Stream 1:

11:05
Know your Enemy, Know Thyself

Charl Van Der Walt

Threat intelligence feeds, sold for hundreds of thousands of dollars per year, are marketed on a specific premise: If an entity is seen acting maliciously in one place, it can be expected in others. Threat Intelligence is a sound proposition that has its place in a mature security operation. But like so many good concepts in our industry, its path to commercialization has involved commoditization to the point of potentially dangerous over-simplification.
Gleefully, the geeks amongst reference Sun Tzu’s famous quote: ‘Know your enemy’.
Amongst all the noise and marketing for Threat Intelligence, however, our industry has lost site of the flip side of that popular quote … know yourself. Indeed – knowledge of our own people, data, networks and systems may offer infinitely more advantage over our shadowy adversaries than all the ‘intelligence’ we can buy about them.
In this talk we explore the true value of commercial intelligence as the data behind so-called ‘intelligence led’ security programs, then proceed to argue for ‘know thyself’ as a more logical investment of our resources, and finally present some examples of programs that we can use to improve our understanding of our own environments and exploit the native ‘home field’ advantage we have over our adversaries.

11:05
The Future of Cyber Security: Questioning Our Current Landscape

Phil Doherty

As the cyber security landscape is ever changing, the need to ask questions on how to improve and define our current processes grows more prominent.

This talk will focus on the challenges of categorizing specific attacks and how practitioners could question how we, as an industry collective, label threat actors and their methodologies in an increasingly interconnected ecology.

11:05
Cloud Security – It’s Not Black and White

Nigel Hawthorn

Security systems can be complex to implement, however some of them are at least easy to explain – malware is always bad and some web sites are always inappropriate for business. Cloud is different and we need to come from a different angle.  Some cloud services may be high risk, but even low risk services can be used in a high risk manner.  Our security approach needs to understand content, context and user behaviour to ensure appropriate policies. This presentation reviews current cloud adoption, shares anecdotes about cloud security and makes hard-hitting recommendations on what you need to do. Information from this presentation can be shared back in your organisation to make the case for a comprehensive cloud adoption team to address cloud needs.