Soft Skills for Success

Oct 17, 2021 5:00pm ‐ Oct 17, 2021 6:00pm

Identification: SCCC21_10


Luck is Not a Strategy

Oct 17, 2021 6:00pm ‐ Oct 17, 2021 7:00pm

Identification: SCCC21_11


Kickoff & Welcome | Keynote - Defend Today, Secure Tomorrow

Oct 18, 2021 8:00am ‐ Oct 18, 2021 9:30am

Identification: Parent


Exhibit Hall Break

Oct 18, 2021 9:30am ‐ Oct 18, 2021 10:00am

Identification: 1856934


How to make Black Swans extinct and why ISO31000 is the weapon of choice

Oct 18, 2021 10:00am ‐ Oct 18, 2021 11:00am

Identification: 1778558

We lack an agreed definition for cybersecurity and even worse, despite an international risk management standard endorsed by more than 160 nations, our profession uses multiple differing security risk management frameworks. If every employer, client and supplier has a different view of risk management, how can we expect to keep up with the bad guys, let alone beat them consistently? Even if your cybersecurity framework is best in the world, we all need to be in alignment. When 100 security professionals developed the Security Risk Management Body Of Knowledge, we integrated best practice from around the world. And it started with the ISO31000 Risk Management Guideline. This presentation is about applying ISO31000 principles, framework and process in the real cybersecurity world, and in the internet of things.
Learning Objectives:
  • List the internationally agreed six-word definition of risk, explain the key implications of this risk definition, and describe the key components of the ISO31000 Risk Management Guideline.
  • List the key limitations of existing risk management frameworks and describe why some of the current approaches to risk management enable attackers to breach systems far too easily.
  • Argue for a better risk management framework, explain the critical importance of objectives and describe the implications of the internet of things in the context of risk management.

Human Security Engineering: A Strategy to Address "The User Problem"

Oct 18, 2021 10:00am ‐ Oct 18, 2021 11:00am

Identification: 1778566

When users make a harmful action, cybersecurity professionals believe that the solution is more awareness. This is like saying that if a canary dies in a coalmine, the solution is healthier canaries. When the user fails, it is a failure of the entire system. The problem is not that users cause a loss, but that they can potentially initiate a loss. The solution is to engineer the user out of the process, or at least filter out an attack. When a user is in the position of possibly initiating a loss, you create a user experience and provide awareness to avoid initiating a loss. You anticipate the loss being initiated and put detection and reaction in place. We call this Human Security Engineering.
Learning Objectives:
  • Understand conceptually how a user is only an operational part of a system, and how the initiate loss, but not create it.
  • Strategically define technologies and processes to mitigate loss throughout the entire life cycle of an attack, from initiation to user action to mitigating the harm resulting from the user action.
  • Determine how users are put in the position of potentially initiating a loss, and to examine if a user can be removed from the process.

Measuring Security Effectiveness

Oct 18, 2021 10:00am ‐ Oct 18, 2021 11:00am

Identification: 1778680

How do you measure the effectiveness of security? In 2016, we established a security function within software engineering. Taking a software engineering approach to security, we created testing services, hired developers to build tools, conducted secure code reviews and created our AppSec training program. In 2020, we challenged ourselves to evaluate the effectiveness of our program by analyzing the impact of our team’s services on pen-test findings. A three-month data analysis found that development teams working with us fixed their pen-test findings faster and had significantly fewer new pen-test findings than teams we didn’t work with. In this talk, we will share the specific application security practices that led to these improved outcomes, and how we adjusted our services in response to our findings.
Learning Objectives:
  • Identify the key application security practices that have been shown to reduce risk.
  • Understand how to analyze the security data and adjust a program in response.
  • Know how to set up and run a experiment to evaluate the effectiveness of a security control.

Introducing Law, Regulation and its Increasing Intersections with Information Security

Oct 18, 2021 10:00am ‐ Oct 18, 2021 11:00am

Identification: 1778578

Law and regulation are of increasing importance for information security programs and professionals. Cybersecurity risks are directly tied to legal and regulatory risk. This presentation provides a foundational knowledge of law and the specific laws applicable to cybersecurity programs. It demystifies and explains important legal concepts as well as the evolution of law and regulation applicable to cybercrime and cybersecurity. All of this empowers infosec pros to understand and comply with the growing body of legal rules, and have productive conversations about the law.
Learning Objectives:
  • Understand foundational legal concepts and how they relate to information security.
  • Understand the evolving legal and regulatory framework surrounding information security, cybersecurity and privacy.
  • Communicate more effectively about laws, regulations, and how they relate to information security programs and actions.

Red Teaming with Dark Web and GitHub PoC Exploits

Oct 18, 2021 10:00am ‐ Oct 18, 2021 11:00am

Identification: 1778544

Examined is a collection of open source tools that are used in an authorized red team engagement of a cloud-native Kubernetes cluster environment to discover application security defects. Our collection of dark web and GitHub proof-of-concept (PoC) tools provide a red team with an advanced adversarial advantage over traditional commercial tooling across all stages of an engagement. We report the results in relation to our understanding of the cloud shared responsibility model as it applies to IaaS, PaaS, and SaaS. Several flaw discovery and exploit tools with be demonstrated to show their utility. We explore how CVEs are weaponized on the internet and how having red team a-priori knowledge of them can help organizations create defense-in-depth mitigating controls.
Learning Objectives:
  • Plan a penetration test using open source tools.
  • Recall specific dark web toolkits for red teaming.
  • Demonstrate an understanding of GitHub proof-of-concept (PoC) exploits and their applicability to red teaming engagements.

The Map and the Territory: MITRE ATT&CK In Theory and Practice

Oct 18, 2021 10:00am ‐ Oct 18, 2021 11:00am

Identification: 1778681

Cybersecurity practitioners have often drawn insights and ideas from other domains, relying on their insights, adopting their maxims and terminology. Sun Tzu famously wrote, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” Carl Linneaus is credited with developing the standard taxonomy for naming organisms. Only recently, however, has our industry begun to effectively apply the synthesis of such ideas. The MITRE ATT&CK Framework, publicly released in 2015, has been growing in scope and influence, but it is not the first of its kind. How does it compare with its predecessors in improving our understanding of adversary behavior and our defenses? This talk describes key concepts and goals of MITRE ATT&CK to help support successful implementations.
Learning Objectives:
  • Understand the origins, design goals and components of the MITRE ATT&CK Framework.
  • Compare and contrast the MITRE ATT&CK Framework with other frameworks in order to judge appropriateness for and applicability to an organization's security programs.
  • Use the MITRE ATT&CK Framework to correlate between offensive actions and defensive capabilities and measure coverage of ATT&CK techniques.