Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Breakfast Briefing: Blurring The Lines Between Statecraft and the Global Criminal Underworld

Register Now

To view this magazine event you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

REGISTRATION IS NOW CLOSED

06 June 2018 - 08:30 - 11:30 BST - London

In partnership with Infosecurity Magazine, Crowdstrike is hosting an important breakfast briefing looking at how nation-state cyberattacks find their way into the mainstream criminal world and how to defend against them.

The two biggest differentiators between a nation-state actor and a cybercriminal are capital and time. A nation-state actor can invest a significant amount of R&D to target an organisation and isn’t driven by a profit motive. Yet techniques adopted by nation-state actors invariably find their way into the mainstream criminal world and are therefore an indicator of what to prepare for.

Security teams in the private and public sector are increasingly recognizing the need to actively ‘hunt’ for threats targeting their organizations. In this briefing and by use of exemplar real-world attacks, we outline the critical steps of defence and proactive threat hunting that must occur if companies are to aggressively seek out sophisticated threat behaviours that elude even the best automated security systems.

This briefing is suitable for information security decision-makers including CISO, CIO, SOC manager; mid-level information security management including SOC managers and technical information security practitioners including SOC analysts. CPE credits are available for this workshop.

Places are limited, don't miss out register now -------->

TIME

TOPIC

0830 – 0900

Reception and breakfast.

0900 - 0945

MISHA GLENNY, author of McMafia will discuss the geo-political and macro-economic trends in cybersecurity along with predictions for the years ahead.

0945 - 1015

GEORGE KURTZ will discuss recent global attacks and advanced targeted intrusions. Mr Kurtz will also provide insight into the macro cybersecurity trends that are being tracked by CrowdStrike today.

1015 – 1045

STEVE BENTON, General Manager of BT Security. Mr. Benton will describe the trends, tactics, techniques and procedures that are routinely deployed against this global telecommunications company and its clients and how he responds to increasing sophisticated cyber-attacks.

1045-1115

ERIC SHEEHAN will discuss his experience in defending one of the UK’s major airports from cyber-attack. Mr. Sheehan will share with his peers the practical insights and lessons learnt in implementing a robust and resilient cyber strategy.

1115 – 1130

Q&A Followed by refreshments.

Brought to You by

Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.