SIGS Special Interest Group
19th SOC Forum

Save the DateClick on the .ics file to save the date


Target Audience Security Operations Center Professionals
CIO’s, CISO, IT Manager, Security Officer, Security Architects and Engineers – all from end customer side who are interested in IT Security

From Consultancies and Resellers/ Integrators are only technical peoples (which are involved in the Security Operation Processes) allowed to take part – max. one participant per company. Vendors and people with a Sales/Marketing role are not authorized as participants.

If you are not on the dedicated invitation list and you like to take part in this community and get the invitations, please fill out the application form.

CPE Credits Earn 4.5 CPE (Continuing Professional Education) for attending this SIGS forum. Please request a confirmation.
Location Hilton Zurich Airport Hotel
Hohenbuehlstrasse 10
8152 Opfikon-Glattbrugg

There are a lot of free park places available.
Train: railway station Zurich Airport – take the hotel shuttle

Date of Event 10th March 2020
Further planned date in 2020: 23rd June, 15th September and 1st December 2020
Language English
Participation Costs Fr. 55.— per participants
Organization, presentations, beverages and Apéro riche included

 
Agenda

 

1:30 – 2:00 pm Registration & Coffee
2:00 – 2:00 pm Welcome from the moderator
2:00 – 2:30 pm David Anumudu, Solutions Architect at Flashpoint
David’s IT career includes 18 years working in a wide range of roles including software development, product management and scalability testing, and 12 years in software security and risk intelligence. David’s role as a Solution Architect for Flashpoint involves working with both enterprise and public sector customers across EMEA to help them develop and drive their risk intelligence activities, giving them unique insight in to a diverse and illicit landscape encompassing both cyber and physical threats.

Secrets of Illicit Forums: Actionable insights from cybercrime communities
Each and every organisation is facing a complex range of threats through multiple channels, both cyber and physical. A critical piece of this puzzle is a thorough understanding of threat actor motivations, tactics, techniques, and procedures that can be gleaned from online illicit communities. In this presentation David Anumudu, Solutions Architect for Flashpoint describes:

  • What does Risk Intelligence actually mean?
  • How do illicit communities operate?
  • Is my organisation mature enough to gain value from intelligence products?
2:30 – 3:00 pm Rudolf Maculan, Security Consultant – Cyber Defense Services at Accenture

Adversarial AI and It’s Implications for the Security Operations Center
Artificial intelligence technologies have demonstrated huge potential for cyber security applications, such as Intrusion Detection Systems that leverage machine learning for anomaly detection. While security software providers usually do not fall short in promoting machine learning capabilities of a particular product, less attention is usually paid to the malicious use of artificial intelligence. This talk gives an introduction to so called Adversarial AI, explores SOC-relevant threat scenarios and describes how methods employed by malicious actors can be used to craft adversarial samples of cyber alert data to tackle the challenge of class imbalance – a ubiquitous characteristic of datasets within the realm of cyber security.

3:00 – 3:30 pm Thomas Spinnler, Senior Consultant at Pyopa Cyber Security

MITRE ATT&CK from the Trenches
When it comes to managing SIEM detections, evaluating products or consuming threat intelligence, MITRE ATT&CK can be very helpful. While most cyber security people already know the name, detailed knowledge and practical experience is much less widespread. This presentation aims to provide a more in-depth view and give practical tips on how to make use of MITRE ATT&CK.

  • What is MITRE ATT&CK really?
  • How and for what can it be used?
  • Lessons learned from real-world scenarios
3:30 – 4:15 Coffee Break
4:15 – 5:00 Roundtable Discussions
3 different tables to discuss different topics. You can chose the one you like to attend and we will change the tables one time

–> Roundtable 1
moderated by David Anumudu, Solutions Architect at Flashpoint

Follow up “Secrets of Illicit Forums: Actionable insights from cybercrime communities”
_______________________________________________________________________

–> Roundtable 2
moderated Thomas Spinnler, Senior Consultant at Pyopa Cyber Security

Follow up “Follow-up “MITRE ATT&CK from the Trenches””

  • Extra Q&A time regarding the presentation
  • MITRE ATT&CK is one approach, what others do exist?
  • Practical experiences?

_______________________________________________________________________

–> Roundtable 3
moderated Corelight

(details will follow)”
.

5:00 – 5:45 2nd turn – change to another table

5:45 – 6:30 3rd turn – change to another table

 


The Sponsor of this event is:

Main Sponsor Co-Sponsor

Registration

This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.

Register here!


With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share it for use with its event partners and event sponsors of this platform. In addition, we share the contacts as well with the community itself.

Earn CPE Credits for
attending SIGS Events
 

Registration here!

If it’s the first time you like
to attend, please send us in addition your application
email