A VISUAL SNAPSHOT OF SECURITY THREATS, TRENDS AND IDEAS.
Jan 07, 2017
A VISUAL SNAPSHOT OF SECURITY THREATS, TRENDS AND IDEAS.
JEFF POLLARD, LASTLINE
Integrating Endpoint Workflow to Stop Attacks Before They Start
Victory does not always require a waged battle. By integrating best-
of-breed advanced malware analysis and endpoint technologies,
organizations can effectively identify and stop threats before
damage occurs.
@LASTLINEINC
DR. JOHN JOHNSON, JOHN DEERE
Keep Your Company from Becoming Collateral Damage in a Cyberwar
Knowledge of who is attacking you and what they are after can help you to
develop an adaptive defense to advanced threats that involves breaking the kill chain to protect sensitive data,
and more quickly detecting and responding to threats.
@JOHNDJOHNSON
ADAM SHOSTACK, AUTHOR
Threat Modeling: Lessons from Star Wars
A simple approach to Threat Modeling can be to start by
answering these four questions: What are you building/deploying?
What could go wrong? What are you going to do about it? And, did you do
a good job?
@ADAMSHOSTACK
TODD BELL, INTERSEC
What’s the Big Deal with End-Point Security?
Endpoint security is becoming a “must have” for enterprises.
However, not all endpoint products are created equal. Know what to look for when selecting a vendor,
including API integration with existing tools sets and sandboxing
malware.
@INTERSECGROUP
TERRY RAMOS, PALO ALTO NETWORKS
Enhanced Protection For Your Critical Servers
Reduce the time to detect and protect against advanced threats
from the network edge to endpoint systems. With Tripwire Enterprise and Palo Alto Networks’ WildFire, you get unprecedented protection
against zero-day exploits.
@PALOALTONTWKS
CRAIG YOUNG, TRIPWIRE
Black Ops Recon: Finding Your Faults First
Adding fuzzing to your security test framework plenty of benefits. Inexpensive cloud computing resources were used to find
exploitable flaws in open source software at a cost of less than $0.25
per vulnerability.
@CRAIGTWEETS
QUINN SHAMBLIN, BOSTON UNIVERSITY
Know Then Thyself: Using the Top 4 Critical Controls for
Effective Cyber Defense
Provide a product line that directly targets the Top 4 Critical Security Controls. The DBIR says only 10
vulnerabilities account for 99% of breaches, meaning many organizations
are still not getting the essentials right.
@BUINFOSEC
DR. KEN BAYLOR,STEALTH WORKER
Cybercrime Tools: New Uses and Abuses
@BAYLORSECURITY
Modern botnets are a major threat in the global financial space,
responsible for stealing several hundred million dollars and billions in intellectual property. For smaller
banks, botnets can be business-ending.
TRAVIS SMITH, TRIPWIRE
My Bro the ELK: Obtaining Context from Security Events
@MRTRAV
Using commercial and open-source threat intelligence tools, the
TARDIS framework allows you to gather additional intelligence from your current security infrastructure in order to detect historic and real-
time indicators of compromise.
JAMES BRODSKY, SPLUNK
Tripwire + Splunk: Partnering to Provide You with Better Security
Intelligence
@JAMES_BRODSKY
Integrating Splunk with Tripwire provides the ability to easily visualize
the overall health of your IT environment to help reduce the cycle-
time of identifying vulnerabilities, security violations and mean time to
identify and remediate risks.
DAVID NEWMAN, TELUS
Turning Admins into Cyber Defenders
@TELUS
By developing defensive capabilities and situational awareness, Admins learn to detect and react quickly to
any attack. Operationalizing security means they become participants, who are engaged and trained for
“cyberwar.”
KELLY KINGMAN, KINGMNAN INK
Kelly is a graphic recorder that creates visual summaries of spoken content like talks,
discussions, and meetings. Her visuals stimulate creativity and
collaboration to help the audience retain and understand
information.
@KINGMANINK
FOR THE LATEST SECURITY NEWS, TRENDS AND INSIGHTS,
VISIT US AT:
WWW.TRIPWIRE.COM/BLOG @TRIPWIREINC
IMAGE COURTESY OF SHUTTERSTOCK.COM