Securing the Architecture of the Industrial Internet of Things: from the Edge to the Cloud

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1778577

The advent of Industry 4.0 will require secure ICS, IoT and cloud architectures to embrace an agile methodology to meet industrial and business demands. These architectures will need to take into consideration the security of embedded components and SCADA systems, sending traffic to the cloud as well as the security of cloud environments. Data privacy can impact architecture if personal identifiable information is collected to aid in analysis in these cloud environments. Furthermore, we will look at the ISA/IEC 62443 standard and its impact on and applicability to these architectures. Concepts on network architecture design, defense-in-depth network, component selection and hardening, as well as the security development lifecycle’s importance on IoT, the edge and cloud architecture, will be presented and solutions discussed.
Learning Objectives:
  • Describe the particulars of embedded ICS components and the challenges they present when architecting security solutions and how these devices interact within an edge computing environment.
  • Understand the ISA/IEC 62443 standard's relevance in helping design and define secure architectures for the IoT and the cloud.
  • Conduct proper network segmentation, utilizing security architecture safeguarding critical functionality to ICS processes during cloud communications.

Evolving Threat Modeling for Agility and Business Value

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1778580

Many threat modeling approaches exist with new techniques and tools to perform the same activity for different scenarios. However, methodologies like DevSecOps pose a huge challenge for threat modelers in incorporating the demands of different teams including scaling and quality issues and in successfully demonstrating business value. This requires moving away from traditional practices to fit DevSecOps needs. After an elaborative study, we introduce a Maturity Model for Threat Modeling, focused on how it can be integrated with the enterprise. You will witness threat modeling as a central tool for security risk management, how various functions in the enterprise can be involved to address risk and finally preparing organizations to experience the right outcome for recommended tool categories at every maturity level.
Learning Objectives:
  • Address the challenges in traditional threat models to suit DevSecOps methodology.
  • Describe a maturity model to prepare organizations for the right levels of threats.
  • Recommend the right tool categories for every maturity level.

Confessions of a CIA Spy - The Art of Human Hacking

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1778552

A former CIA intelligence officer with over two decades of experience breaching the security of his targets overseas identifies the threat actors behind today's data breaches along with their motivations and objectives. He reveals human hacking methodologies that increasingly incorporate OSINT, especially social media platforms, to identify, assess and manipulate key insiders to facilitate the breach.

This presentation will demonstrate several advanced social engineering techniques going far beyond commonly known phishing attacks. It also identifies and promotes a two-pronged risk mitigation strategy incorporating organizational and personal information control along with a "verify, then trust" discipline when confronted by potential human hacking attempts.

Learning Objectives:
  • Identify five distinct categories of human hackers (threat actors) behind successful data breach attempts along with their respective motivations and objectives.
  • Describe the methodologies utilized by human hackers for the selection, assessment and manipulation of insiders to successfully accomplish the breach.
  • Mitigate human hacking threats by adopting a two-pronged strategy.

Exploring Security Controls needed to protect Medical Wearable Devices

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1778557

The internet of things (IoT) has been a significant advancement in technology, modernizing repetitive tasks, streamlining data collection, and providing new ways to collect, interpret and disseminate information. Numerous industries have benefited from advancements in IoT technology, including healthcare. Medical IoT (MIoT) has deployed several devices, including internet-connected sleep apnea machines, blood pressure regulators, glucose monitors and mobile echocardiogram and heart rate monitors. The advancement in MIoT has revolutionized the treatment of care. Both treatment facilities and patients perform a significant amount of care solutions from their homes, saving the patient time and money. The integration of technology to maintain potential life-sustaining functions within the patients comes with the challenge of ensuring that data integrity and patient safety are not compromised.
Learning Objectives:
  • Identify emerging threats towards medical wearable devices.
  • Identify key risk factors and threats towards medical treatment facilities and users.
  • Learn different strategies to protect users and medical treatment facilities and wearable devices.

Evolution of the EU "Cookie Law"

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1778560

The ePrivacy Regulation is still not there, but cookies (and other tracking mechanisms) have been under close scrutiny from European Data Protection Authorities. This sessions will review the actual scopes and requirements of the “cookie law” implementation in various EU member states, along with the requirements changed by the GDPR. Some common pitfalls and misconceptions will be explained and pragmatic solutions presented. The session will also review how Isabel Group proceeded to the selection and implementation of its cross website cookie consent management solution, and how the solution has helped the company and the changed it triggered.
Learning Objectives:
  • Understand better the scope and requirements of the EU "Cookie Law."
  • Identify applicable requirements of the EU "Cookie Law."
  • Put in place measures to comply with the EU "Cookie Law."

Cracking the Cyber Liability Code

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1778668

Cyber insurance? Do we need it? Who better to discuss cyber insurance than with actual underwriters. Go behind the scenes to learn about the current cyber liability landscape. We know insurance forms are complex, coverages are vague, and there are often hidden exclusions. We provide you with the knowledge to understand these issues, highlight how you can efficiently work through the application process, understand what insurance companies look for, and ask the right questions to effectively negotiate your coverages and premium. Additionally, we discuss real-life scenarios that lead to denial of claims.
Learning Objectives:
  • Understand the current cyber liability market.
  • Identify common coverages and exclusions, and understand why claims may be denied.
  • Identify key factors to determine how much insurance you need, what insurers look for, and know the do's and don'ts when filling out your application.

Translating Compliance - The importance of Effectively Bridging Technology and Audit Speak

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1778686

Compliance means conforming to rules, such as specifications, policies, regulations or standards and laws. As information security professionals, we know that things are not black and white and that controls, however well intended, may break a system or render it unable to perform it's business function. But how do we make sure that we understand the true intent behind a control in order to effectively demonstrate compliance? Where engineers are left not understanding a control's intent or unable to effectively explain mitigating controls, auditors have a hard time breaking down the components of a control to make them understandable. Each scenario can lead to false positives and erroneous findings. Let's explore how to effectively translate between technology speak and audit jargon.
Learning Objectives:
  • Define the gaps in understanding that accompany failing controls.
  • List the common pitfalls in effectively communicating a compliance need.
  • Effectively challenge vague and indistinct controls in order to build a stronger control framework.

Help Organizations Protect against Doxing Attacks

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1778684

Doxing is a term derived from documents, and hence consists of collecting information on an organization or individual through social media websites, search engines, password-cracking methods, social engineering tools and other sources of publicly displayed information. The main purpose of doxing attacks is to threaten, embarrass, harass and humiliate the organization or individual. Various tools are used to perform doxing. Tools such as Maltego visualize an organization’s architecture, which helps determine weak links within the organization. This presentation discusses different ways organizations and employees can be doxed and suggests measures to protect against doxing attacks.
Learning Objectives:
  • Take measures and create awareness as to how organizations can protect themselves from doxing attacks.
  • Understand the potential impacts of doxing and its consequences.
  • Understand the different tools and methodologies used for doxing.

Inspecting TLS

Oct 20, 2021 10:45am ‐ Oct 20, 2021 11:45am

Identification: 1841312

Cryptography is commonly used to protect the secrecy and integrity of data. It is a good thing that secure transportation is now commonly used. However, usually the owner of the data does not know with certainty which of their data is transferred. The transportation is guarded by cryptographic techniques so it is impossible for the owner to inspect the data-stream. The only way to inspect this process is to inspect the source code and to verify that the used program matches the inspected code. Not all parties are willing to have their code inspected. We are presenting the early findings for possibilities and feasibilities for the data owner to temporarily inspect the encrypted transportation for a limited time and we will demonstrate the prototype.
Learning Objectives:
  • At the end of this session participants will be understand the initial phase of TLS in particular "key exchange".
  • At the end of this session participants will be understand how "the shared secret" can be obtained by auditing parties.
  • At the end of this session participants will be understand how this mechanism has only impact on a few connections (restricted in time)). So the general protection of TLS is not compromised.

How to Get Results From Threat Detection and Response Solutions - Sponsored by Securonix

Oct 20, 2021 10:45am ‐ Oct 20, 2021 12:00pm

Identification: 1869485

The security market is full of solutions to support threat detection and response: EDR, NDR, SIEM, XDR, SOAR, you name it. But just deploying tools is not enough to get results. Organizations must ensure they have the appropriate coverage of threats and technologies to detect and respond to incidents and minimize impact. This session introduces the coverage concept and how it affects the performance of threat detection and response, as well bringing some important lessons learned from real world deployments.
Learning Objectives:
  • At the end of this session participants will be able to understand what coverage is in relation to threat detection and response practices.
  • At the end of this session participants will be able to apply the MITRE ATT&CK framework to map and expand the threat coverage of their threat detection and response practices
  • At the end of this session participants will be able to comprehend what parts of their technology environment must be covered by their threat detection and response practices.