Graphic recording artists at Scribing Magic visualized some of the interesting and thought-provoking presentations delivered at Tripwire's booth during Infosecurity Europe 2016.
2. PAUL EDON
BRIEFING THE GENERAL: 10
QUICK TIPS FOR IMPROVING
YOUR BOARD’S CYBER LITERACY
Many boards can improve
the knowledge, awareness
and confidence to connect
security to the business.
Edon shared tips on how
to effectively interact with
the board to bring security
issues front and center.
@ T R I P W I R E I N C / # I N F O S E C 1 6
3. NEXT-GEN CISO: HOW TO BE
A SUCCESSFUL SECURITY
LEADER OF THE FUTURE
This session featuring
industry-leading CISOs
discussed the evolution
of this role, including the
critical skills and
qualities of an effective,
next-generation CISO.
@ T R I P W I R E I N C / # I N F O S E C 1 6
4. PAUL EDON
IS SECURITY YOUR
COMPETITIVE
ADVANTAGE?
@ T H O M L A N G F O R D / # I N F O S E C 1 6
Langford discussed how
organisations can
differentiate themselves by
ensuring employees are
fully aware of what
security means to the
company, and creating a
security-focused culture.
5. PAUL EDON
CHASING RAINBOWS –
FORGETTING ABOUT
THE RAIN
@ Q U E N T Y N B L O G / # I N F O S E C 1 6
Taylor highlighted some
of the recent headline-
grabbing stories, and
what organisations can
do to proactively address
the potential of losing
valuable information.
6. PAUL EDON
COMPLETE DEFENSE:
GROUND TROOPS WITH
AIR SUPPORT
@ T R I P W I R E I N C / # I N F O S E C 1 6
Ebrahimi discussed how
to eliminate “blind spots”
from network to
endpoint, respond faster
to incidents through
tighter integration, and
create stronger security
through partnerships.
7. PAUL EDON
CONNECTING SECURITY
TO THE BUSINESS
@ A M I S E C U R E D / # I N F O S E C 1 6
In this session, Singh
created a mind map of
Endpoint Detection and
Response (EDR),
including the critical
components of threat
intelligence, vulnerability
management, software
discovery and more.
8. PAUL EDON
CRYPTOGRAPHY, QUANTAM
COMPUTING & THE FUTURE
OF CYBER SECURITY
CONTROLS
@ J A Y A B A L O O / # I N F O S E C 1 6
Jaya discussed the
evolution of cyber
security controls against
a background of
increasingly complex
risk and vulnerabilities,
multiple attack vectors
and sophisticated threat
actors.
9. DATA BREACH SURVIVOR:
REAL WORLD TRIPS, TRICKS
& ADVICE
Edon shared practical
strategies security
professionals can utilise
to effectively recover
from security incidents,
as well as key
information that must be
communicated to
business stakeholders.
@ T R I P W I R E I N C / # I N F O S E C 1 6
10. ENDPOINT DETECTION
AND RESPONSE
FOR DUMMIES
@ T R I P W I R E I N C / # I N F O S E C 1 6
In this session, Hermosillo
provided valuable tips and
advice on how to
approach the basics for
building a strong EDR
platform that aligns with
your organisation’s
security program.
11. HEADLINES, BREACHES & THE
BOARD: YOU’VE GOT THEIR
ATTENTION – NOW WHAT?
@ T R I P W I R E I N C / # I N F O S E C 1 6
In this panel discussion,
industry experts gave
real-world insight into
how to engage senior
management in a way
that focuses on the most
important aspects of
cybersecurity.
12. ICS SECURITY: PROTECTING
YOUR CRITICAL
INFRASTRUCTURE
Davies described the
growing threat
landscape of industrial
control system
environments, as well as
approaches and
strategies for protecting
mission-critical systems.
@ S T E P H E N F D AV I E S / # I N F O S E C 1 6
13. PAUL EDON
KNOWING THE UNKOWN:
MONITOR YOUR
ENDPOINTS FOR ENEMIES
@ M R T R AV / # I N F O S E C 1 6
Although we can prepare
for zero-days, new
tactics or techniques are,
by definition, “unknown
unknowns.” In this
presentation, Smith
shined a light on how to
bring these unknown
attacks to light.
14. PAUL EDON
INCREASING INSIGHT:
IMPROVING INCIDENT
RESPONSE CAPABILITIES
WITH DYNAMIC FILE ANALYSIS
@ T R I P W I R E I N C / # I N F O S E C 1 6
Wood demonstrated
how sandboxing
capabilities allow
automatic detection of
zero-day threats and
give unprecedented
access to global threat
intelligence for faster
incident response.
15. UNDERSTANDING & AVOIDING
THE THREAT OF
RANSOMWARE
Ransomware is
increasingly targeting
organisations of all
sizes, and many
businesses have no
strategy for defence or
recovery. Wood
highlighted the 7 key
defenences to adopt.
@ P E T E R W O O D X / # I N F O S E C 1 6
16. PAUL EDON
INTEGRATING BREACH
DETECTION & ENDPOINT
PROTECTION TO WIN THE
CYBER WAR
@ T R I P W I R E I N C / # I N F O S E C 1 6
In this case study, Moles
explained how a
technology integration of
Tripwire and Lastline
allowed an organisation
to adequately detect and
defend against new
threats.
17. SECURE CODING &
DEVELOPMENT: EMBEDDING
APPLICATION SECURITY INTO
BUSINESS PROCESSES
@ T R I P W I R E I N C / # I N F O S E C 1 6
Panelists discussed the
reasons for the
disconnect between
security & development,
as well as the steps that
can be taken to drive a
secure application
development process.
18. FOR THE LATEST SECURITY
NEWS, TRENDS AND INSIGHTS,
VISIT US AT:
TRIPWIRE.COM/BLOG
GRAPHIC RECORDINGS BY:
MEETING MAGIC
@MEETINGMAGICLTD