and purple team operations, network engineering, and security transformation projects. Olaf has presented at many industry conferences including Black Hat, DEF CON, DerbyCon, Splunk .conf, FIRST, MITRE ATT&CKcon, and various other conferences. Olaf is the author of various tools including ThreatHunting for Splunk, ATTACKdatamap and Sysmon-modular. He maintains a blog at https://olafhartong.nl

See Olaf Hartong‘s full profile.

Scroll to Top