According to the 2016 Verizon Data Breach Report, “The majority of use of unapproved hardware in breaches involve use of USB drives to steal data.” OSSIM 5.3 delivers several enhancements to improve your ability to find indicators of insider threats such as data exfiltration and unauthorized user activity.Register Now
Malware is the scourge of every IT pro, and attackers are becoming more and more sophisticated in the tactics they use to evade detection. Join AlienVault Labs for a technical webinar covering common and emerging techniques attackers are employing to hide malware, along with tactics our security research team uses to detect these evolving threats.Register Now
Justin Endres, SVP, Worldwide Sales, AlienVault
AlienVault Speaking Session
Room 3, Level 4
Session Title: Threat Information Sharing: Is it Working?
Despite the recent proliferation of threat intelligence sources, security professionals are still facing many of the same questions: Should we share data openly? What are we exposing ourselves to if we do? What is to be gained through collaboration? How effective is open source threat intelligence? We will address the current state of threat sharing, discuss the difference between threat data vs. threat intelligence and define the attributes of an effective threat sharing program.
Malicious PowerShell detection
Speaker: Peter Ewane, AlienVault
Peter is a security researcher at AlienVault and will be discussing malicious PowerShell detection.
11:30 AM to 1:00 PM (CDT)
National Instruments - 11500 North Mopac Expressway, Building C, Austin, TX 78759
Barmak Meftah, CEO, AlienVault
9:10am – 9:25am; 15 Minute Tech Symposium
SESSION TITLE: Agility is the key to Effectively Detect and Mitigate a Breach
From a security perspective, the world has changed dramatically in the last ten years. Your cyber threat defense plan for your business is the new front line. Small teams of sophisticated hackers are taking out huge organizations who’ve spent millions on security. So, how do you with limited staff, budget and tools effectively defend your organization if even the largest enterprises aren’t able to? On top of that, your IT infrastructure is required to be more flexible and open than ever before to support hybrid cloud, SDN, virtualization, BYOD – an always on, global economy. Current security approaches are structurally flawed to address today’s environment.
In this session, Meftah will cover a proven new approach that supports flexibility yet maintains control through orchestration and visibility enabling organizations of all sizes but especially the midsized organizations to more quickly and effectively detect and mitigate a breach. The age of point products to address the latest threat in the threat cycle is gone. Meftah will also explain why agility is rapidly becoming the most important attribute of threat detection.
One of the biggest challenges when creating a managed security offering is developing threat intelligence and instrumenting it with existing security controls. This challenge is magnified exponentially as a company's client base grows and needs evolve. In this 30-minute session, you’ll learn about the benefits of building your service offering around a unified security platform and how integrated threat intelligence accelerates the detection process. We’ll also recommend how MSSPs can leverage open threat sharing communities and custom intelligence development to maximize revenue and differentiate themselves from the competition.Register Now
Ernest Muller, Lean Systems Manager - AlienVault