In this deep dive discussion, Synack Solutions Architect and Red Team Expert, Jeremiah Roe takes a practical approach to the attacker lifecycle. He walks through each of the 7 steps of the kill chain, from Reconnaissance to Actions on Objectives, providing live demonstrations and tools.
This session will address:
• Outlining the benefit of a single European cloud certification and how best practices can be formed across the cloud supply chain
• Assessing how to strike the right balance of a risk-based approach, with flexible solutions and certification schemes designed to avoid being outdated quickly.
• Discussing how can we develop a clear roadmap to allow industry, national authorities and standardisation bodies to prepare in advance
The cybersecurity community is evolving from a fortress mentality of “network defense” to a “threat-informed defense” approach. Over the last decade, the U.S. military has been at the forefront in this transition, first in the intelligence-operations bond that developed between analysts and warfighters during the conflicts in Afghanistan and Iraq and against al-Qaeda, and then in cybersecurity. Traditionally in cybersecurity, “blue” team defenders focused their strategies on meeting baseline cybersecurity best-practices: correcting misconfigurations, administering patches, and deploying commercial products. Red teams were smaller and testing occurred periodically and not at the requisite scale to validate the blue team’s defense effectiveness. If blue teams fail to orient towards the most important threats, resources are often wasted; absent effective testing, security controls likely fail. Three lessons emerge from the evolution of threat-informed defense in the U.S. military. It is important to (1) understand the adversary’s approach; (2) identify high-value assets and defense capabilities required to defend them; (3) build tight bonds between teams to focus on known threats and exercise your defenses. A leader also needs to be appointed to manage threat-informed defense across an organization, similar to the dual-hat of the Director of the NSA and Commander, U.S. Cyber Command. In this webinar, participants will discuss lessons-learned from implementing a threat-informed defense strategy in the U.S. Defense Department, public-private combined operations, and the private sector and leave better equipped to effect positive change in their organization.
This session will address:
· Understand an adversary’s attack mindset through the lens of a threat-informed defense
· Discover the benefits of building collaboration between red and blue teams via a purple teaming
approach to cybersecurity
· Identify high-value assets and defense capabilities required to thwart attacks
· Get practical information on how to implement these strategies in your own organization in
2022
ISA created the ISA Global Cybersecurity Alliance advance cybersecurity readiness and awareness in manufacturing and critical infrastructure facilities and processes. The Alliance brings end-user companies, automation and control systems providers, IT infrastructure providers, services providers, system integrators, and other cybersecurity stakeholder organizations together to proactively address growing threats.
The ISA/IEC 62443 series of standards, developed by the ISA99 committee and adopted by the International Electrotechnical Commission (IEC), provides a flexible framework to address and mitigate current and future security vulnerabilities in industrial automation and control systems (IACSs).
This session will address:
• Identifying vulnerabilities in cyber and automation of critical infrastructure
• How asset owners can integrate OT standards
• Product security capabilities
The Cybersecurity and Infrastructure Security Agency (CISA) works with partners to defend against today’s threats and collaborates to build a more secure and resilient infrastructure for the future. This session will address:
• How CISA partners with critical infrastructure owners and operators to mitigate risk and increase cyber resilience
• Approaches for increasing the cyber resilience of your most critical business services
• Insight into national policy and security developments to protect Critical Infrastructure
• How to partner with CISA to improve cybersecurity, both nationally, and within your community
This session will address:
• Supply Chain optimisation
• Understanding the importance of trust within the supply chain
• Understanding the level of vetting, verification and site acceptance testing