Talks and Topics include:
- Rogue Team Tactics – Threat Emulation and its Benefits for Business Security
- Gone Phishing – Social Engineering Campaigns
- Understanding The Internet of Things (IoT) – Securing Ourselves in a Digitally Immersive World
Suitable Audiences:
- Technology & Future
- Business
- Education, Youth & Campus
- Government
The Internet of Things (IoT) – WorldWildWest
This talk is for all groups:
Have you forgotten to pick up milk on the way home before? Well now your fridge can remind your car to remind you to pick up milk. It’s an amazing convenience, but it can lead to amazing complacency as well. What if a malicious entity used your connected fridge or car to connect to your home computer? We assume someone else has taken our security into account and we often blindly trust the devices around us. We leave our digital fingerprints everywhere nowadays and there are entities dedicated to finding and exploiting those details. We may have sacrificed security for efficiency without even realizing it.
Have you ever wanted to look at how attackers see your information online? Are you constantly asking how the breaches we hear about in the media are happening? RedBlack’s Threat Emulation Team will take you through a journey of cyber security from the hacker perspective. Understand how devices and their users are compromised by experts who recreate these attacks in order to better learn, teach and defend against them in the real world.
Not all hackers are bad. Some are even here to help.
Meet Lee and Ben….
Abusing Trust “Trust…Worthy?”
This is an enterprise talk. (Great for law firms).
Is a trusting person just a good target these days? What would the world be without trust? What would business be without trust? We rely on it every day, but we are used to determining that trust face to face. There is a new type of trust in business that we can’t use our eyes to evaluate; but are there details we can look at differently that can help us establish trust? There are risks embedded in trust. Malicious entities make a living by exploiting the trust that makes us naive online. Now, with this presentation, you can look at the inherent vulnerability trust entails through the eyes of people who know what the bad guys want.
Rogue Team Tactics – Threat Emulation Scenarios
This is the tech talk, for any and all groups or persons involved in IT:
What’s more dangerous…underestimating your opponent or overestimating yourself?
This is where the RedBlack Rogue Team© can make all the difference between a prepared cyber security team and an unprepared one.
All your files are gone, no one in the organization can email clients and your site is down. What do you do? This is a disaster. Thankfully this is only a rogue team drill and it’s designed to prepare all levels (secretary to CISO) for an attack by doing a “dry run”. Panicking won’t help anyone. The last thing you need in that crisis event is the question of “who does what?” From table top exercises to physical penetration testing and social engineering strategies, having experience in a crisis situation is invaluable to minimizing the consequences when a breach occurs. Learn from the professionals how to orchestrate drills and scenarios that can be educational, operationally sound and beneficial to both employees and company.
CyberSec Talk for Governments and Municipalities
As both the sophistication and frequency of cyber attacks increase, it has become more and more imperative for organizations of all sizes and complexity to comprehend how they present themselves to the public and the web.
The recent BMO breach brought to light not only the gaps in specific security programs, but also once again highlighted how the 3rd party malicious actors on the web will take advantage of an already dire situation. Subsequent to the BMO breach itself, phishing emails were circulated by a variety of malicious entities to both BMO and non-BMO clients alike urging them to check their accounts and credentials. These fake emails redirected users to spoofed sites that further exploited an already perilous situation, and greatly compromised bank accounts and more critically, public trust.
Trust is currency itself in business, and when it’s lost, it’s very difficult to regain. Municipalities are a treasure trove of data and information to sinister groups, (Electrical grids, Tax information, emergency services) and as such, need to be vigilant in their protection of that data; and that protection needs to extend well beyond their digital borders and the 9-5 work-day. Not only do municipalities need to curate defensive strategies for themselves internally, but they need to develop resiliency and partitions to the attacks that will only increase as time goes on.
Sadly, there is no silver bullet to quell cyber attacks completely. But, if more organizations took on a holistic and maturity-based approach to cyber security, encompassing all members of the team, not just the IT department; the fallout and consequences of such a breach would be considerably less damaging.
Tools and applications will only protect an organization for so long. Every member of the team, from the admin assistant to the IT department can play a role in defending an organization, by being a committed and cognizant member of the defensive team. A defensive culture won’t happen overnight, but by including all levels and members of a team in the organizations defensive posture and approach, a greater level of cognizance and environmental awareness is instilled, greatly improving any organizations ability to detect, deter and eradicate a threat.