Two years of Applying ITSG-33: Report from the Trenches

François Marinier As an IT security analyst, I have spent most of the past two years applying key processes and activities of ITSG-33 to real-life IT projects. From new infrastructure services to mission-critical business applications to changes to existing information systems, I had many opportunities to put ITSG-33 guidance to the test and

Read more

Rebuilding the Credibility of a Security Team

Paul Davis Many CISOs/CSO and Directors of Security Operations are facing the challenge of increased expectations, misplaced assumptions of responsibility and limited resources to deliver success.  This leads to increased frustration within the security teams who are striving to protect their organizations. The

Read more

SMASH the Status Quo to Increase National Cybersecurity

John Weigelt While security guidelines, frameworks, certifications, evaluations and other documentation often provides comprehensive direction of safeguards and controls, getting the guidance implemented by organizations at a national scale is difficult.  Despite the availability of security guidance since the 80s, even large technology

Read more

Using WEBINT to Identify Critical Infrastructure Risks

Scott Donnelly WEBINT analysis can identify the targeting trends and methodologies of both cyber state actors and hacktivists.  Recent Recorded Future analysis identified multiple instances where hacktivist operations have opened the door for state directed attacks.  This presentation will discuss how APTs can leverage exposed

Read more

Open-source Security in the Era of Heartbleed

Nelson Ko and Sherif Koussa Recent zero-days in popular open-source software have led to a lot of controversy, an old debate fueled by the Heartbleed bug. The old question was: Is open-source software really more secure than closed-source? However, with open-source adoption rates on the rise in the enterprise especially in the Government

Read more

Investigating PowerShell Attacks

Ryan Kazanciyan and Matt Hastings Over the past two years, we’ve seen targeted attackers increasingly make use of PowerShell to conduct command-and-control in compromised Windows environments. If your organization is running Windows 7 or Server 2008 R2, you’ve got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by

Read more