Friday Virtual Schedule

Click This Link For the Latest Schedule!

Friday, March 20, 2020

1:00 - 1:30

opening remarks 

1:30 - 2:00 - keynote

Tony Blackham

Friday 2:00 - 2:30 - Where's my dough?! - A look at webskimming attacks

The session is about an emerging threat called web-skimming that has been used to compromise millions of credit cards. Attendees will learn about innovative techniques hackers have used to steal credit cards from e-commerce websites and what developers should do to prevent web-skimming attacks.

-Siddarth Coontoor

Friday 2:30 - 3:00 - Cloud-Based Contextual Analysis as Code

Explore the power behind software defined contextual analysis in the cloud that allows DevOps and Security teams to be more proactive without disrupting their day to day operations. 

-Erkang Zheng

Friday 3:00 - 3:30 - Rendering Ransomware Detection and EDR Products Blind

This talk will cover a Windows evasion technique called “RIPlace” that, when used to maliciously alter files, bypasses most existing ransomware protection technologiesI will review existing ransomware detection methods, the workflow of a typical ransomware and provide a live demo of RIPlace bypassing a number of anti-ransomware technologies.

-Rene Kolga

Friday 3:30 - 4:00 - A Chain Is No Stronger Than Its Weakest LNK

Attackers continue to abuse Windows shortcut (LNK) files to gain initial access to their targeted networks, maintain persistence, and execute malicious scripts. This presentation will familiarize practitioners with the ways in which adversaries abuse LNK files, why detection rates for malicious LNK files are so poor, and provide them with the knowledge to hunt for and detect this behavior in their environment.

-David French

Friday 4:00 - 4:30 - Crypto-Agility: Responding Quickly to Cyber Security Events 

Today, organizations rely heavily on TLS and other encryption protocols to protect data inside and outside their network boundaries. To achieve crypto-agility, organizations must not only be able to quickly respond to mass certificate replacement events but must also be able to demonstrate policy compliance of all certificates and identify any anomalies.

-David Brancato

Friday 4:30 - 5:00 - How to Use Code Signing to Protect Your Critical Software Infrastructure 

In this session we will examine the risks of not signing internal software infrastructure code and the common challenges that businesses face when trying to roll out code signing to large audiences. We will provide best practices for how to effectively do this which is convenient for end users as well as satisfies the needs of the security team.

-Eddie Glen