Threat Detection and Incident Response Conference 2023

www.news4hackers.com-threat-detection-and-incident-response-conference-2023-threat-detection-and-incident-response-conference-2023

Threat Detection & Incident Response Strategies Emerge Amid Rapidly Evolving Cyber Threat Landscape

The pace of sophisticated cyberattacks has surpassed traditional defensive measures, underscoring the need for advanced threat detection and incident response strategies.

Breach Response: What Actually Works When the Worst Happens

Experts gathered for a panel discussion, sharing their experiences and insights on effective breach response. Joe Sullivan, former CSO at Uber, stressed the need for unfiltered, immediate action when responding to a breach. He emphasized the importance of assembling a team of experts and communicating transparently with stakeholders.

According to Joe Sullivan, “Assembling a team of experts and communicating transparently with stakeholders is crucial when responding to a breach.”

Living Off the Web: Why Internet Visibility Is Critical to Modern Security Operations

Andrew Northern and Raj Sivasankar, Censys, discussed the critical role of internet visibility in securing modern operations. They argued that visibility into web traffic, IoT devices, and other connected systems is essential for identifying potential threats and preventing attacks.

According to Andrew Northern and Raj Sivasankar, “Visibility into web traffic, IoT devices, and other connected systems is essential for identifying potential threats and preventing attacks.”

From Signals to Action: AI-Driven Observability for Modern Threat Detection

Sasi Kiran Malladi, Principal at Amazon, presented his work on AI-driven observability for modern threat detection. His approach leverages machine learning algorithms to analyze system logs, network traffic, and user activity, enabling more efficient and effective threat hunting.

According to Sasi Kiran Malladi, “AI-driven observability can help organizations detect and respond to emerging threats before they spread.”

Prompt Fraud: The Emerging AI Attack Vector Undermining Detection, Audit, and Trust

Karishma Velisetty, Data Analytics Manager at Spotify, delved into the realm of prompt-based attacks, which exploit natural language processing capabilities. She explained how these attacks can bypass traditional security controls, highlighting the need for organizations to incorporate AI-specific defenses into their security posture.

Weaponizing AI for Cyber Defense: Journey to the Agentic SOCP

Edward Wu, Founder & CEO of Dropzone AI, described the evolution of AI-powered cybersecurity solutions. He advocated for a shift towards agent-based security, where agents operate independently within the network to identify and respond to threats.

According to Edward Wu, “Agent-based security can enable real-time detection and mitigation, reducing the window of opportunity for attackers.”

The Detection Gap: Why AI-Powered Attacks Are Winning Against Legacy Security

Jesus Garcia, Solutions Architect at Abnormal AI, discussed the limitations of legacy security systems. He argued that these systems struggle to keep pace with the rapid evolution of AI-powered attacks, leaving a significant detection gap.

Leveraging Threat Intelligence Without Drowning: The Zero Noise Approach

Yotam Meitar, Director of Cloud Response at Wiz, introduced the concept of zero noise approach to threat intelligence. This method involves filtering out irrelevant data and focusing on high-fidelity signals, allowing organizations to make informed decisions based on actionable intelligence.

From Detection to Decision: Why SAST-DAST Correlation Is the Missing Link in AppSec

Katie Norton, Research Manager, DevSecOps & Software Supply Chain Security at IDC, discussed the importance of correlating static application security testing (SAST) and dynamic application security testing (DAST). She argued that this correlation is the missing link in ensuring comprehensive app security.

After the Case Closes: Turning Fraud Investigations into Predictive Intelligence

Jackie Wadhwa, Head of Product, Cybersecurity & Risk Mitigation at Digital Element, showcased her company


About Author

en_USEnglish