Track: Security: Lessons Attacking & Defending

Location: Pacific DEKJ

Day of week: Wednesday

Security: Lessons Attacking and Defending brings together stories about various successful approaches to security. Come learn what has worked to protect others while being targeted by increasingly sophisticated adversaries. Come ask questions about how to make good security tradeoffs when writing software. And do all of this with some of the top security practitioners in the industry today!

Track Host: Werner Schuster

InfoQ Editor Functional Programming, QCon PC, Wolfram

Werner Schuster focuses on languages, VMs and compilers, Wolfram Language, performance tuning, and recently cloud taming. He's on the PC for QCon NYC/SF/London

CASE STUDY TALK (50 MIN)

10:35am - 11:25am

Security & Psychology: Demotivating Persistent Threats

Preventing advanced cybercriminals from accessing and exploiting your most sensitive data requires more than just a strong threat detection infrastructure — it demands a personal understanding of the attackers themselves. Once an attack group’s motivations are identified you can start generating a profile and persona that will make disincentivizing them a whole lot easier. Without this added layer of psychological analysis, you will find yourself addressing incident after incident with no end in sight. 

At the core, an actor’s intent is always the same - motivated people with economic justification for their actions are committing large-scale attacks because their livelihood depends on it. It’s up to you to disrupt those economics so they move to softer targets. 

In this session, Shape Security Director of Engineering Jarrod Overson will break down the workflow for effective threat mitigation of sophisticated attackers into four distinct stages: 

  • Stage 1) Classification. Look at how can traffic be bucketed into distinct segments that define individual actors or groups. 
  • Stage 2) Research and generate an actor profile. Understand what these actors are getting out of these attacks, and form some hypotheses from their attack characteristics. Are they data resellers? Developers? Independent actors or full-time employees? What hours are they active? How quickly do they respond to mitigation? This actor profile will help define the approach in Stage 3.
  • Stage 3) Counter attack. Develop and deploy countermeasures that target the attack in a way that drives up cost while reducing value. Play with them, target the damage on their off hours, give sporadic and variable feedback. Increasing the psychological cost is a damage multiplier.
  • Stage 4) Rinse & repeat until all threats are cleared. This is only temporary, of course. As long as value remains then new attackers will fill the vacuum and each subsequent attack will be more sophisticated than the last. Relentless, targeted responses will eventually wear away the motivation to continue the attack. 

Jarrod has seen traffic from individual attackers, coordinated groups, state actors, and more - all of which require different approaches. Sophisticated threats rarely engage in attacks for no reason - understand where the money is coming from and the motivations behind an attack and you can disrupt the attackers with greater force.

Jarrod Overson, Engineering Director @ShapeSecurity & JavaScript Expert
CASE STUDY TALK (50 MIN)

11:50am - 12:40pm

Quantitative Risk in Cyber Systems

Risk quantification in cyber systems remains an immature field with significant potential. Despite widespread belief that cyber can't be quantified, the tools and data already exist to significantly improve risk management. In this talk, we'll review the literature on risk quantification and discuss examples of data-driven risk analysis.

Marshall Kuypers, Director of Cyber Risk @QadiumInc
CASE STUDY TALK (50 MIN)

1:40pm - 2:30pm

Security Presentation

Presentation details will follow soon.

Mike Ruth, Staff Security Engineer @Cruise Automation
CASE STUDY TALK (50 MIN)

2:55pm - 3:45pm

Security Presentation

Presentation details will follow soon.

Shamiq Islam, Head of Product & Platform Security @Coinbase
CASE STUDY TALK (50 MIN)

4:10pm - 5:00pm

Security Presentation

Presentation details will follow soon.

Charles Nwatu, Director of Security at @stitchfix

Tracks

Monday, 5 November

Tuesday, 6 November

Wednesday, 7 November