• HOME
  • SERVICES
    • CYBER SECURITY
    • RISK MANAGEMENT
    • DATA PRIVACY
    • PROCESS IMPROVEMENT
    • CHANGE MANAGEMENT
    • TRAINING
  • ABOUT
    • ADVANTAGES
    • METHODOLOGIES
    • A + RESULTS
    • CLIENTS
    • SPEAKING/WRITING
    • MISSION-VISION-VALUES
    • TEAM
    • PRESS RELEASES
  • CONTACT
  • BLOG
  • PODCAST

Secure360 Inspires Collaboration and Innovation: Three Best Talks

8 years ago
abstractfwd1987
No Comments

The Secure360 Conference is happening in Minneapolis next week from 05/15/18 to 05/17/18. It is the professional conference of choice for comprehensive security, risk management and collaboration education for your entire team. It focuses on the following areas: cybersecurity, governance, risk and compliance, physical security, business continuity management and professional development. I am attending for the third time because it only gets better every year and I desire to be a part of the solution. Here are my three top talk picks. I am presenting this year on 05/16/18 at 2:30pm. Hope to see you there.

1. BlockChains are Coming! Forewarned is Forearmed! 05/16/18 at 11:00am.

What is this blockchain thing and why is everyone losing their minds over them? The distributed ledger technology underpinning Bitcoin has an amazing ability to completely disrupt knowledge management where “consensus” is required. In this session, nationally-recognized blockchain expert David Duccini and Zach Robbins, a crypto-savvy securities attorney, will lay out the value proposition for the coming era when distributed ledgers aka blockchains will be used for everything from patch management, identity and reputation to making wall street obsolete. This isn’t your brother’s Bitcoin (well it is…but so much more)! Let’s slice through the hype and hyperbole and build criteria in preparation for the time when it makes sense to irrevocably replicate data, potentially forever.

Key learning points:

  • What is a blockchain and why should I care?
  • When does using a blockchain make sense?
  • I need a blockchain! Which one should I use?
  • Am I being scammed? Does my blockchain need a cryptocurrency?

2. Is Your Security Cyber-Secure? 05/15/18 at 1:00pm.

With the 20-year anniversary of the invention of the IP camera the IT industry and organizations around the world are becoming more aware of the vulnerabilities that these types of devices bring with them. From Mark Bonde this session will outline the vulnerabilities that exist within physical security solutions, the risks that these vulnerabilities pose to organizations and ways in which you can mitigate against these risks moving forward.

Key learning points:

  • Identify risks associated with current physical security system.
  • Strategies for improving the security of a physical security system.
  • Strategies for ongoing monitoring of physical security system from cyber attacks.

3. Precursor Detection of Data Exfiltration: 05/16/18 at 2:30pm.

Presented by Jeremy Swenson. There are few proven tools and methodologies for reliable early detection of data exfiltration. Most organizations are likely to be breached in some way, and although there are many reliable indicators of compromise (IOCs), they are complex, constantly changing, and are not specific enough. These indicators have not been credibly tied to precursors to data exfiltration in an effective way. In fact, on average, it takes an organization 99 days to discover network penetration and 201 days for data exfiltration to be discovered.

In this session, we will identify and corroborate the precursors for early mitigation of the next large complex data breach using a 6-pronged approach to mitigation.

Key learning points:

  • With a simple script or installed tool, external hackers or malicious insiders can quickly discover encryption keys.
  • Split tunneling exploits can be ripe for DNS spoofing allowing a covert data exfiltration tunnel out.
  • Poorly configured systems with web facing vulnerabilities happen very often during M&As (mergers and acquisitions) which is exacerbated by too much complexity.

To learn more about Abstract Forward Consulting contact us here.

Previous Post
Key Updates to the NIST Cyber Security Framework
Next Post
Chinese Hackers Stole About 614GB of Data from Unnamed U.S. Navy Contractor

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

The reCAPTCHA verification period has expired. Please reload the page.

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.
X
LinkedIn

Recent Posts

  • The Importance of the 3-2-1 Back-Up Method.
  • No Interview Needed to Join Microsoft After Getting Fired From OpenAI – Sam Altman.
  • Seven Cyber-Tech Observations of 2022 and What it Means for 2023.
  • The Main Purpose of Cryptocurrency Mixer and/or Splitter Services is Fraud and Money Laundering.
  • Top 16 Ways SMBs Can Mitigate Cyber Risks and Threats.

Recent Comments

  • Abstract Forward Partners with Ignyte on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Abstract Forward Partners with Ignyte | Ignyte Assurance Platform on Abstract Forward Partners With Newer Cyber GRC Tool: Ignyte Assurance Platform
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Social Tech CEO Jimmy Chamberlin Rejoins Smashing Pumpkins
  • Michael Kirk Please Interview US for your new Prince movie “Prince: R U Listening”! | Economic, Technology, & Marketing Thought Leadership on Prince and Purple Rain 30 years later: Business and Music Innovation
  • brianfpennington on Demystifying 9 Common Types of Cyber Risk

Archives

  • November 2023
  • January 2023
  • June 2022
  • April 2022
  • January 2022
  • June 2021
  • December 2020
  • August 2020
  • March 2020
  • January 2020
  • August 2019
  • March 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • December 2017
  • November 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • July 2016
  • May 2016
  • March 2016
  • February 2016
  • August 2015
  • June 2015
  • February 2015
  • January 2015
  • December 2014
  • August 2014
  • May 2014
  • April 2014

Categories

  • 2016 election hack
  • 2016 tech review
  • 360 net lab
  • 80s music
  • Alternative music
  • Amazon
  • Android
  • apple
  • arlines hack
  • artificial intelligence
  • Billy Corgan
  • Bitcoin security
  • british airways breach
  • Business
  • business analysis
  • business continuity
  • Chinese hackers
  • cloud computing
  • CoinHive
  • Coronavirus malware
  • COVID-19 scams
  • crypto mixing
  • Crypto Money Laundering
  • crypto-jacking
  • currency
  • cyber insurance
  • Cyber Security
  • cyber security framework
  • Cyber-Espionage
  • Cybersecuity summit
  • data back up
  • data breach
  • Data Exfiltration Detection
  • data security
  • Denial of Service (DoS) Attacks
  • Direct x12
  • disinformation
  • drones
  • election security
  • equifax breach
  • esports security
  • EU Privacy
  • FDIC
  • federal reserve
  • GDPR
  • gdpr test british airways breach
  • google glass
  • Google Mandiant
  • grc
  • GroupOn
  • iam
  • Ignyte Assurance Platform
  • iphone
  • Jimmy Chamberlin
  • leadership vs. management
  • LinkedIn
  • Live Streaming
  • LiveOne
  • Lumia Phone
  • management consulting
  • Microsoft
  • microsoft azure
  • Microsoft Continuum
  • MikroTik Routers
  • MN Start-Up
  • mobile os
  • mobile web
  • NASA
  • navy cyber hack
  • net neutrality
  • network intrusion
  • OpenStack
  • PBS Frontline
  • personal aircraft
  • phone market share
  • Prince: R U Listening
  • project management
  • Project Sparta
  • Purple Rain
  • Rackspace
  • ransomware
  • ransomware removal
  • retail
  • risk management
  • Salesforce
  • self driving cars
  • small business
  • small business cyber security
  • Smashing Pumpkins
  • SME Infosec
  • Social Media
  • socrates
  • sony pictures
  • stalkerware
  • Stuxnet
  • target
  • Tech Year In Review
  • third party risk management
  • Unit 61398
  • vendor risk mgmt
  • video surveillance
  • Web App Attack
  • WEP vs WPA2
  • Windows 10

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

All rights reserved © 2018 to present. Abstract Forward Consulting, LLC. Privacy Policy | Terms of Service | Web Accessibility | Sitemap.