Microsoft - 7595 Technology Way #400, Denver, CO 80237
Upcoming events at this location
The Evolution of a Hack for Financial Gain: CryptoJacking and CryptoCurrencies
In this informative and practical presentation, Bryan will introduce the topic at a *very high level* of what a cryptocurrency and cryptowallets are; an explanation about privacy coins; discussion about Smart Contract hacking and past examples; a discussion on how and why cryptocurrencies are attractive to hackers; discuss history around the cryptominer and CoinHive mining software and browser hijacks to mine cryptocurrency; current and upcoming attacks against cryptowallets and private keys; how to defend against these attacks; and why this trend will not go away.
A working demonstration will also be done by running a cryptominer type script or malware. The intended audience is to be leaders with a technical background but who are beginner to intermediate to knowing what blockchains/cryptocurrencies are and how they work.
Stephen Edmonds and Melissa Cooper
GDPR Impacts on Incident Response
In today's hypersensitive world, what you don't know can hurt you. In this presentation, we will delve into the guidance from the General Data Protection Regulation (GDPR), analyzing its impacts, and helping you position your Incident Response program for the upcoming regulation. This presentation will also cover strategies and tactics to help you manage your Data Subjects and your role as a Data Controller, Data Processor, or both under GDPR.
Director, Cyber Investigations, Kivu Consulting
Converge: A Cross Discipline Approach to IR and Breach Investigations (and Lessons Learned)
With the increased use of SaaS, IaaS, and PaaS platforms, organizations are shoveling more compute, applications, and data into the cloud from on-premises solutions. However, answering cloud governance and access control questions such as “What data do I have?," "Where is my data stored?," Who has access to my data?,” has become challenging. Often, it is because data is out of sight and out of mind. Additionally, during a breach, these questions can impede an investigation that is already challenged by decentralized logging, access rights, large volumes of data to review, and the inability to physically access the environment.
This presentation will walk thought the current challenges faced by defenders and IR investigators in large cloud environments, and offer solutions that call on a variety of cyber security, digital forensic and incident response, and eDiscovey talents. We will step through a case example where the convergence of these disciplines allowed an organization to effectively investigate a data breach and comply with regulatory notification requirements.
Douglas has over 23 years of professional technology experience. He is a recognized expert in cybersecurity, incident response, digital forensics, and information governance. In addition to leading proactive security assessments, he conducts investigations involving hacking, data breaches, trade secret theft, trademarks, intellectual property, employee malfeasance and a variety of other legal and governance issues. Douglas is also the founder and host of Cyber Security Interviews, a popular information security podcast.