Copy of Copy of DarkSide, Pt. 2- Registration Page-1

Learn About DarkSide!

Earlier this year an as-of-yet unnamed actor targeted the Colonial Pipeline Company using the DarkSide ransomware. The attack crippled the largest energy pipeline in the United States, causing oil and gas shortages in several states. This attack altered the threat landscape, and could have been one of the most devastating ransomware attacks in history.

Join a team of some of the leading minds in threat hunting, threat intelligence, and business and industry as they dive into the DarkSide attacks from technical, business and industry perspectives!

 


Part 1

Part 2

Part 3

Topics covered during the webinar will include the following:

The webinar will provide technical insight into the following topics:

This webinar will be conducted in a discussion panel format

Copy of Untitled (5)
An recap of what we know so far about one of the most devastating ransomware attacks in history
Copy of Untitled (5)
Insight into how ransomware operations have evolved beyond simple lone wolf groups to include a variety of actors and service providers.
Copy of Untitled (5)
A walk-through of how the actors escalated privileges in the environment using LSASS process memory dumps.
Copy of Untitled (5)
Understand how the actors exploited CVE-2020-1472 & CVE-2021-20016.
Copy of Untitled (5)
Learn how the actors leveraged Rclone to conduct data exfiltration.
Copy of Untitled (5)
Along with practical hunting and detection strategies!
Copy of Untitled (5)
An overview of the tools and techniques the actors used in the attack.
Copy of Untitled (5)
A deep dive into the PowerShell-based .NET backdoor SMOKEDHAM that let the attacks establish their foothold.
Copy of Untitled (5)
A walk-through of how the actors escalated privileges in the environment using LSASS process memory dumps.
Copy of Untitled (5)
Understand how the actors exploited CVE-2020-1472 & CVE-2021-20016.
Copy of Untitled (5)
Learn how the actors leveraged Rclone to conduct data exfiltration.
Copy of Untitled (5)
Along with practical hunting and detection strategies!
Copy of Untitled (5)

Explore the impact that the attack on the Colonial Pipeline had on the broader threat landscape.

Copy of Untitled (5)

Dive in the effects of the administration's Executive Order on Improving the Nation's Cyber Security and what that means for businesses.

Copy of Untitled (5)

Gain insight into the threat posed to critical industries such as energy and public utility companies.

Copy of Untitled (5)

Understand how information sharing and analysis centers (ISACs) are critical in helping to secure industries.

Copy of Untitled (5)

Learn how proactive threat hunting enables organizations to hunt for, and detect, threats like ransomware before they strike.

Copy of Untitled (5)

Understand how taking a hybrid approach to threat intelligence can decrease actor dwell times.


Speakers

Join our panelists in this webinar to learn practical strategies organizations can put in place today to aid in the early detection of ransomware.

Brandon

Brandon Denker

Director of Threat Research at Cyborg Security

Brandon has over 13 years of experience in the field of cyber security, covering network and endpoint analysis, security operations management, threat intelligence and incident response. At Cyborg Security, Brandon heads the team of elite threat hunters, security researchers, and content engineers.

 
Austin

Austin Jackson

Software Engineer & Security Researcher at Cyborg Security

Austin is a U.S. Navy veteran, while enlisted he worked at the National Security Agency and U.S. Cyber Command as a technical lead for offensive and defensive computer network operations. Since leaving the military he has been working in the private sector as a software engineer, security researcher, and threat hunter. He's avidly helping build a next-generation threat hunting platform at Cyborg Security.
dave amsler (1)

Dave Amsler

Founder & CEO,Cyborg Security

Dave Amsler is a pioneer in the field of threat hunting, an avid cyber evangelist, and highly active in the field of cyber security. Dave has spent more than 20 years at the forefront of the security industry, including threat hunting, security orchestration and automation, and security operations. Dave founded Cyborg Security to tear down the barriers organizations face in threat hunting, and empower organizations to become truly proactive in cyber security.

Before Cyborg Security, Dave founded and self-funded Foreground Security (now Raytheon Foreground Security), which delivers ground breaking managed security through its virtual security operations centers (VSOC) to commercial and governmental clients internationally. Foreground, under Dave's management, pioneered proactive managed security delivering a first-of-its-kind managed threat hunting service across hundreds of clients. Dave has several patents surrounding threat hunting and advanced active detection capabilities and has spoken at most major conferences in the cyber security industry. His passion is cyber security and specifically finding the answer to the “hard problem” of hunting the advanced threat actor in today’s landscape.

mike-2

Mike Mitchell

Co-Founder & VP of Engineering,

Cyborg Security

 
Mike Mitchell has over a decade of diverse experience in the fields of security engineering and automation. At Cyborg Security Mike continues to pursue his passion, serving as the spearhead for all engineering efforts, while working closely with our threat research team to develop innovative solutions to unique threat hunting challenges!
 
.
alex yi

Alex Yi

Senior Security Engineer,

Cyborg Security

 
I have been working in the IT industry for a decade, with half of those years dedicated to the Cyber Security field. At Cyborg Security, I have the benefit of working alongside the incredible minds of our threat hunters, security researchers, and engineers. With the ever evolving world of Cyber, it is amazing to be a part of our team and be able to be a part of something that makes a difference.
Anuj_Image

Anuj Goel, Ph.D.

CEO and Co-Founder, 

Cyware

 

A security evangelist and innovator, Anuj Goel is a strong proponent of cybersecurity and its advancements in today’s age. With more than 20 years of experience in the security industry, Anuj has a solid command in areas like critical infrastructure protection, threat intelligence sharing, threat modeling, and cyber fusion analysis. His wide range of expertise in technology blended with astute leadership skills has propelled large teams in cross-functional environments towards felicitous success. At Cyware, Anuj steers the strategic face of the company and oversees its strategic planning and growth initiatives.

Prior to founding Cyware, Anuj served as the Head of Global Strategy and Planning covering information security and Chief of Staff to the CISO, Citigroup, New York. Anuj was also an executive committee member of the Financial Services Sector Coordinating Council (FSSCC) and has actively participated in several leading information sharing initiatives.

Jim

Jim Lynn

Chief Information Officer,

American Gas Association

Jim has spent the past 30 years of his career in Information Technology and Cybersecurity management with several non-profit organizations in the Washington, DC area. He is currently Chief Information Officer for the American Gas Association (www.aga.org), and has worked there for the past twenty years.  Prior to that he spent eight years as IT Director for the Chemical Manufacturers Association.  He planned IT projects and set technical direction for both of these organizations.  In addition, he is a Certified Chief Information Security Officer, Certified Information Systems Security Professional, Certified Association Executive, Certified Information Systems Auditor, and holds many other industry certifications.


In recent years Jim has split his time between internal IT responsibilities and industry responsibilities. Jim is the information technology cybersecurity subject matter expert for AGA’s Cybersecurity Strategy Task Force. In this capacity he has administered cybersecurity reviews with a number of natural gas utilities and also serves as Executive Director for the Downstream Natural Gas ISAC (https://www.dngisac.com/). He is the staff executive for AGA’s Customer Service Committee and Technology Advisory Council. In these capacities he serves senior leaders in the fields of Customer Service and Information Technology within the natural gas distribution industry. The Customer Service area includes an annual benchmarking effort, two workshops and a large conference. The Information Technology area includes two council meetings annually.

Jim has a B.S. degree in Computer Systems Management from Drexel University and an M.B.A. from Drexel University.