Powered by
Cyber
Security
Day
October 17, 2024
Join Us for CyberSecurity Day: Strengthen Your Digital Defenses
Prepare to elevate your cybersecurity knowledge at CyberSecurity Day on 17th October, where industry experts will dive deep into the latest threats and defenses. This event is your chance to learn practical, cutting-edge strategies to protect your organization from evolving cyber threats. The event is most beneficial for CIOs, IT directors and managers, IT security managers and anyone interested in CyberSecurity.
Get insights on:
- Infiltration Tactics: Learn how attackers exploit home routers with simple commands, compromising entire networks.
- Active Directory Security: Understand insidious persistence methods and how to counter attackers hiding within your systems.
- Encryption Vulnerabilities: See a real-time demo of how BitLocker, even with TPM, can be compromised without a PIN.
- NIS2 Compliance: Prepare for the new EU cybersecurity directive with an essential guide.
- PowerShell Defenses: Discover how to defend against PowerShell attacks using AMSI.
- AI Security Risks: Navigate the emerging threat landscape posed by AI technologies.
- CMMC Compliance: Understand the importance of CMMC certification for staying competitive in today’s market.
Stay ahead of cyber threats and fortify your security posture with actionable knowledge from top cybersecurity professionals.
Book your free online seat
Time schedule
Start | End | Session title | Speaker |
8:55 | 9:00 | Kick-off | |
9:00 | 10:10 | Where SHELL you go, and with whom… | William Ischanoe |
10:10 | 10:20 | Break | |
10:20 | 11:00 | CMMC a Ticket for Commercial Gain or Fall Behind Without the Skills! | Richard Beck |
11:00 | 11:10 | Break | |
11:10 | 12:00 | Insidious Persistence in Active Directory | Lubomír Ošmera |
12:00 | 13:00 | Lunch break | |
13:00 | 13:50 | BitLocker plus TPM minus PIN | Ondřej Ševeček |
13:50 | 14:00 | Break | |
14:00 | 15:00 | Preparing for NIS2: Your Essential Guide to Compliance and Cybersecurity | Bjorn Mevissen |
15:00 | 15:10 | Break | |
15:10 | 15:55 | Defending Against PowerShell Attacks: The Role of AMSI | Sergey Chubarov |
15:55 | 16:05 | Break | |
16:05 | 16:40 | Security Risks of AI: Navigating the Threat Landscape | Desmond Devendran |
16:40 | 17:00 | Break | |
17:00 | 17:50 | Get started with Microsoft Copilot for Security | Josip Stanešić |
17:50 | 18:00 | Break | |
18:00 | 19:00 | Protecting Organizational Digital Value and Resiliency Through Culture | Rick Lemieux |
CyberSecurity sessions
Where SHELL you go, and with whom…
By William Ischanoe
We’ll show how attackers easily infiltrated our entire household through home routers with just a few simple characters. We don’t download anything on our PC, we don’t click on anything—just load a webpage, and our new and supposedly secure router surrenders its SHELL to the net. We’ll practically explain the connection between Command execution, named pipes, Shell, pivoting, and how attackers used this cocktail to navigate through our homes.
CMMC a Ticket for Commercial Gain or Fall Behind Without the Skills!
By Richard Beck
Compliance with CMMC (Cybersecurity Maturity Model Certification) is finally over the line, and fraught with bureaucratic assessment chaos. DoD primes and more importantly organisations in the supply chain face urgent choices, or risk loosing commercial opportunities. With solicitations potentially giving just one month between bid and contract award, contractors who aren’t prepared will be left scrambling through 2025. Compounding the issue, many organizations lack the internal skills to navigate these challenges, making them more vulnerable. This talk will outline the steps you must take now to close the skills gap, ensure compliance, and turn CMMC into a business advantage.
Insidious Persistence in Active Directory
By Lubomír Ošmera
The attacker has successfully gained initial access to the environment and is even lucky enough to obtain a privileged identity. But time is against him! He has only seconds left before detection components discover him, thwart his efforts, and permanently close the doors to the company. He must find a reliable way to hide and persist in the environment until he’s ready to take his next step or complete his plan. The dice are cast! The hide-and-seek game between attacker and defender begins. Let’s explore some insidious persistence methods an attacker might use against your Active Directory because those who are prepared won’t be caught off guard.
BitLocker plus TPM minus PIN
By Ondřej Ševeček
How much (non)sense does it make to operate BitLocker encryption on system partitions with keys stored in TPM, without requiring a PIN at startup? We’ll demonstrate a real offline attack on a computer that still has both TPM and an encrypted disk.
Preparing for NIS2: Your Essential Guide to Compliance and Cybersecurity
By Bjorn Mevissen
Starting in October this year, the European NIS2 directive will come into effect, requiring organizations in essential and important sectors to significantly strengthen their cybersecurity. In this 1-hour webinar, we will provide an overview of the NIS2 regulation, discuss its key priorities, and emphasize the urgency of taking swift action. We will outline the steps organizations need to take to achieve compliance and explore how this will impact their infrastructure and operations. This session offers a valuable first step in understanding and implementing NIS2, including practical tools and recommendations to get started right away.
Defending Against PowerShell Attacks: The Role of AMSI
By Sergey Chubarov
PowerShell is a de facto scripting standard for administrative tasks on Windows. This also makes it popular among attackers to execute malicious code. To limit Illegitimate usage Microsoft introduced number of security features like Antimalware Scan Interface (AMSI) and Constrained Language Mode.
The session will lift the veil on those technologies, as well as demonstrate methods can be used to bypass protection. The session contains:
– Understanding AMSI
– Reverse engineering AMSI
– AMSI bypass methods
– Understanding CLM
– CLM bypass methods
Security Risks of AI: Navigating the Threat Landscape
By Desmond Devendran
Artificial Intelligence is transforming industries and redefining the way we work and live. However, with its rapid adoption comes a new set of security risks that organizations must address. This session will explore the potential vulnerabilities of AI systems, including data privacy, model manipulation, and adversarial attacks. Participants will gain insights into the evolving threat landscape, real-world case studies, and best practices for securing AI-driven applications.
Get started with Microsoft Copilot for Security
By Josip Stanešić
Dive into the future of security. Discover how this powerful tool leverages AI to streamline security processes, automate threat detection, and provide actionable insights. Whether you’re new to Microsoft Copilot or looking to optimize its use, this session will give you an insight on how to enhance your security strategies effectively.
Protecting Organizational Digital Value and Resiliency Through Culture
By Rick Lemieux
The digital landscape has transformed how businesses operate, compete, and interact with customers, introducing new risks that require a strategic approach to digital value protection. Digital value, including data, intellectual property, and customer information, is vital to modern businesses. Protecting this value is a strategic imperative. CEOs and boards must prioritize safeguarding digital assets to ensure long-term success. Organizations that focus on digital value protection can gain a competitive edge by showing clients and investors their commitment. On the other hand, neglecting it can lead to business disruptions, fines, lawsuits, regulatory sanctions, and customer satisfaction issues, resulting in significant economic losses.
Speakers
William Ischanoe
Expert Consultant and Instructor. He enjoys delving into anything that someone forgot to encrypt, Windows components from a security perspective, authentication, PKI, IPSec, and WiFi.
Certifications
MCSE, MCSA, MCT, MCTS, MCITP, CEI, CEH, ECSA
Lubomír Ošmera
Instructor, consultant, and architect in Microsoft technologies. His primary focus is on the security of the Microsoft ecosystem (both cloud and on-premises). He implements security technologies for both small companies and international corporations.
Certifications
MCSE, MCT, CEH, CND
Ondřej Ševeček
Expert Consultant and Instructor. Specializes in Microsoft technologies with a focus on security, authentication and identity management, cryptography, PKI, and forensic investigations in enterprise environments. He programs in C++, C#, JavaScript, and PowerShell.
Certifications
CISA, MCSM, CEH, CHFI
Richard Beck
Richard Beck is an experienced cyber security professional, a former CISO, turned educator, with over 15 years in operational security roles, across defence, financial services, and critical infrastructure. Member of, and advisor to, industry and government cyber security bodies.
Certifications: CISSP, CISM, CISA
Sergey Chubarov
Security and Cloud Expert, Instructor with 15+ years’ experience on Microsoft technologies.
His day-to-day job is to help companies securely embrace cloud technologies.
Frequent speaker at local and international conferences like DEF CON, Black Hat Europe, Midwest Management Summit etc.
Prefers live demos and cyberattacks simulations.
Certifications: MVP, OSCP, OSEP, eCPTX, CPENT and more.
Josip Stanešić
Josip Stanešić is a consultant and instructor with expertise in AWS, Azure, and Kubernetes. He is experienced in automating cloud infrastructure, writing CI/CD pipelines, maintaining on-premise environments and security.
Certifications: CKA, CEH, MCSE, MCT, RHCE
Bjorn Mevissen
Bjørn Mevissen is a seasoned security expert, consultant, and trainer with extensive knowledge in the field of cybersecurity and cloud. He has various accreditations in infrastructure and cloud security, enabling him to effectively guide organizations in strengthening their digital resilience. His expertise in both technical and strategic security measures makes him a highly valued trainer and advisor in the IT security sector.
Certifications: MCSE, MCT, CTT+, CEI, CEH, CND, CHFI, CISSO, CCSSM, CCSSA, CPTE, CPTC, CSWAE, CBIO and CPTS.
Desmond Devendran
Mr Desmond Devendran is the Director of Cybersecurity and Compliance at Logical Operations, specializing in the intersection of AI, machine learning, and cybersecurity. With extensive experience in the development and application of AI technologies in various industries, Mr. Desmond has led numerous initiatives to enhance security protocols and mitigate risks associated with AI-driven systems. His expertise includes designing and delivering certification programs in R and Python for R&D practitioners, as well as conducting training sessions focused on secure and ethical AI deployment various critical sectors such as banking and telco.
Certifications: CFR, PMP, CISA,CRISC,CISM and CISSP
Rick Lemieux
Rick Lemieux is the co-founder and Chief Product Officer for the DVMS Institute. The DVMS NIST Cybersecurity Framework accredited certification training programs teach organizations of any size, scale, or complexity the skills to build a NIST Cybersecurity Framework risk management program capable of identifying and mitigating cybersecurity risk. The DVMS Professional accredited certification training programs teach organizations of any size, scale, or complexity to build a Culture and Digital Value Management Overlay System (DVMS) capable of protecting organizational digital performance, resilience, and client trust. Rick has 40+ years of passion and experience creating and delivering solutions designed to provide the digital outcomes expected by executive management, government regulators, and operational stakeholders. In 2015, the Tech 10 Awards identified Rick as one of the top five entrepreneurs in the State of Rhode Island for developing innovative training and mentoring solutions for organizations worldwide.