Hans Barré is a Solutions Consultant at RiskIQ where he focuses on Digital Threat Management. The formative years of his 17 year career were spent with the US Department of Defense serving Air Force, Army and Navy clients. Most of these engagements surrounded Cybersecurity, Cyber Warfare, Information Security and Systems Engineering. After relocating to Asia, Hans then continued his career in cybersecurity consulting. He currently serves clients in the high-tech manufacturing, telecommunications and financial services industries across Asia. Hans has provided engineering and consulting services on engagements throughout the United States, Germany, UK, Singapore, South Korea, China and Taiwan.
Cyber Threat Landscape & Intelligence
A Closer Look at Magecart and Browser Based Attacks
Browser-based attacks — Web skimming, Cryptocurrency Miners, Fingerprinters, and Waterholing (including exploitation) encounters—are responsible for some of the most high-profile breaches in recent history, such as the hack of British Airways. Given the frequency by which RiskIQ researchers now encounter these attacks, we believe that they should be taken as seriously as threat mainstays such as phishing and ransomware.
Used by threat actor groups such as Magecart, browser-based attacks have one thing in common: malicious injects. In this session we’ll break down the most common and interesting injection techniques RiskIQ researchers have observed in our telemetry.
Hugh Barrett is vice president of Technical Solutions for Telos Corporation, a position he has held since 2012. He is responsible for technical solutions offered by the company’s Cyber Operations and Defense solution area. He joined the company in 1999 and has served as vice president of product development. Prior to joining Telos, he held the position of Sr. Product Manager for Information Builders in NYC. Mr Barrett holds a Bachelors Degree in Computer Science from the State University of New York College at Brockport. He is also a Certified Information Systems Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).
Security by Design: Risk Assessment, Avoidance and Mitigation
A Tactical Approach to Risk Management
Many organizations and Governments look at IT risk from an enterprise level which is correct. But, it is important to understand risk at the lowest denominator; the application or system. Identifying controls and documenting those controls is a task that is frowned upon by developers and system owners alike. This presentation will shed some light on the importance of looking at risk from a tactical perspective and aggregating that data to the enterprise for a better and more informed risk assessment.
Yair heads business development in the APAC region. He has vast experience in the Information Technology, Intelligence and Cyber domains. He was co-founder at BISEC, a SOC management, orchestration and incident response company acquired by CyberProof in January 2018. He previously served as a board member at Cyren (NASDAQ:CYRN), Head of Intelligence Information Systems for Elbit Systems, CIO and Director of IT for the Israeli Prime Minister’s office, and co-CEO of NCC, acquired by Elron Electronics. Yair holds an M.Sc in Computer Engineering from the Technion Institute of Technology, and a B.Sc in Computer Engineering from Ben-Gurion University.
Security by Design: Risk Assessment, Avoidance and Mitigation
Why a Transformation in Security Ops is Needed to Get Ahead In Combating Cybersecurity Risk
Today, cyber security programs are being driven to comply with regulations. However, as most savvy CISOs know, this will not provide the best protection for your business or your customers, especially if your goal is to minimize the risk of a major breach.
Measuring risk is commonly defined in terms of a quantitatively expressed reduction in uncertainty based on multiple observations. The real challenge in most organizations today is that there are too many vulnerabilities, alerts, and devices being tracked, and this is overwhelming security teams. It’s like finding a needle in a haystack.
This talk will explore a new way to achieve continuous cyber security risk clarity based on industry frameworks such as MITRE and analyze how advanced technologies and methodologies come together to provide machine driven correlation and context and human collaboration to make sense out of it all to build a better way forward for cyber security.
Kawin is a Senior Associate serving as the Chief Cyber Strategist for Booz Allen in Singapore. He has 20 years of experience across Business, Management and Cyber Security roles, building Cyber programs for organizations from the ground up both in North America and Asia region.
He has served as Managing Director of Qualys for the Asia region, running the end-to-end business strategy and growth across the region. Kawin also held the position of CEO of Cybertron Thailand, which provides Managed Security Services as well as Cyber Range services for corporations across all industries and sectors in Thailand and Asia Pacific region. Kawin also dedicated his free time serving as an Executive Committee Member on the (ISC)2 Singapore Chapter, where he co-founded the Chapter and was elected as Communications Director. He has spoken in various events and security conferences and is recognized as a Trusted Advisor in Cybersecurity across Asia Pacific.
Kawin received his BA in Economics at the University of Pennsylvania, Master's degree in Business Management and Systems at New York University, and had performed his Ph.D. research at Singapore Management University, with a joint program at MIT Media Lab.
Navigating Cybersecurity from End-User Perspective
Building Advanced Detect and Respond Capabilities
Companies are digitizing and connecting their enterprises at a furious pace. Migrations to the cloud, IoT-enabled production, and proliferation of mobile devices – among other shifts – are requirements for business success. However, these changes create vastly more cyber risk. Corporate attack surfaces are rapidly expanding. CISOs are responsible for securing an ocean of new technologies. Blind spots are emerging at organizational seams. Compounding this, adversaries are becoming far more advanced; more threat actors have access to increasingly sophisticated offensive capabilities. These adversaries will target and exploit specific gaps and vulnerabilities with precision, turning the benefits of vast connectivity against their targets. Potential impacts range from data breaches to disrupted operations to physical safety issues. Proactively addressing these issues, by enhancing how companies detect and respond to threat activity, enables global enterprises to move faster and with more confidence. This evolving circumstance is more than a system integration challenge; it’s an overall integration challenge that demands deft thinking and deep experience building business-enabling programs, not just implementing point solutions. In this presentation, Collin Barry will talk about building a dynamic, agile detect and respond capability, rooted in a proven cyber fusion construct that delivers highly-automated, human-optimized, and analytics-centric cyber defense.
Tim is currently the VP of security for SolarWinds with responsibility spanning internal IT security, product security, and security strategy. As a former Dell Fellow, CTO, chief product officer, chief architect, distinguished engineer, and director of security strategy, Tim deeply understands the challenges and aspirations of the person responsible for driving digital innovation and change. Tim has over 20 years of experience developing and implementing security technology, including identity and access management, vulnerability assessment, security compliance, threat research, vulnerability management, encryption, managed security services, and cloud security. Nationally, his trusted advisor status has taken him from meeting with members of Congress and the Senate to the Situation Room in the White House. He has been on the board of the Open Identity Exchange and a member of the Trans Global Secure Collaboration Program, driving advancements in identity frameworks and working with the U.S. government on security initiatives.
Proactive Cyber Defence
Patching Makes Perfect: How Patch Management and Good Cyberhygiene Can Help Keep Your Data Secure
In a time when heightened security is paramount — patching is a critical element of any organisation’s security program. If there are gaps in your cyberhygiene, it won’t take a complex attack to break through your defences — a simple form of malware can infiltrate your systems, causing potentially irreversible damage. Medical records, credit card details, business files, and personally identifiable information are all types of sensitive data that can be stolen by attackers taking advantage of weak passwords, weakly configured environments, and unpatched systems. Attacks caused by bad cyberhygiene aren’t a direct hit, they’re a target of opportunity. Does your organization practice good cyberhygiene, including up to date patch management, to help keep your entire landscape secure? Every type of data has a value on the dark net — don’t be a victim and get back to basics.
In this multifaceted role, Mr Bussiere is responsible for evangelizing the criticality of Threat and Vulnerability Management as a continuous process as part of an organization’s enhanced security posture. Mr Bussiere is a frequent and highly-sought after public speaker in the cyber security and networking industry.
Mr Bussiere frequently consults with regional financial services groups, government organizations, and managed security service providers in adopting a regimen of pro-active vulnerability management programs to help them reduce their vulnerability footprint and overall risk profile.
He is a seasoned technical architect with over 20 years of experience in cyber security, computer networking, and engineering. He also holds a strong background in Research and Development, including both software and hardware engineering. Mr Bussiere is the holder of five patents related to computer networking and network security, and an active participant in the IEEE and IETF working groups.
Vulnerability and Exploit Management in An Age of Increasing Zero Day Attacks
Prioritising Risk in an Age of Exploding Modern Assets
The number of vulnerabilities that exists in a typical enterprise continues to increase with no end in sight. This growth is accelerating not only due to “traditional” Information Technology platforms but because of the explosive and exponential development of non-traditional Internet of Things (IoT) devices that seep into the enterprise network.
Identifying and eliminating all vulnerabilities in an enterprise network is an insurmountable task, and we find ourselves in a perpetual state of triage versus balancing operational capabilities.
This begs the question: Are we fixing the vulnerabilities that have the most impact to the organisation, while reducing our cyber exposure risk effectively?
This session will present the problem and advanced techniques that will help you identify and mitigate the subset of vulnerabilities that expose you to the greatest risks while reducing your workload and balancing enterprise-critical assets.