Enhancing Resilience Through Effective Planning, Detection, and Response

25 January 2022 | Free CS Hub Online Event 

Agenda Day 1: 25th January 2022

8:00 - 8:45 How Hackers Hack: Attacker Methodology & Lifecycle

Jeremiah Roe - Solutions Architect, Synack, Inc.

In this deep dive discussion, Synack Solutions Architect and Red Team Expert, Jeremiah Roe takes a practical approach to the attacker lifecycle. He walks through each of the 7 steps of the kill chain, from Reconnaissance to Actions on Objectives, providing live demonstrations and tools. 

This session will address:

  1. How the adversary applies the kill chain.
  2.  The 7-step process of the attacker lifecycle and methodologies with an in-depth demonstration of the kill chain.
  3. New Exploits (And How to Defend Against Them)
  4. How to Add Rigor to Your Pentesting: Where traditional penetration testing stops and crowdsourced penetration testing probes further.




img

Jeremiah Roe

Solutions Architect
Synack, Inc.

9:00 - 9:45 Cybersecurity Certification Scheme to Enhance Trust in Cloud Services Across Europe

Eric Vétillard - Lead Certification Expert, European Union Agency for Cybersecurity (ENISA)

• Outlining the benefit of a single European cloud certification and how best practices can be formed across the cloud supply chain 

• Assessing how to strike the right balance of a risk-based approach, with flexible solutions and certification schemes designed to avoid being outdated quickly.

• Discussing how can we develop a clear roadmap to allow industry, national authorities and standardisation bodies to prepare in advance

img

Eric Vétillard

Lead Certification Expert
European Union Agency for Cybersecurity (ENISA)

10:00 - 10:45 Executing a Threat-Informed Defense: Cyberspace Operations, MITRE ATT&CK, and The Gray Space of Digital Conflict

Jonathan Reiber - Senior Director, Cybersecurity Strategy and Policy, AttackIQ

The cybersecurity community is evolving from a fortress mentality of “network defense” to a “threat-informed defense” approach. Over the last decade, the U.S. military has been at the forefront in this transition, first in the intelligence-operations bond that developed between analysts and warfighters during the conflicts in Afghanistan and Iraq and against al-Qaeda, and then in cybersecurity. Traditionally in cybersecurity, “blue” team defenders focused their strategies on meeting baseline cybersecurity best-practices: correcting misconfigurations, administering patches, and deploying commercial products. Red teams were smaller and testing occurred periodically and not at the requisite scale to validate the blue team’s defense effectiveness. If blue teams fail to orient towards the most important threats, resources are often wasted; absent effective testing, security controls likely fail. Three lessons emerge from the evolution of threat-informed defense in the U.S. military. It is important to (1) understand the adversary’s approach; (2) identify high-value assets and defense capabilities required to defend them; (3) build tight bonds between teams to focus on known threats and exercise your defenses. A leader also needs to be appointed to manage threat-informed defense across an organization, similar to the dual-hat of the Director of the NSA and Commander, U.S. Cyber Command. In this webinar, participants will discuss lessons-learned from implementing a threat-informed defense strategy in the U.S. Defense Department, public-private combined operations, and the private sector and leave better equipped to effect positive change in their organization. 

This session will address:

·       Understand an adversary’s attack mindset through the lens of a threat-informed defense 

·       Discover the benefits of building collaboration between red and blue teams via a purple teaming

approach to cybersecurity 

·       Identify high-value assets and defense capabilities required to thwart attacks 

·       Get practical information on how to implement these strategies in your own organization in

2022 



img

Jonathan Reiber

Senior Director, Cybersecurity Strategy and Policy
AttackIQ


img

Angela Haun

Executive Director
Oil and Natural Gas Information Sharing and Analysis Center

img

Alfred Lindseth

SVP Technology, Process and Risk Management
Plains All American Pipeline

12:00 - 12:45 Assessing ISA/IEC 62443 Series of Standards to Mitigate Current and Future Security Vulnerabilities

Andre Ristaino - Managing Director, ISA Global Cybersecurity Alliance

ISA created the ISA Global Cybersecurity Alliance advance cybersecurity readiness and awareness in manufacturing and critical infrastructure facilities and processes. The Alliance brings end-user companies, automation and control systems providers, IT infrastructure providers, services providers, system integrators, and other cybersecurity stakeholder organizations together to proactively address growing threats.


The ISA/IEC 62443 series of standards, developed by the ISA99 committee and adopted by the International Electrotechnical Commission (IEC), provides a flexible framework to address and mitigate current and future security vulnerabilities in industrial automation and control systems (IACSs).


This session will address:

• Identifying vulnerabilities in cyber and automation of critical infrastructure 

• How asset owners can integrate OT standards 

• Product security capabilities 


img

Andre Ristaino

Managing Director
ISA Global Cybersecurity Alliance

The Cybersecurity and Infrastructure Security Agency (CISA) works with partners to defend against today’s threats and collaborates to build a more secure and resilient infrastructure for the future. This session will address: 


• How CISA partners with critical infrastructure owners and operators to mitigate risk and increase cyber resilience

• Approaches for increasing the cyber resilience of your most critical business services 

• Insight into national policy and security developments to protect Critical Infrastructure 

• How to partner with CISA to improve cybersecurity, both nationally, and within your community 


img

Deron McElroy

Chief of Cybersecurity
Cybersecurity and Infrastructure Security Agency, Department of Homeland Security

14:00 - 14:45 Assessing Renewable Energy Integration through a Cyber Security Lens

Anuj Dilip Sanghvi - Cybersecurity Researcher, National Renewable Energy Laboratory

This session will address: 

• Supply Chain optimisation 

• Understanding the importance of trust within the supply chain

• Understanding the level of vetting, verification and site acceptance testing 

img

Anuj Dilip Sanghvi

Cybersecurity Researcher
National Renewable Energy Laboratory