Stop the Most Advanced Adversaries with the Top 5 Critical Security Controls

Wednesday, March 29, 2017 - 11:00 AM PDT

Unplanned change is the enemy of security and availability. Whether it comes from an advanced adversary, a malicious insider or a trusted employee, understanding change in your IT environment can help you identify the difference between a simple modification and a malicious attack.

Join us on Wednesday, March 29th, 2017 for a demonstration of real-world attacks as Travis Smith, Sr. Security Researcher at Tripwire, analyzes how attackers commonly gain access to improperly configured systems and the impact data breaches can have on an organization.

Attendees will get a breakdown of the Center for Internet Security’s (CIS) Critical Security Controls, which when implemented, can reduce your risk of cyber-attack by up to 85% by:

  • Continuously inventorying all hardware/software assets
  • Establishing standard secure configurations
  • Running automated vulnerability scanning tools
  • Minimizing anomalous behavior with better administrative privileges

Sign up today to reserve your spot!

Agenda

Time [PST] Session
8:00 am
Welcome & Update on Tripwire Security Innovation

Gus Malezis, Tripwire President

8:30 am
Hiding in Plain Sight: Protect Against Bad Hashes

Katherine Brocklehurst, Senior Product Marketing Manager, and Dayne Cantu, Federal Systems Engineer

9:00 am
Highlight Changes of Interest to Thwart Emerging Breaches

Ed Smith, Senior Product Marketing Manager, and William Muschetto, Systems Security Engineer

9:30 am
IT Operations Enables Security and Compliance

Dave Miklasevich, Product Marketing Manager, and William Muschetto, Systems Security Engineer

10:00 am
Expand Your Threat Intelligence

Tripwire Enterprise and Cisco ThreadGrid

10:30 am
Customer Success Story

Worldpay, a payment processing company for mail orders, Internet retailers and point-of-sale transactions


Travis Smith

Senior Security Researcher, Tripwire

Travis is a Senior Security Research Engineer at Tripwire. He has over 10 years experience in security, holds an MBA with a concentration in information security, and multiple certifications including CISSP, GIAC and GPEN.