Search Results for "2017"

Silver Sponsor Feature: Palo Alto Networks

www.paloaltonetworks.com

@PaloAltoNtwks

pan-logo-badge-green-dark-kick-up.jpg (1650×1050)

As the next-generation security company, we are leading a new era in cybersecurity by safely enabling all applications and preventing advanced threats from achieving their objectives for tens of thousands of organizations around the world. We are one of the fastest growing security companies in the market because of our deep expertise, commitment to innovation, and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating our Next-Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud.

Come see us at RVAsec! Register Now.


Speaker Feature: Alon Arvatz

www.intsights.com

Alon Arvatz runs products at IntSights.  Prior to co-founding IntSights, Alon had was a cyber security professional in the military and private sector.  Alon started his career serving in an elite intelligence unit in the Israel Defense Forces.  Then, Alon joined Guy Nizan to establish Cyber School, a center providing teenagers with courses, seminars and summer camp workshops on cyber intelligence.  Hoping to help enterprises capitalize from his experience, he co-founded IntSights to make threat intelligence programs a reality for enterprises around the world. When not defending companies from hackers, Alon spends time with his very cute family.

OSINT: The Secret Weapon in Hunting Nation-State Campaigns

Discussing real use cases of state actors engaged in APT campaigns, explore what can be done with the available intelligence tools we have today, specifically from the Dark Web.

Come see me at RVAsec 2017. Register Now!


Hotel Update

As we mentioned previously, RVAsec continuously looks for ways to improve the conference and this year we decided to move the official conference hotel.  We picked a place called The Graduate, which is scheduled to be a brand new hotel closer to the conference location.

Well, due to some unforeseen issues, they will not be open in time for RVAsec, and we have had to make some last minute changes!

The official conference for RVAsec 2017 is now the Quick Hotel.

We have moved all existing reservations over and were able to honor the initial price.  We only have a few rooms remaining as part of the block at the Quirk Hotel for out of town guests or anyone that would prefer to stay downtown. The rate is $179/night (which does NOT include parking).

You can either book online or call the hotel.

HILARY LAWHON, DIRECTOR OF RESERVATIONS, 703-729-4011

201 W Broad Street
Richmond, Virginia 23220


 

The Quirk hotel does NOT have a shuttle to the event.  It is about a 5 minute taxi/Uber ride or 15 minute walk to the conference.  Several other hotels in the area such as Crowne Plaza have a shuttle which may be used in the morning and evening for transportation to the conference. Please confirm when making your reservations and note that you must coordinate directly with the hotel for transportation.

If for any reason you are unable to get the RVAsec rate or the block of rooms has been filled, please let us know and we can try to assist.

Make sure you check out information on getting to the conference.


Silver Sponsor Feature: Qualys

www.qualys.com/

@qualys

Qualys

Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 100 countries, including a majority of each of the Forbes Global 100 and Fortune 100. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and web applications. Founded in 1999, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance (CSA).

Come see us at RVAsec! Register now.

 


Speaker Feature: Robert Mitchell

rrmitch@sandia.gov

Robert Mitchell is currently a member of technical staff at Sandia National Laboratories. He received his Ph.D, M.S. and B.S. from Virginia Tech. Robert served as a military officer for six years and has over 10 years of industry experience, having worked previously at Boeing, BAE Systems, Raytheon and Nokia. His research interests include linkography, moving target defense, computer network operations, network security, intrusion detection and cyber physical systems. Robert has published 19 peer reviewed articles.

Recent Developments in Linkography Based Cyber Security

Cyber attacks on critical cyber systems are not decreasing in frequency or complexity. Aggressors choose the time and place of these engagements; protectors must identify, research and develop defensive techniques that provide an asymmetric advantage. A static, data-driven, preventative, automated defense is a losing strategy; an effective defense must be dynamic, behavioral, responsive and capitalize on a human in the loop. We propose human and machine performed linkography to detect, correlate, attribute and predict attacker behavior and present a moving, deceptive target. Recently, our team generated a technology transfer strategy for linkography based cyber security, proposed algorithms to extract and refine linkograph ontologies and subsessionize our input stream and completed our previous related machine learning work. Linkography has been in the literature for decades, and our investigation indicates it is an open, fertile topic for basic and applied cyber security research.

Come see me at RVAsec 2017. Register Now!


Speaker Feature: Robert Wood

bwood@nuna.comIMG_-jj4umt-3.jpg (2197×2197)

robertwood50

Robert Wood runs the security team at Nuna Health, whose core directive is to protect one of the nation’s largest collective healthcare data sets. Previously, Robert was a Principal Consultant at Cigital where he founded and led the red team assessment practice and worked with strategic clients across the United States in an advisory capacity.

Maintainability + Security = <3

The security and devops culture craze is all around us, even with all this talk though there are differences between security features and the maintainability of a system. This talk will focus on some real world examples of what can go wrong when a system isn’t built with maintainability in mind in a security minded culture. We will cover the political positioning battles that emerge, how security leaders can manage risk in these situations, and of course the technical challenges that creep into the picture over time.

Come see me at RVAsec 2017. Register Now!


Speaker Feature: Dan Holden

dan.holden@r-cisc.org

@desmondholden

Dan Holden is the CTO and Intelligence Director at R-CISC, the retail ISAC, where he focuses on new technology and service development as well as threat intelligence production and exchange. Previously he was the Chief Technology Strategist and Director of ASERT, Arbor’s Security Engineering and Response Team at Arbor Networks. There he was responsible for future product direction and security threat intelligence integration. He also led the team who oversees the ATLAS global security intelligence database, and are responsible for threat landscape monitoring and Internet security research including the reverse engineering of malicious code. He also managed the development and delivery of security content and countermeasures for Arbor’s industry leading DDoS technologies. Prior to Arbor, Dan was director of TippingPoint’s DVLabs and a founding member of IBM/ISS X-Force. While at TippingPoint, Dan grew the DVLab’s organization into a mature security research and development team delivering security content, intelligence portals, and reputation technology as well as overseeing the Zero Day Initiative (ZDI) program. Dan also helped build and define X-Force over the course of 12 years in various capacities ranging from development to product management. Dan has been in the security industry for over two decades specializing in vulnerability analysis, security research, and technology incubation. Dan is a frequent speaker at major industry conferences and has been quoted and featured in many top publications, radio and television.

Retailing Another Threat Landscape Story

Over the last several years, retail breaches have become some of the highest profile stories, but just like any other vertical target, the day-to-day offense and defense continues to evolve. The ebbs and flows of attackers and defenders don’t always make the news, which is a good thing, but what does the daily routine look like on the retail front? And, why should you care? You should care because at some level or another, we are the potential defenders, or consumers of these organizations, and retail has now become part of the modern attacker infrastructure.

Come see me at RVAsec 2017. Register Now!


Speaker Feature: Troy Marshall

troy.marshall@ellucian.comRTM.JPG (897×1173)

@rtroymarshall

How do you answer when someone asks what you do for a living? Troy Marshall’s answer—“I don’t make software, I make software better”—explains his career helping organizations build and scale programs to improve the quality, security, and performance of their software and systems. Troy is currently the Director, Application Security and Reliability in the Ellucian DevOps group where he focuses on helping development teams rapidly deliver highly secure and reliable SaaS solutions. Connect with Troy on LinkedIn and Twitter.

RoboCop- Bringing law and order to CICD

In the movie, RoboCop is given three primary directives: “Serve the public trust, Protect the innocent, and Uphold the law”. We built our own RoboCop in order to bring law and order to our CICD pipeline. DevOps practices are all about enabling fast and frequent delivery of new software. In order to keep pace in a DevOps culture, application security must be reliably integrated into the CICD pipeline.
In this talk, we will show how our small AppSec team combined automated tools along with human oversight in order to achieve our directives at scale, while winning the hearts and minds of our development teams.

Come see me at RVAsec 2017. Register Now!


Speaker Feature: Daniel Bohannon

daniel.bohannon@mandiant.com

@danielhbohannon

Daniel Bohannon is a Senior Incident Response Consultant at MANDIANT with over six years of operations and information security experience. His particular areas of expertise include enterprise-wide incident response investigations, host-based security monitoring, data aggregation and anomaly detection, and PowerShell-based attack research and detection techniques.
As an incident response consultant, Mr. Bohannon provides emergency services to clients when security breaches occur. He also develops new methods for detecting malicious PowerShell usage at both the host- and network-level while researching obfuscation techniques for PowerShell-based attacks that are being used by numerous threat groups.
Prior to joining MANDIANT, Mr. Bohannon spent five years working in IT operations and then leading the incident response team for an organization in the private retail industry.
Mr. Bohannon received a Master of Science in Information Security from the Georgia Institute of Technology and a Bachelor of Science in Computer Science from The University of Georgia.

Invoke-CradleCrafter: Moar PowerShell obFUsk8tion & Detection (@(‘Tech’,’niques’) -Join ”)

PowerShell is increasingly being used by advanced attackers and script kiddies alike in targeted attacks, commodity malware, and even ransomware. The most common usage involves PowerShell remotely downloading and running payloads entirely in memory, rendering many traditional detection mechanisms useless.
Detection has increasingly shifted to monitoring for this malicious activity via process command line arguments and parent-child process relationships. While this is a significant improvement there are numerous evasion techniques of which the Red Team and Blue Team should be aware.
For the past 1.5 years I have researched PowerShell obfuscation, evasion and advanced detection techniques. Picking up from where I left off in my recent presentations on Invoke-Obfuscation, in this presentation I will highlight my new tool Invoke-CradleCrafter. Additionally, I will introduce a new family of PowerShell obfuscation techniques and show how they can be applied to several new and obscure families of remote download cradles.

Come see me at RVAsec 2017. Register Now!


Speaker Feature: Ken Johnson

ken@nvisium.cominformal_Ken_Johnson.jpg (800×533)

@cktricky

Ken Johnson, CTO of nVisium, has been hacking web applications professionally for 8 years. Ken is both a breaker and builder and currently leads the nVisium product team. Previously, Ken has spoken at DerbyCon, AppSec USA, RSA, AppSec DC, AppSec California, DevOpsDays DC, LASCON, RubyNation, and numerous Ruby, OWASP, and AWS events. Ken is currently investing his time between OWASP’s Railsgoat, Elxir and Go, as well as all aspects of AWS offerings. Twitter: @cktricky

AWS Survival Guide 2.0

In this talk, we discuss harnessing existing AWS functionality to strengthen your organization’s AWS infrastructure against practical attacks. Ken will show you what attackers are looking for, how they are finding you, and how to secure your environment. Additionally, attendees will be given code that assists those using AWS in better understanding how their environment’s IAM policies are configured and automate tasks like S3 bucket policy review, volume encryption statuses, and security group configurations.

Come see me at RVAsec 2017. Register Now!