Delta Risk Associate Jim Mitchell and The Chertoff Group Principal Adam Isles presented two strategic cyber sessions at Enfuse 2016.
Mitchell co-presented a seminar with Stephen Windsor (President and Founder of Maddrix) on the subject of Malicious Command & Control Systems. Isles joined a panel of legal experts to present on the topic of Why Time Is Not On Your Side When It Comes to Data Security.
Mitchell’s seminar dove deep into the anatomy of advanced threat actor command and control systems, along with a review of countermeasures these threat actors use to evade network detection. Among the threat actor command and control systems that were covered and demonstrated included a few samples of captured malware. Mitchell and Windsor also discussed how to identifyRemote Access Tools (RAT) without using traditional signatures or indicators of compromise, and they went through a demonstration for RAT tools that were captured within the last year.
Meanwhile, Isles (who advises clients on security program assessment, planning, and reporting) joined a group of speakers that included Scott Carlson (Partner, Seyfarth Shaw, LLP), Ed McAndrew (Partner, Ballard Spahr LLP), and Chris Dale (Founder, E-Disclosure Information Project). The discussion centered around best practices for preparing for and responding to privacy and security threats. Isles and the rest of the panel outlined how cyber risk is changing, and offered up approaches for managing and monitoring cyber risk. The panel concluded with discussion around how cybersecurity programs can become a business differentiator.
About Enfuse 2016
This year’s Enfuse Conference took place in Las Vegas at Caesar’s Palace from May 23-26. The three-day endpoint security and digital investigations event explored a wide range of cybersecurity, digital forensics, and e-discovery issues through 100 interactive sessions and hands-on workshops.
Top 10 Cyber Incident Pain Points. Are you Prepared?
To learn more about how your organization can stay proactive to respond to cyber threats, download our white paper, Top 10 Cyber Incident Pain Points.