LogRhythm - 4840 Pearl East Parkway, Boulder CO / Innovation Room
Upcoming events at this location
Orchestration and Automation in the Real World
Terms like artificial intelligence, machine learning, and neural network are becoming all too common as buzz words with little to stand behind our expectations. All such solutions are an attempt to address big problems in a big data world. How do we efficiently and effectively streamline tasks, procedures, and process? How can we perform intelligent data mining with real world actionable outcomes. Optiv has begun that process as they build out next generation solutions and it’s painful. This is not a marketing talk - it’s in the trenches real world transparency on the challenge and struggles everyone faces as they attempt to perform orchestration and automation in their environment. The speaker will share both the executive level view of management as well as the deeper technical side of things as we dive into the complexities of O&A in the real world.
Ken Dunham is a respected industry thought leader, having authored multiple books during the past two decades and published thousands of articles, including an ISSA International 2015 Article of the Year on cyber espionage. He is an esteemed ISSA International Distinguished Fellow and was a top quoted security expert globally in 2006. He has created and served in multiple non-profit organizations, including ISSA, ISACA, HTCIA, InfraGard, Wildlist and many others. He also is the founder of two companies, Rampart Research, which focused on global education and services related to individuals involved in cyber research and response, and advanced security services firm 4D5A Security. Dunham holds multiple industry certifications, including CISSP, GCFA Gold, GCIH Gold, GSEC, GREM Gold, GCIA and CISM.
The Evolution of a Hack for Financial Gain: CryptoJacking and CryptoCurrencies
In this informative and practical presentation, Bryan will introduce the topic at a *very high level* of what a cryptocurrency and cryptowallets are; an explanation about privacy coins; discussion about Smart Contract hacking and past examples; a discussion on how and why cryptocurrencies are attractive to hackers; discuss history around the cryptominer and CoinHive mining software and browser hijacks to mine cryptocurrency; current and upcoming attacks against cryptowallets and private keys; how to defend against these attacks; and why this trend will not go away.
A working demonstration will also be done by running a cryptominer type script or malware. The intended audience is to be leaders with a technical background but who are beginner to intermediate to knowing what blockchains/cryptocurrencies are and how they work.
Stephen Edmonds and Melissa Cooper
GDPR Impacts on Incident Response
In today's hypersensitive world, what you don't know can hurt you. In this presentation, we will delve into the guidance from the General Data Protection Regulation (GDPR), analyzing its impacts, and helping you position your Incident Response program for the upcoming regulation. This presentation will also cover strategies and tactics to help you manage your Data Subjects and your role as a Data Controller, Data Processor, or both under GDPR.