Ziv Mador manages the global security research team at Trustwave, covering research areas such as vulnerability assessment and scanning, malware reverse engineering, and spam and phishing research.
Ziv was recently acclaimed as the “Threat Seeker” by SC Media. He’s regularly diving into the underground world to find out how criminals are monetising the latest exploit kits and botnets. His team investigated the Petya and WannaCry ransomware malware attacks, and have recently been exploring cryptojacking, ATM Heists and new zero-day vulnerabilities. He speaks security conferences such as RSA and Gartner Security Summits, the Microsoft Digital Cybercrime Consortium and OWASP Global Appsec conferences. Prior to his current role, Ziv worked at Microsoft developing a variety of security technologies including antimalware capabilities, IDS/IPS, enterprise firewalls, Windows security and managing the response to zero day malware. Ziv is a 20 year veteran of the security industry and a leading authority on the topic of Internet threats and cybercrime.
Darkweb, Cybercrime, Cyberwarfare
Understanding the Gangs of the Cyber Underground
The darkweb is a jungle of criminal activity, much of it uses various cyber capabilities which Ziv Mador, Trustwave’s VP of Security Research, investigates for years. In this talk, Ziv will show the rules of conduct that these underground forums follow, how these cybercriminals collaborate and run their business, how they attract talent and compensate them, and how they use multiple underground services for money laundering. The talk will describe recent attacks, such as the massive Magecart attacks that skim credit card information from users of tens of thousands of eCommerce sites, cases of government services that were recently breached and, in particular, examples of cyber attacks that are taking place in Singapore. Lastly, learn how the security research community collaborates behind the scenes to help combat this criminal activity. As the recent acclaimer of SC Magazine’s “Threat Seeker” leadership award and a frequent speaker on these topics, Ziv will demonstrate, through recent examples, the modern hacker's modus operandi.
John McClurg is VP & Ambassador-At-Large at Cylance. He came to Cylance from Dell, where he served as its CSO, advancing responsibilities that included the strategic focus and tactical operations of Dell’s internal global security services, both physical and cyber. He was also charged with the advocacy of business resilience and general security prowess.
Before joining Dell, McClurg served at Honeywell International; Lucent Technologies/Bell Laboratories; and in the Federal Bureau of Investigation (FBI), where he held an assignment with the US Department of Energy (DOE) as a Branch Chief charged with establishing a Cyber-Counterintelligence program within the DOE’s newly created Office of Counterintelligence.
Leveraging Machine Learning, Automation and AI in Next Gen Cyber Security.
The Future of Security - How AI Will Liberate Us
Over 20 years ago, John helped build the FBI’s InfraGard Program. Although its original intention was to be proactively preventative against cyber threats, it operated in the world of the reactive, despite best efforts. Faced with 'Defense in Depth' complexity and cost, proactive prevention eluded them. So what is 'Proactive Prevention' in the world of cybersecurity and how does AI play a role?
For decades, the security profession has relied upon the best technology we had at the time to deflect the onslaught of daily virus and malware attacks. The security industry has profited quite nicely from the insecurity of the world and this reactive paradigm.
The effectiveness of that anti-virus (AV) technology was always based on having the latest signatures on hand, which the adversaries could easily defeat with just the slightest modification. That signature-based paradigm required downstream resources and expense and usually at least one “sacrificial lamb” - and no business wants to be that case study.
As predicted 50 years ago by Thomas Kuhn in his book the Structure of Scientific Revolutions, we’re seeing the dawn of a new day where AI’s machine learning and advance mathematical algorithms now offer validated deflection rates, pre-execution, in the realm of 99%.
Our discussion will explore John’s generation’s journey toward this emerging new paradigm, its challenges, what it means for the future as our homes, enterprises and cities become hyperconnected and automated.
As CTO, Rob McNutt evangelizes Forescout’s technology and leverages customer feedback to help shape future product direction. He also advises customers on how to build a cybersecurity strategy to best protect against today’s cybersecurity risks and threats. Rob brings more than 15 years of experience to the role, including leading Forescout’s emerging technology teams and multiple technology leadership roles at other companies.
Industrial Control Systems (ICS): Vulnerabilities & Resiliency
Tearing Down a Building Network Using IoT Devices
Information Technology and Operational Technology were, for a long time, regarded as two distinct areas of an organization. Nowadays, these two domains are converging with the rise of connected embedded devices in the Internet of Things (IoT) and industrial control systems. Consequently, IT security teams are increasingly responsible not only for protecting the information of business but also its cyber-physical systems.
Government agencies within Asia have stated that the buildings and systems are becoming ‘smarter’ so the risk of them being attacked for ransom or to be exploited to spread malware are increasing.
Recent research conducted by Forescout Technologies uses a smart building as a case study of a network where legacy OT assets, IT systems and IoT devices share the same network. Join us to learn about -