Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Breakfast Briefing: Blurring The Lines Between Statecraft and the Global Criminal Underworld

Read Now

To read this magazine event you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

06 June 2018 - 08:30 - 11:30 BST - London

In partnership with Infosecurity Magazine, Crowdstrike is hosting an important breakfast briefing looking at how nation-state cyberattacks find their way into the mainstream criminal world and how to defend against them.

The two biggest differentiators between a nation-state actor and a cybercriminal are capital and time. A nation-state actor can invest a significant amount of R&D to target an organisation and isn’t driven by a profit motive. Yet techniques adopted by nation-state actors invariably find their way into the mainstream criminal world and are therefore an indicator of what to prepare for.

Security teams in the private and public sector are increasingly recognizing the need to actively ‘hunt’ for threats targeting their organizations. In this briefing and by use of exemplar real-world attacks, we outline the critical steps of defence and proactive threat hunting that must occur if companies are to aggressively seek out sophisticated threat behaviours that elude even the best automated security systems.

This briefing is suitable for information security decision-makers including CISO, CIO, SOC manager; mid-level information security management including SOC managers and technical information security practitioners including SOC analysts. CPE credits are available for this workshop.

Places are limited, don't miss out register now -------->

TIME

TOPIC

0830 – 0900

Reception and breakfast.

0900 - 0945

MISHA GLENNY, author of McMafia will discuss the geo-political and macro-economic trends in cybersecurity along with predictions for the years ahead.

0945 - 1015

GEORGE KURTZ will discuss recent global attacks and advanced targeted intrusions. Mr Kurtz will also provide insight into the macro cybersecurity trends that are being tracked by CrowdStrike today.

1015 – 1045

STEVE BENTON, General Manager of BT Security. Mr. Benton will describe the trends, tactics, techniques and procedures that are routinely deployed against this global telecommunications company and its clients and how he responds to increasing sophisticated cyber-attacks.

1045-1115

ERIC SHEEHAN will discuss his experience in defending one of the UK’s major airports from cyber-attack. Mr. Sheehan will share with his peers the practical insights and lessons learnt in implementing a robust and resilient cyber strategy.

1115 – 1130

Q&A Followed by refreshments.

Brought to You by