Tuesday, December 17, 2024 | |||
---|---|---|---|
Introduction and Fireside Chat | Escape the Puppy Mill: How to Avoid Low-Quality Penetration Testing with PTES | Tired of low-quality penetration tests that just check the box? You might be dealing with a “puppy mill” firm. In this fireside chat, we’ll explore:
Find out how to avoid cookie-cutter testing and get results that truly reflect your organization’s vulnerabilities. | Kevin Johnson - Secure Ideas Paul Asadoorian - Eclypsium Heath Mullins - ExtraHop | |
Breakout Session | From Firewalls to Futureproofing: The Evolution of Network Security | Take a journey through the fascinating evolution of network security in this engaging webinar featuring industry leaders John Pirc, Vice President of Product Management & Strategy, and Arthur Fontaine, Director of Product & Solution Marketing. From the early days of firewalls to today’s cutting-edge Network Detection and Response (NDR) tools, discover how network security has transformed to keep pace with increasingly sophisticated threats. Explore the most critical challenges security teams face today, uncover insights into emerging threats on the horizon, and get a sneak peek into the next wave of innovative solutions to protect against evolving cyber exploits. Don’t miss this chance to deepen your understanding of network security’s past, present, and future. | Arthur Fontaine - NetWitness John Pirc - NetWitness | |
Workshop | Editing Threat Content out of Live Networks: A New Approach to Cybersecurity | Despite our best efforts and new technology, daily breach headlines suggest that the adversaries are winning. In a cybersecurity ecosystem over-optimized for alert management and incident response, it’s no wonder. There has been only so much that can be done at the network level that users must rely on endpoint protection—essentially waiting for the adversary to get in and sifting through noisy network alerts to find patterns of activity that have already happened. What if it was possible to pause every network session, fully inspect the content at the application layer, identify the tried-and-true tools and methods adversaries use (not the IOCs), and edit those tools and methods out of live network traffic to stop threats before they become an incident or a loss? And do it so fast and precise that it’s unnoticeable and false positives become a thing of the past? It would change everything. This new approach refocuses energy on the actors and their techniques rather than all the things that need to be protected to scale to the threat. Steve Ryan, Founder and CEO of Trinity Cyber, is a recognized leader in cybersecurity. He served our nation for decades by stopping nation-state cyber adversaries. He refined a cybersecurity methodology with groundbreaking technology and an expert team of practitioners. | Steve Ryan - Trinity Cyber | |
Panel Discussion | AI Took My Tier 1 Support Job! Now What? | Worried that AI might replace your Tier 1 support role? You’re not alone. This panel explores what AI means for the future of network support jobs. Discover how AI is reshaping routine tasks, what skills will become essential, and how to stay ahead in an automated world. Our experts will dive into:
Join us to learn how to thrive in a future where AI and humans work side by side. | Kevin Johnson - Secure Ideas Paul Asadoorian - Eclypsium Jessica Hoffman - City of Philadelphia Joshua Marpet - Guardedrisk Liz Morton - Axonius |