Threat Detection and Incident Response Conference 2023
Threat Detection & Incident Response Strategies Emerge Amid Rapidly Evolving Cyber Threat Landscape
The pace of sophisticated cyberattacks has surpassed traditional defensive measures, underscoring the need for advanced threat detection and incident response strategies.
Breach Response: What Actually Works When the Worst Happens
Experts gathered for a panel discussion, sharing their experiences and insights on effective breach response. Joe Sullivan, former CSO at Uber, stressed the need for unfiltered, immediate action when responding to a breach. He emphasized the importance of assembling a team of experts and communicating transparently with stakeholders.
According to Joe Sullivan, “Assembling a team of experts and communicating transparently with stakeholders is crucial when responding to a breach.”
Living Off the Web: Why Internet Visibility Is Critical to Modern Security Operations
Andrew Northern and Raj Sivasankar, Censys, discussed the critical role of internet visibility in securing modern operations. They argued that visibility into web traffic, IoT devices, and other connected systems is essential for identifying potential threats and preventing attacks.
According to Andrew Northern and Raj Sivasankar, “Visibility into web traffic, IoT devices, and other connected systems is essential for identifying potential threats and preventing attacks.”
From Signals to Action: AI-Driven Observability for Modern Threat Detection
Sasi Kiran Malladi, Principal at Amazon, presented his work on AI-driven observability for modern threat detection. His approach leverages machine learning algorithms to analyze system logs, network traffic, and user activity, enabling more efficient and effective threat hunting.
According to Sasi Kiran Malladi, “AI-driven observability can help organizations detect and respond to emerging threats before they spread.”
Prompt Fraud: The Emerging AI Attack Vector Undermining Detection, Audit, and Trust
Karishma Velisetty, Data Analytics Manager at Spotify, delved into the realm of prompt-based attacks, which exploit natural language processing capabilities. She explained how these attacks can bypass traditional security controls, highlighting the need for organizations to incorporate AI-specific defenses into their security posture.
Weaponizing AI for Cyber Defense: Journey to the Agentic SOCP
Edward Wu, Founder & CEO of Dropzone AI, described the evolution of AI-powered cybersecurity solutions. He advocated for a shift towards agent-based security, where agents operate independently within the network to identify and respond to threats.
According to Edward Wu, “Agent-based security can enable real-time detection and mitigation, reducing the window of opportunity for attackers.”
The Detection Gap: Why AI-Powered Attacks Are Winning Against Legacy Security
Jesus Garcia, Solutions Architect at Abnormal AI, discussed the limitations of legacy security systems. He argued that these systems struggle to keep pace with the rapid evolution of AI-powered attacks, leaving a significant detection gap.
Leveraging Threat Intelligence Without Drowning: The Zero Noise Approach
Yotam Meitar, Director of Cloud Response at Wiz, introduced the concept of zero noise approach to threat intelligence. This method involves filtering out irrelevant data and focusing on high-fidelity signals, allowing organizations to make informed decisions based on actionable intelligence.
From Detection to Decision: Why SAST-DAST Correlation Is the Missing Link in AppSec
Katie Norton, Research Manager, DevSecOps & Software Supply Chain Security at IDC, discussed the importance of correlating static application security testing (SAST) and dynamic application security testing (DAST). She argued that this correlation is the missing link in ensuring comprehensive app security.
After the Case Closes: Turning Fraud Investigations into Predictive Intelligence
Jackie Wadhwa, Head of Product, Cybersecurity & Risk Mitigation at Digital Element, showcased her company
