AFCEA NOVA Looking at Cybersecurity Through the Eyes of an Attacker
Event submitted on Monday, June 8th 2020, approved by Charles Villanueva ✓
This event has been tagged as follows:
This is a fascinating event. The webinar, organized by the Armed Forces Communications & Electronics Association, Northern Virginia Chapter, is titled “Looking at Cybersecurity Through the Eyes of an Attacker”. With industry-leading speakers, this online event is a must-attend for those interested in how hackers plan their cyber attacks. This virtual Cyber event would be particularly useful for those interested in MITRE ATT&CK.
The following description was either submitted by the Conference Organizer on Monday, June 8th 2020, or created by us.
Organizations have seen a massive expansion of their cyber terrain in recent years with the integration of business systems, information technology, and operational technology that is fundamentally transforming the effectiveness and efficiencies of business operations. While the integration of business systems and technologies is a key enabler of digital transformation, it also expands the attack surface and potentially accelerates the speed and damage of attacks. Correlation between cyber terrain and the exploitable attack surface is leading many organizations to question whether they have the right cybersecurity tools deployed to provide visibility of their network traffic. As the cyber terrain continues to grow, organizations must evolve their defensive strategies, moving from perimeter-focused security to more comprehensive strategies that emphasize holistic visibility, detection, and the response of attacks across the cyber terrain.
This can be accomplished by operationalizing cyber threat frameworks such as MITRE ATT&CK, which provides insights both to how an attacker thinks about the target and how defenders must counter the actions taken by the attacker. Furthermore, with attackers using AI and machine learning to speed and scale attacks, it is more important than ever for cyber defenses to be able to quickly process large amounts of data and provide faster, actionable, and more automated cybersecurity decisions. Join us for a discussion of these cybersecurity trends and a simulation of an offense team and a defensive team engaging in an actual cyber battle.
The presentation and demonstration will help your organization’s cyber warriors better understand how to:
- Collect, analyze, and detect anomalous network and endpoint activity
- Detect threats at every stage and response with speed and precision – before a business-impacting event
- Leverage the full suite of security products within your existing infrastructure to improve the efficacy of the system