Join Us for CyberSecurity Day:
Strengthen Your Digital Defenses
Mark your calendars for CyberSecurity Day on 17th October, where industry experts will dive deep into the latest threats and defenses.
This event is your chance to learn practical, cutting-edge strategies to protect your organization from evolving cyber threats. The event is a must-attend for CIOs, IT directors, security managers, and anyone passionate about cybersecurity.
Get insights on:
· Infiltration Tactics: Learn how attackers exploit home routers with simple commands, compromising entire networks.
· Active Directory Security: Understand insidious persistence methods and how to counter attackers hiding within your systems.
· Encryption Vulnerabilities: See a real-time demo of how BitLocker, even with TPM, can be compromised without a PIN.
· NIS2 Compliance: Prepare for the new EU cybersecurity directive with an essential guide.
· PowerShell Defenses: Discover how to defend against PowerShell attacks using AMSI.
· AI Security Risks: Navigate the emerging threat landscape posed by AI technologies.
· CMMC Compliance: Understand the importance of CMMC certification for staying competitive in today’s market.
Time schedule (CET)
CyberSecurity sessions
We’ll show how attackers easily infiltrated our entire household through home routers with just a few simple characters. We don’t download anything on our PC, we don’t click on anything—just load a webpage, and our new and supposedly secure router surrenders its SHELL to the net. We’ll practically explain the connection between Command execution, named pipes, Shell, pivoting, and how attackers used this cocktail to navigate through our homes.
10:00-10:50 | "CMMC a Ticket for Commercial Gain or Fall Behind Without the Skills!" by Richard Beck
Compliance with CMMC (Cybersecurity Maturity Model Certification) is finally over the line, and fraught with bureaucratic assessment chaos. DoD primes and more importantly organisations in the supply chain face urgent choices, or risk loosing commercial opportunities. With solicitations potentially giving just one month between bid and contract award, contractors who aren’t prepared will be left scrambling through 2025. Compounding the issue, many organizations lack the internal skills to navigate these challenges, making them more vulnerable. This talk will outline the steps you must take now to close the skills gap, ensure compliance, and turn CMMC into a business advantage.
The attacker has successfully gained initial access to the environment and is even lucky enough to obtain a privileged identity. But time is against him! He has only seconds left before detection components discover him, thwart his efforts, and permanently close the doors to the company. He must find a reliable way to hide and persist in the environment until he’s ready to take his next step or complete his plan. The dice are cast! The hide-and-seek game between attacker and defender begins. Let’s explore some insidious persistence methods an attacker might use against your Active Directory because those who are prepared won’t be caught off guard.
How much (non)sense does it make to operate BitLocker encryption on system partitions with keys stored in TPM, without requiring a PIN at startup? We’ll demonstrate a real offline attack on a computer that still has both TPM and an encrypted disk.
Starting in October this year, the European NIS2 directive will come into effect, requiring organizations in essential and important sectors to significantly strengthen their cybersecurity. In this 1-hour webinar, we will provide an overview of the NIS2 regulation, discuss its key priorities, and emphasize the urgency of taking swift action. We will outline the steps organizations need to take to achieve compliance and explore how this will impact their infrastructure and operations. This session offers a valuable first step in understanding and implementing NIS2, including practical tools and recommendations to get started right away.
PowerShell is a de facto scripting standard for administrative tasks on Windows. This also makes it popular among attackers to execute malicious code. To limit Illegitimate usage Microsoft introduced number of security features like Antimalware Scan Interface (AMSI) and Constrained Language Mode.
The session will lift the veil on those technologies, as well as demonstrate methods can be used to bypass protection. The session contains:
– Understanding AMSI
– Reverse engineering AMSI
– AMSI bypass methods
– Understanding CLM
– CLM bypass methods
Artificial Intelligence is transforming industries and redefining the way we work and live. However, with its rapid adoption comes a new set of security risks that organizations must address. This session will explore the potential vulnerabilities of AI systems, including data privacy, model manipulation, and adversarial attacks. Participants will gain insights into the evolving threat landscape, real-world case studies, and best practices for securing AI-driven applications.
Dive into the future of security. Discover how this powerful tool leverages AI to streamline security processes, automate threat detection, and provide actionable insights. Whether you’re new to Microsoft Copilot or looking to optimize its use, this session will give you an insight on how to enhance your security strategies effectively.
18:00-19:00 | Protecting Organizational Digital Value and Resiliency Through Culture by Rick Lemieux
The digital landscape has transformed how businesses operate, compete, and interact with customers, introducing new risks that require a strategic approach to digital value protection. Digital value, including data, intellectual property, and customer information, is vital to modern businesses. Protecting this value is a strategic imperative. CEOs and boards must prioritize safeguarding digital assets to ensure long-term success. Organizations that focus on digital value protection can gain a competitive edge by showing clients and investors their commitment. On the other hand, neglecting it can lead to business disruptions, fines, lawsuits, regulatory sanctions, and customer satisfaction issues, resulting in significant economic losses.