9:00 A.M. - 12:00 P.M
Pre - Registration Only
Security and Resiliency of the Cloud for Incident Response Tabletop Exercise
Note: **Laptop is not Required**
Hector Rodriguez, Amazon Web Services
This tabletop (TTX) is designed to educate attendees on the capabilities and cloud services that can be used to detect, respond, and recover from a cyber event scenario using industry use cases. Through two scenarios, participants determine desired capabilities to address each phase of the NIST Incident Response (IR) lifecycle framework and identify cloud services available to meet their requirements.
This interactive, three-hour incident response tabletop exercise benefits business and technology leaders and regulators. As a member of a team, you are part of an active and inclusive discussion on how to prevent, detect, contain, and eradicate a simulated cyber incident by exploring required capabilities and processes. Learn how to leverage cloud services for security, high availability, incident response, and continuity of operations for systems by considering the advantages of cloud security and resiliency to understand the opportunities available to them. This will be done through the lens of the National Institute of Standards and Technology Incident Response Framework.
Enterprise Automation: Addressing the workforce challenges with security operations
Note: **Laptop Required**
Ajay Chenampara, Red Hat
Jason Nowakowski, Red Hat
This session provides attendees hands-on, instructor-guided labs that address common Day 2 operational tasks, such as:
- Automated patching across multiple operating systems and generating automated patching/compliance reports;
- Automated remediating of network firewall rules (automated incident response);
- Automated documentation across multiple network vendors; and
- Integration with ITSM systems like ServiceNOW - ITSM workflow-driven automation.
Introduction to Network Security
Note: **Laptop Required**
Tom Robinson, Fortinet
Today’s networks are highly complex environments with borders that are constantly changing. In response to this highly complex environment, firewalls have become robust, multi-functional devices that counter an array of threats to your network.
In this workshop, you will learn the basics of how to install a firewall and use it to protect a network.
Attendees of this workshop will learn how to:
- Install a device in a network;
- Configure basic routing;
- Create security policies;
- Apply security scanning;
- Configure local user authentication;
- Connect to the CLI;
- Configure the Security Fabric, and
- Configure SSL VPN in web and tunnel mode.
Bring your laptop, mouse and power cable. This training includes a hands-on lab.
12:30 - 3:30 PM
Pre - Registration Only
Application Security Scanning – Techniques in Leveraging Automated Tools and Automated Remediation
Note: **Laptop is not Required**
Johnny Wong, Veracode
During this live presentation, attendees will receive the techniques and tools to leverage Dynamic Application Security Testing (DAST), Static Application Security Testing (SAST), Software Composition Analysis (SCA), Penetration Testing, and most importantly, dashboards to track metrics and identify remediation priorities.
Applying the Principle of Least Privilege in Cloud Planning
Note: **Laptop is not Required**
Thomas Ricardo, Oxford Global Resources
This session is a practical lab explaining the principle of least privilege throughout cloud planning. Designed for non-technical persons to understand and reinforce the concept throughout the planning stage, this is still a practical session for technical personnel. Through the session, attendees will explore what least privilege is, how it comes with resources, and how it applies to employees.
Download the Applying the Principle of Least Privilege in Cloud Planning presentation.
The Evolution of Access to Applications with ZTNA
Note: **Laptop Required**
Tom Robinson, Fortinet
Zero Trust Network Access (ZTNA) is an access control method that uses client device identification, authentication, and Zero Trust tags to provide role-based application access. It gives administrators the flexibility to manage network access for On-net local users and Off-net remote users. Access to applications is granted only after device verification, authenticating the user’s identity, authorizing the user, and then performing context-based posture checks using Zero Trust tags. In this workshop, attendees learn about how Fortinet offers a firewall-based approach to ZTNA that results in a flexible and comprehensive solution that delivers universal ZTNA. Wherever the user is and wherever the application is, Fortinet’s process can effectively and efficiently grant (or block) application access based on a variety of factors. You will learn how to:
- Integrate FortiClient Endpoint Management Server (EMS) into Security Fabric.
- Configure EMS Zero Trust policies and rules to protect corporate and remote users.
- Configure ZTNA HTTPS Access Proxy for secure remote access to applications.
- Configure ZTNA IP/MAC Based Access Control for On-net dynamic access.
- Demonstrate successful operation of these critical functions.
Bring your laptop, mouse and power cable. This training includes a hands-on lab.