Trust In Tech – Let’s talk about Security II – Session Abstracts


Hasain Alshakarti 

Securing Privileged Access First

Cyber-attackers target accounts and other elements of privileged access to rapidly gain access to targeted data and systems using credential theft and reuse attacks like token manipulation, Pass-the-Hash and Pass-the-Ticket.


Traditional security approaches have focused on using the organizations network as the primary security perimeter, but the network security is often bypassed especially when data and resources are hosted outside the traditional network boundary or when the adversaries obtains access on workstations inside the network boundary through phishing and other attacks.


Using examples from incidents, attacks and red team assignments to demonstrate the importance of governing privileged access and how it minimizes your organization’s attack surface and thwart in-progress attacks.



DIY – Cybersecurity Detection and Response Today’s biggest challenge is that many organizations are not capable of detecting security breaches and are not able to properly respond to attacks. The major failure noted when investigating a breach is the gap between the speed of compromise and the speed of detection.


IT security needs to shift from prevention and protection to investing in capabilities that can detect a threat when it occurs. Responders must be able to act quickly while investigating a threat and the potential business impact of the breach.


Using insights from numerous incident cases we walk you through a sample attack to showcase the importance of good detection and response capabilities.


Alexander Benoit

The new era of endpoint security. Why you should at least build showcases to detect, analyse and react to cyber-attacks now!


Cyber Security & Defense is the emerging topic of the IT industry these days. A secure environment is no longer just a well-maintained firewall or a well-managed network. Rather, it is made up of several layers. However, most companies are „reactive“ instead of „proactive“, or neither, when it comes to securing their IT environments and detecting security breaches. In addition to this, the product portfolio and the security market is changing rapidly, and these changes make our jobs as IT Professionals significantly more difficult. But how can we deal with this challenge? In my session I will take a look into supposed “obvious“ security threats and how the Microsoft Cybersecurity stack can help to detect attackers and threats that have evaded our defenses.




Stephan Gerling  

“Do not forget the physical security.” When planning and reality clash”


Today i want to Talk about some time on physical security and pitfalls.

We will learn about facility access and their pitfalls in implementations. Do’s and don’ts in access controlls

and that the proper selection of a transponder type should be in focus.

Once in, we learn about things that could happen inside a building and what counter measures we could implement.



Part 1

Physical Access to property

here we will learn about pitfalls in desinging or implementing security controlls to enter a property

– fences, gates

– access controls

– card systems


Part 2

threats inside a building

– what could happens when a few minutes unattended

– rouge devices

– spy tools


Part 3

What we can do

– countermeasures

– tips and tricks



Mike Hamilton

The Lost Boys – How Linux and Mac platforms intersect with a Windows-centric Security World


So often the fact that Windows has such a large market share of the desktop/laptop market renders Linux and Mac as the Lost Boys in the world of security.  The session will focus on how neglecting Linux and Mac systems in your environment can radically affect your overall security posture.  We’ll cover quite a few real-world scenarios to highlight the importance of ensuring full and total coverage of endpoints, servers and cloud infrastructure, regardless of operating system.



 Christina Lekati  

Social Media: How you make yourself a target and help obstruct corporate security


In today’s world, online presence is important. Social networking profiles can create a competitive advantage for many organizations and individuals. Despite the benefits, a strong online presence can also become a vulnerability. Christina Lekati, a social engineering expert, will explain how the online presence of a company’s employees on social media can attract social engineers to target them, and then use them as “open doors” through the organizational security. The talk will cover the topic of information gathering through social media (information gathering is the most common denominator in every social engineering attack) and explain how even seemingly innocent information can be exploited and used to manipulate targets. The talk includes a two-part demonstration on how a hacker’s mind works when harvesting information on social media; The first part includes real examples of posts that expose vulnerabilities, attract attackers and ultimately lead to security breaches. The second part includes a demonstration on how the information one provides online are gathered, categorized, analyzed and then used to craft an attack, as well as how one ends up revealing online more than one intends to. The talk closes with practical recommendations and best practices. Keep in mind, that the purpose on this talk is not to turn people away from using online platforms but rather, to teach them how to use them responsibly. In security, training and awareness can be the catalytic factor between a successful or an unsuccessful attack attempt.


Sende eine Antwort zu „Trust In Tech – Let’s talk about Security II – Session Abstracts“

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert.

© 2018 Trust in Tech