Hans Barré is a Solutions Consultant at RiskIQ where he focuses on Digital Threat Management. The formative years of his 17 year career were spent with the US Department of Defense serving Air Force, Army and Navy clients. Most of these engagements surrounded Cybersecurity, Cyber Warfare, Information Security and Systems Engineering. After relocating to Asia, Hans then continued his career in cybersecurity consulting. He currently serves clients in the high-tech manufacturing, telecommunications and financial services industries across Asia. Hans has provided engineering and consulting services on engagements throughout the United States, Germany, UK, Singapore, South Korea, China and Taiwan.
Cyber Threat Landscape & Intelligence
A Closer Look at Magecart and Browser Based Attacks
Browser-based attacks — Web skimming, Cryptocurrency Miners, Fingerprinters, and Waterholing (including exploitation) encounters—are responsible for some of the most high-profile breaches in recent history, such as the hack of British Airways. Given the frequency by which RiskIQ researchers now encounter these attacks, we believe that they should be taken as seriously as threat mainstays such as phishing and ransomware.
Used by threat actor groups such as Magecart, browser-based attacks have one thing in common: malicious injects. In this session we’ll break down the most common and interesting injection techniques RiskIQ researchers have observed in our telemetry.
Collin Barry is a is a senior leader in Booz Allen Hamilton’s International Account Group, responsible for building next-generation capabilities and client service offerings in cyber threat intelligence programs, cyber fusion center designs, and business risk operations. Collin specifically leads Booz Allen’s cyber practice in Singapore and across the Asia Pacific region, where he leads a diverse team of subject matter experts supporting complex engagements involving adaptive security designs (scenario planning, threat modeling) and integrated cyber solutions (applying automation to countermeasure design). Collin joined Booz Allen Hamilton in 2009 following his tenure at the Central Intelligence Agency, where he garnered deep expertise in intelligence support to real-world mission operations. Collin was an advisor to senior managers in the Agency’s Counterintelligence Center who were responsible for overseeing all counterintelligence aspects of CIA’s worldwide commercial operations. Early in his career, Collin worked for the American Express Company – holding positions in Phoenix, Arizona, Washington, DC, and London, England. In the latter position, Collin was the Head of Small Business Services (now OPEN®) where he was responsible for driving the portfolio’s revenue and profit targets across nine European markets.
Navigating Cybersecurity from End User Perspective
Building Advanced Detect and Respond Capabilities
Companies are digitizing and connecting their enterprises at a furious pace. Migrations to the cloud, IoT-enabled production, and proliferation of mobile devices – among other shifts – are requirements for business success. However, these changes create vastly more cyber risk. Corporate attack surfaces are rapidly expanding. CISOs are responsible for securing an ocean of new technologies. Blind spots are emerging at organizational seams.
Compounding this, adversaries are becoming far more advanced; more threat actors have access to increasingly sophisticated offensive capabilities. These adversaries will target and exploit specific gaps and vulnerabilities with precision, turning the benefits of vast connectivity against their targets. Potential impacts range from data breaches to disrupted operations to physical safety issues. Proactively addressing these issues, by enhancing how companies detect and respond to threat activity, enables global enterprises to move faster and with more confidence. This evolving circumstance is more than a system integration challenge; it’s an overall integration challenge that demands deft thinking and deep experience building business-enabling programs, not just implementing point solutions. In this presentation, Collin Barry will talk about building a dynamic, agile detect and respond capability, rooted in a proven cyber fusion construct that delivers highly-automated, human-optimized, and analytics-centric cyber defense.
Yair heads business development in the APAC region. He has vast experience in the Information Technology, Intelligence and Cyber domains. He was co-founder at BISEC, a SOC management, orchestration and incident response company acquired by CyberProof in January 2018. He previously served as a board member at Cyren (NASDAQ:CYRN), Head of Intelligence Information Systems for Elbit Systems, CIO and Director of IT for the Israeli Prime Minister’s office, and co-CEO of NCC, acquired by Elron Electronics. Yair holds an M.Sc in Computer Engineering from the Technion Institute of Technology, and a B.Sc in Computer Engineering from Ben-Gurion University.
Security by Design: Risk Assessment, Avoidance and Mitigation
Why a Transformation in Security Ops is Needed to Get Ahead In Combating Cybersecurity Risk
Today, cyber security programs are being driven to comply with regulations. However, as most savvy CISOs know, this will not provide the best protection for your business or your customers, especially if your goal is to minimize the risk of a major breach.
Measuring risk is commonly defined in terms of a quantitatively expressed reduction in uncertainty based on multiple observations. The real challenge in most organizations today is that there are too many vulnerabilities, alerts, and devices being tracked, and this is overwhelming security teams. It’s like finding a needle in a haystack.
This talk will explore a new way to achieve continuous cyber security risk clarity based on industry frameworks such as MITRE and analyze how advanced technologies and methodologies come together to provide machine driven correlation and context and human collaboration to make sense out of it all to build a better way forward for cyber security.
Tim is currently the VP of security for SolarWinds with responsibility spanning internal IT security, product security, and security strategy. As a former Dell Fellow, CTO, chief product officer, chief architect, distinguished engineer, and director of security strategy, Tim deeply understands the challenges and aspirations of the person responsible for driving digital innovation and change. Tim has over 20 years of experience developing and implementing security technology, including identity and access management, vulnerability assessment, security compliance, threat research, vulnerability management, encryption, managed security services, and cloud security. Nationally, his trusted advisor status has taken him from meeting with members of Congress and the Senate to the Situation Room in the White House. He has been on the board of the Open Identity Exchange and a member of the Trans Global Secure Collaboration Program, driving advancements in identity frameworks and working with the U.S. government on security initiatives.
Proactive Cyber Defence
Patching Makes Perfect: How Patch Management and Good Cyberhygiene Can Help Keep Your Data Secure
In a time when heightened security is paramount — patching is a critical element of any organisation’s security program. If there are gaps in your cyberhygiene, it won’t take a complex attack to break through your defences — a simple form of malware can infiltrate your systems, causing potentially irreversible damage. Medical records, credit card details, business files, and personally identifiable information are all types of sensitive data that can be stolen by attackers taking advantage of weak passwords, weakly configured environments, and unpatched systems. Attacks caused by bad cyberhygiene aren’t a direct hit, they’re a target of opportunity. Does your organization practice good cyberhygiene, including up to date patch management, to help keep your entire landscape secure? Every type of data has a value on the dark net — don’t be a victim and get back to basics.
In this multifaceted role, Mr Bussiere is responsible for evangelizing the criticality of Threat and Vulnerability Management as a continuous process as part of an organization’s enhanced security posture. Mr Bussiere is a frequent and highly-sought after public speaker in the cyber security and networking industry.
Mr Bussiere frequently consults with regional financial services groups, government organizations, and managed security service providers in adopting a regimen of pro-active vulnerability management programs to help them reduce their vulnerability footprint and overall risk profile.
He is a seasoned technical architect with over 20 years of experience in cyber security, computer networking, and engineering. He also holds a strong background in Research and Development, including both software and hardware engineering. Mr Bussiere is the holder of five patents related to computer networking and network security, and an active participant in the IEEE and IETF working groups.
Vulnerability and Exploit Management in An Age of Increasing Zero Day Attacks
Prioritising Risk in an Age of Exploding Modern Assets
The number of vulnerabilities that exists in a typical enterprise continues to increase with no end in sight. This growth is accelerating not only due to “traditional” Information Technology platforms but because of the explosive and exponential development of non-traditional Internet of Things (IoT) devices that seep into the enterprise network.
Identifying and eliminating all vulnerabilities in an enterprise network is an insurmountable task, and we find ourselves in a perpetual state of triage versus balancing operational capabilities.
This begs the question: Are we fixing the vulnerabilities that have the most impact to the organisation, while reducing our cyber exposure risk effectively?
This session will present the problem and advanced techniques that will help you identify and mitigate the subset of vulnerabilities that expose you to the greatest risks while reducing your workload and balancing enterprise-critical assets.