Security Operations Program Development: Insights from the Retail Community

Security Operations teams come in all sizes and tackle a wide range of program challenges differently. This panel discussion will explore insights and lessons learned from other member security leaders across the retail community. Enjoy an interactive panel discussion on how challenges in organizational structure, policy and frameworks, managed security, talent, and tools are being […]

Read more

Applying Modern Cyber Security Approaches to Combat Fraud

Many organizations have existing and mature fraud programs. Traditional approaches to managing fraud are often reactive and sometimes lack core concepts born from cyber security disciplines. This presentation reflects on lessons learned from the trenches combating fraud, while merging years of cyber security experience in intel, detection, and response to inform a modern anti-fraud approach. […]

Read more

MISP Implementation Planning Meeting

This extended session will focus on key topics as identified by the RH-ISAC’s MISP Working Group including: An introduction to MISP: platform objectives/goals, uses, architecture, and deployment walkthrough (T-Mobile) MISP Use Cases: RH-ISAC members (AT&T & Dollar Tree) sharing their deployment journey, the reasoning behind selecting MISP, experiences, successes, etc. RH-ISAC Community MISP instance plans: […]

Read more

CISO Executive Roundtable Discussion

This  interactive discussion will focus on key topics as identified by the RH-ISAC’s CISO Committee including: Board-level Reporting Maturity Assessments & Frameworks Risk Assessments & Third-Party Risk Future Investments We will end the session with a roundtable open forum where participants can come ready to ask questions and share thoughts with their fellow CISOs.

Read more

KEYNOTE: The Power of Data Interchange to Investigate Application Attacks

Shape threat research recently partnered with one of our hospitality customers to investigate a mysterious case involving online bookings that were producing a spike in no-shows. An innovative automation attack was uncovered, impacting not only this customer, but a number of brands across the hospitality industry – including members of the RH-ISAC community. Shape brought […]

Read more

Leveraging the Dark Web to Enrich Your Threat Intelligence Capabilities

As cyber threat intelligence analysts, using all tools and tactics available to you is critical to gaining insight and developing a proactive stance against adversaries. Several teams have turned to the dark web as a resource for investigation. By collecting, analyzing and operationalizing data found in the dark web, teams increase their threat intelligence capacity […]

Read more

Developing an Always-Learning Culture in the Era of Digital Transformation

As cyber-attacks become more complex and organizations embrace the era of “digital transformation,” it is as critical as ever to ensure your team is skilled up and ahead of the latest trends and technologies. How do you foster an “always learning” culture and empower your workforce to develop their skills with limited budgets and time? […]

Read more

Keynote: Up Your Game With ATT&CK and SHIELD

In a session intended for cyber warriors, MITRE’s Chief Cyber Intel Strategist will brief the RH-ISAC on the new MITRE Shield active defense knowledgebase. This discussion will focus on how teams of all size/capability can effectively leverage the MITRE ATT&CK framework defining attacker behaviors and the newly published MITRE Shield active defense techniques derived from […]

Read more