Loading…
This event has ended. Visit the official site or create your own event on Sched.
ONLINE REGISTRATION IS NOW CLOSED. Please visit us on-site during registration hours next week to get a badge.

About the CONNECT Conference:                                                        

Today’s threat landscape is broad and sophisticated, and the consequences for failing to adequately protect against threats and respond appropriately when an attack is underway are far reaching. SecureAuth and Core Security deliver to enterprise-class organizations a discover, secure & protect, and respond capability that is only possible with vulnerability, endpoint, and network security fused with a strong identity protection framework.

Identity-based security automation is a new category that reflects the challenges of a silo’ed approach to enterprise security. Automation in the security operations center (SOC) is the inevitable result of increasingly sophisticated technologies and automation is only possible when false positive and negative results are minimal and the response action is precise and coordinated to minimize restrictions on legitimate access to enterprise resources.

SecureAuth and Core Security customers attending the CONNECT event will hear from company leaders, respected speakers, and industry peers on this new approach to the threat landscape. Product sessions will dive into details on current and future products, and research team members will be available to discuss new technologies. 

REGISTER TODAY

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Impact Breakout [clear filter]
Tuesday, October 17
 

12:30pm EDT

Security Consulting Services - Which Is The Best Option For Me?
Vulnerability Assessments, Penetration Tests and Red Teaming – Do you know what these tactics are all about? In this session, we will present our understanding of these practices in terms of when to apply them and what to expect. Nowadays, organizations run on top of hundreds, if not thousands, of Information Technology assets with some of them on premise and others cloud based. Having control over all of this is a challenging task. Based on our extensive experience with securing our customers, I will show what real findings and attack trends look like while hopefully, shedding some light on how to be prepared to resist current attacks.

Speakers
DS

Diego Sor

SCS Director, Core Security


Tuesday October 17, 2017 12:30pm - 1:15pm EDT
Ellington Salon B

1:15pm EDT

The Wrong Kind of DevOps Talk
DevOps seems to be where all the cool kids in IT are hanging out these days. While not all of us get to work in DevOps shops, we can steal some of the toolset to up our game for lab and skills development purposes. In this talk, you'll not only learn about DevOps-y tools like packer, vagrant and ansible - but how you can use them to make it easier to build and share lab environments for testing, training and more.

Speakers
avatar for Bobby Kuzma

Bobby Kuzma

Security Researcher and Evangelist, Core Security
Bobby Kuzma is a security geek and retired IT consultant who accidentally acquired a CISSP at the tender age of 22. If it processes data, he’s probably tried to make it do bad things. He teaches, mentors, and explores (and occasionally explodes) technology. Four out of five coworkers... Read More →


Tuesday October 17, 2017 1:15pm - 2:00pm EDT
Ellington Salon B

2:30pm EDT

Impact Roadmap
Speakers
avatar for Jesse Irvin

Jesse Irvin

Product Manager, Core Security
Jesse is a security professional with a background in Vulnerability Management and Assessments. He came to Core Security as the Product Manager for the Core Impact Penetration testing solution and is passionate about working with and delivering fantastic products that not only get... Read More →


Tuesday October 17, 2017 2:30pm - 4:00pm EDT
Ellington Salon C
 
Wednesday, October 18
 

1:00pm EDT

Core Impact Tips & Tricks
Everyone loves a good tip, like turning on your seat warmer to keep a pizza hot while driving home. In this session an experienced pen-tester will walk users though cool features and unique ways to use Core Impact during testing, such as demonstrating how to set up DNS channels for agent communications, downloading and running PowerShell scripts even when compromised devices do not have internet connectivity, how to utilize the agentless WMI testing capabilities to make your tests even more stealthy, and much, MUCH more! Come to this session and learn how to continue advancing your pen-testing by utilizing the full functionality of Core Impact.

Speakers
avatar for Martin Gallo

Martin Gallo

Product Owner, Core Security
Martin is a security professional with more than 10 years of work experience. After a few years in the IT consulting business at one of the big four, he moved to Core Security to take up the challenge of specializing in penetration testing, code reviews and vulnerability hunting... Read More →


Wednesday October 18, 2017 1:00pm - 1:45pm EDT
Ellington Salon B

1:45pm EDT

Storytime with Core Impact
Let’s write a story, not a short story or a novel, but a “Product” User Story related to Impact. Grammar not your strong suit? No worries, an easy template will be provided, just fill in the blanks. It’s kind of like Mad Libs but with the purpose of creating a new product feature, and maybe a few laughs in the process. In this hands on session, users will be separated into small groups. Groups will select one of three new product features or they can develop their own. Using a simple template, groups will create a user story for this feature on how they would want it to work and the purpose of the feature. User Stories are used by Product Management to convey a feature idea to the developers so they understand the end goal of the design. Please join us to create a new Impact User Story.

Speakers
avatar for Jesse Irvin

Jesse Irvin

Product Manager, Core Security
Jesse is a security professional with a background in Vulnerability Management and Assessments. He came to Core Security as the Product Manager for the Core Impact Penetration testing solution and is passionate about working with and delivering fantastic products that not only get... Read More →


Wednesday October 18, 2017 1:45pm - 2:30pm EDT
Ellington Salon B

3:00pm EDT

Threat Dissection

Anatomy 101 of how and what threats actually do in your network.  In this session we will pick a well-known threat and go through the cycle of how actors behave and how security teams can deter, detect, respond and validate using Core Security products. 


Speakers
avatar for Alberto Soliño Testa

Alberto Soliño Testa

Research Director, Core Security
Alberto Soliño is the Director of Research at Core Security where he is responsible for Core's innovation initiatives, including attack research, security advisories, conference publications and knowledge transfer. During his 20 years at the company Soliño has worked as PM for Core... Read More →


Wednesday October 18, 2017 3:00pm - 3:45pm EDT
Ellington Salon B

3:45pm EDT

Core Impact Roadmap Feedback
Make your mark on the future of Impact! Join Jesse Irvin, Core Security’s Product Manager for Core Impact, and tell him what you want to see in the next releases of Core Security’s penetration testing products.

Speakers
avatar for Jesse Irvin

Jesse Irvin

Product Manager, Core Security
Jesse is a security professional with a background in Vulnerability Management and Assessments. He came to Core Security as the Product Manager for the Core Impact Penetration testing solution and is passionate about working with and delivering fantastic products that not only get... Read More →


Wednesday October 18, 2017 3:45pm - 4:15pm EDT
Ellington Salon B