Pivot and Pillage: Lateral movement within a Victim Network
Whether performed by an insider threat, or by an external threat that's managed to get a foothold inside, the next step in the dance is usually the pivot: moving from one host to another either to expand control or pillage a particular resource. In this , we will look at some of the more commonly encountered pivot techniques to help you understand, detect and deter malicious, lateral movement within your network.
Panel Discussion – Building Cyber Resilience in a Hyperconnected World
'Resilience' is defined as one's capacity to recover quickly from difficulties or challenges, and it's not surprising that the word is now part of the IT and cybersecurity industry's vocabulary. As the world becomes hyper-connected--it is expected that there will be 20 billion internet-connected things by 2020--the challenges lie not just with minimizing its associated risks, but with maximizing its opportunities. The cloud as we know it is expanding, and cybersecurity skills and expertise should expand with it, too. This thematic keynote presentation will discuss the recent trends and developments in the computing landscape, and how robust, innovative solutions--along with built-in cybersecurity mindset and processes--can help organizations build cyber resilience against newer and more sophisticated cyber-attacks.
Steve Anson, SANS Instructor
Steve Anson is a Director with Forward Defense, a leading IT security and incident response company headquartered in Abu Dhabi. Previously, he served as a special agent with the US Department of Defense and on an FBI Cyber Crime Task Force, leading complex investigations into cyber-related offences including network intrusion incidents, terrorism, fraud and crimes against children. Steve also served as an instructor at the FBI Academy and for the US Department of State, providing network intrusion investigation and digital forensics training to thousands of students from US law enforcement agencies as well as national police, prosecutors and judges from dozens of countries.
Throughout his career, Steve has received a number of industry credentials, including Certified Information Systems Security Professional (CISSP), EnCase Certified Examiner (EnCE), Cellebrite Certified Mobile Examiner (CCME), US Department of Defense Certified Computer Crime Investigator and US Federal Law Enforcement Training Center Seized Computer Evidence Recovery Specialist (SCERS). He has served as an Adjunct Professor for George Washington Universitys Master of Computer Forensics program, is a certified Lead Assessor for laboratory competence in ISO 17025:2005 with the American Association for Laboratory Accreditation, and is the co-author of Mastering Windows Network Forensics and Investigations from Wiley Publishing.
For more information: https://www.cloudsec.com/hk/#agenda
August 14, 2018 (8:45 - 12:30 pm)