Ransomware as a Service – Paying the Price of (un)Preparedness

Ransomware attacks are not a new threat – they date back to 1989, but oh how things have changed! Explore a ransomware attack from the tactical, operational, and strategic levels. Look at the changes brought on by Ransomware as a Service (RaaS – yes there is an acronym for it!) threat actors, the “customer support” […]

Read more

I Put a Keylogger On You, and Now You’re Mine

Malware attacks have surged during the pandemic, and your consumers are prime targets. Botnet logs detailing your consumers’ every move make it easy for criminals to evade detection while they steal victims’ identities, take over their accounts, rack up fraudulent purchases, drain loyalty points and funds, run drop-shipping scams, and more. In this session, get a rare peek […]

Read more

Incident Response: Detection & Response ATT&CK Kill Chain

The volume of log data has exploded over the years as new tools and systems are introduced for business and IT related activities. Traditional detection and response – complete visibility into all data logs for discovery and action – is no longer feasible. Teams must be careful about what data is stored and make strategic […]

Read more

Orchestration & Automation: Approaches from the Front Lines

In a world where quickness, efficiency, and response can mean the difference between business as usual and a data breach, a cybersecurity team’s ability to automate processes and orchestrate workflows to streamline efforts is top of mind. Though the end goal for most is orchestration and automation, getting from point A to Z isn’t as […]

Read more

OpenBullet: The Automated Imitation Game

Using highly sophisticated, commercially available attack tools like OpenBullet, Snipr MBA, and BlackBullet has dramatically simplified the act of committing fraud through account takeovers, fake account creation, or other automated attack. With GitHub repos, curated user forums, and thousands of predefined attack configs available on the web, bad actors can easily target retail and hospitality […]

Read more

Keep Your Enemies Close: A Panel on Tracking Adversaries

TLP:AMBER – RH-ISAC CORE MEMBERS ONLY At any given moment there are countless nefarious attackers, methods, and tools targeting the retail and hospitality sector. As a threat intelligence analyst, it’s your job to have a response process in place if, and when, an attack breaks through the cracks. By tracking adversary behavior, threat intelligence teams […]

Read more

Intel for Threat Intel: An Open Source Journey to Building a Threat Intelligence Program

Harnessing insights from threat intelligence is a force multiplier when it comes to cyber defense, yet many companies face budget challenges when building out a program. Foot Locker has proved that gaining good intelligence doesn’t only depend on investment in products and tools. By leveraging open sourced tools like MISP, MITRE ATT&CK, and Cuckoo, building […]

Read more

Digital Transformation: The Human Element

Digital transformation is a nebulous concept that transcends mere business model tweaks and process shifts. True digital transformation requires leaders to take a step back and profoundly rethink how their people, processes, and technology translate to business success. We as cybersecurity leaders must understand how to lead through transformational projects and deliver outcomes without destroying […]

Read more

Could Hackers Solve the Cybersecurity Skills Shortage?

The phrase “cybersecurity skills gap” has become a common part of the lexicon of cybersecurity professionals today. While there are many theories as to how we ended up this shortage, few have offered solutions that will solve the issue in the near term. And the need is desperate. As the work-from-home model becomes the norm […]

Read more

ReWard Yourself: Wendy’s Custom ATO Program

TLP:Red – Core Members Only Securing mobile applications and endpoints in today’s digitized world requires leaders to make strategic decisions around tools and security controls that will ultimately impact the customer experience. For the Wendy’s cybersecurity team, the discussion revolved around buying vs building, user experience, and ease of integration. In this session, Wendy’s CISO […]

Read more
Retail and Hospitality ISAC