Escape the Malware Blob with Explainable Machine Learning 

The complexity of files and objects with their increased breadth of file formats and sizes has presented a significant challenge to modern-day organizations seeking to improve detection and response processes for advanced malware threats. What you might call a “malware blob”, these threats are packed deep within data, hidden layers down and sometimes even out […]

Read more

Deceptively Simple Threat Detection

There are fundamentally two ways to stop an attacker. One, to pursue them and the other, to ambush them. Pursuing an attacker takes advanced training; it is complex and requires an extreme level of precision to detect all attacks across all attack surfaces. Alternatively, the use of modern cyber deception has proven itself to be […]

Read more

KEYNOTE: Mission Critical: Lessons Learned from a Seasoned Army Vet

With a 33-year military career under her belt, US Army Lieutenant General Karen Gibson understands the tremendous value information sharing, collective analysis, and relationships play in defending our Nation. Having stood up the U.S. Cyber Command’s Joint Force Headquarters and the Army’s premiere offensive cyber organization, Karen has seen first-hand how critical threat intel operations […]

Read more

Ransomware as a Service – Paying the Price of (un)Preparedness

Ransomware attacks are not a new threat – they date back to 1989, but oh how things have changed! Explore a ransomware attack from the tactical, operational, and strategic levels. Look at the changes brought on by Ransomware as a Service (RaaS – yes there is an acronym for it!) threat actors, the “customer support” […]

Read more

I Put a Keylogger On You, and Now You’re Mine

Malware attacks have surged during the pandemic, and your consumers are prime targets. Botnet logs detailing your consumers’ every move make it easy for criminals to evade detection while they steal victims’ identities, take over their accounts, rack up fraudulent purchases, drain loyalty points and funds, run drop-shipping scams, and more. In this session, get a rare peek […]

Read more

Incident Response: Detection & Response ATT&CK Kill Chain

The volume of log data has exploded over the years as new tools and systems are introduced for business and IT related activities. Traditional detection and response – complete visibility into all data logs for discovery and action – is no longer feasible. Teams must be careful about what data is stored and make strategic […]

Read more

Play-by-Play: Capture the Flag Exercises – Lessons Learned & What’s Coming Next

The RH-ISAC team shares key findings from two recently conducted capture the flag exercises with RH-ISAC members and talks about what’s coming next with hands-on programs and exercises for our members.

Read more

Innovation Spotlight: Riding the WAVE to Better Collaboration and Security

Many organizations strive to build an intelligence-led security program, but aligning to a single, effective intel model is often an obstacle. Divergent processes across different parts of the security organization often lead to gaps in communication. Target’s Cyber Intelligence Team has developed a new approach that eases cross-team collaboration. In this talk, we will introduce […]

Read more

Play-by-Play: How to Get the Most Out of Your Gym Membership

Members will share how they’re taking advantage of their RH-ISAC membership benefits and will share tips and tricks for how you can get started today.

Read more

Orchestration & Automation: Approaches from the Front Lines

In a world where quickness, efficiency, and response can mean the difference between business as usual and a data breach, a cybersecurity team’s ability to automate processes and orchestrate workflows to streamline efforts is top of mind. Though the end goal for most is orchestration and automation, getting from point A to Z isn’t as […]

Read more