Blurred lines on Resilience - Visualizing the Cyber Security Battlefield

Recorded On: 10/01/2020

Cybersecurity is a complex problem, constantly evolving and shifting with teams unable to understand where threats are emerging. The tools being used, while valuable and costly have limitations, and those operators need a full picture of the cybersecurity battlefield. Are you making the most out of your security investments? How can we enrich the picture for each team to ensure that they have the best possible information and insight into the security posture of the network to meet our resilience and compliance goals. Join Joe Cummins as we walk through CLAW by CybernetIQ to provide a clear picture on the blurred lines between the OT, IOT, IT environments.  Built by security operators for security operators we’ll touch on:

  • Building a 3D map of the network infrastructure for greater understanding,
  • Threat Hunting using existing “living off the land” techniques,
  • Evolve and understand how to better, contain – identify – control each security threat,
  • See for the first time the each security “layer”, and a full 3600 picture of the network environment.

Attendees will learn how to increase the “speed of the analyst”, as well as discover new tradecraft to help bridge the gap between security operations and security engineering.

Joe Cummins

CybernetIQ

Joe Cummins has focused his career as an offensive cybersecurity professional, and now as a seasoned serial Entrepreneur within North America’s cyber ecosystem. Having led CybernetIQ (formerly Red Tiger Security) since inception in 2009 to now in 2020 developing technology from tradecraft found at the grassroots of the skills gap, Joe is constantly looking for ways to bridge the SecEng and SecOps trades. Over the course of his career, Joe has repeatedly built and sold a technologies focused on solving real-world cybersecurity challenges and bridging the gaps between IT and OT with products such as TOTEM (Building Management Systems), FOCAL (Unmanned Data Storage), RECON (Social Intelligence) as well as other disruptive technologies that have been developed under contract to various Private and Public organizations. Now most recently with CLAW – providing attack surface analysis for the ever evolving cyber battlefield.

Key:

Complete
Failed
Available
Locked
Blurred lines on Resilience - Visualizing the Cyber Security Battlefield
Open to view video.
Open to view video. Blurred lines on Resilience - Visualizing the Cyber Security Battlefield