The Pivot
In today’s threat landscape, the attacker is an insider. Whether a state-sponsored actor or cybercriminal, attackers typically first compromise the endpoint with a client-side exploit and then pivot. In this session, we take a deep dive into how attackers pivot through organizations, identify the telltale signs of a pivot, and most importantly, identify steps for defending against it.
Speaker
Jonathan Trull (@jonathantrull)
Jonathan Trull is currently the VP – Information Security for Optiv and previously held the CISO role for Qualys. Before joining Qualys, he was the CISO for the State of Colorado, where he oversaw the information security operations for 17 executive branch departments. He formed the state’s first Cyber Crime Task Force, charged with conducting criminal investigations into computer crimes, developing and sharing cyber-intelligence, and working with local government and private sector partners to increase cyber-resiliency. He is a Certified Information Systems Auditor, Offensive Security Certified Professional, and was recently named by the SANS Institute as one of the 2013 People Who Made a Difference in Cybersecurity. He also teaches at Regis University in the Information Assurance Program.
Detailed Presentation
Comments