Topic: Ghost Army, Why let attackers have the advantage?
Cyber Attackers have always been able to trust that their tools and technology. If they manage to break into an organisation’s network through technical means or simply by getting a job there - they can use those tools to understand how to traverse the network and what Tactics and Techniques will allow them to reach their goal without being detected.
The same can’t be said in the physical world, where Attackers have never been able to rely 100% on their observations. There are many examples throughout history of Attackers and Defenders deceiving each other – so what lessons can be derived from the physical world and how are organisations applying those lessons in Cyber?
Join Jim Cook – Regional Director for Attivo Networks for a discussion on some of the most effective misdirection in history and special guest Andrew Scully – Head of Cyber from Shelde who will share some personal stories of using deception technology to catch attackers
Participants will have the opportunity at the end of the session to ask questions of the speakers via the Q&A Chat box.
||Jim Cook – Regional Director at Attivo Networks
Jim has an 18 year history of Cyber Security management in Australia. He works at Attivo Networks, which is the market innovator in a new cyber security category 'Deception Technology’. Attivo deals with the difficult problem of detecting threats inside the network from people, malware, external attackers regardless of what tactics and techniques they are using.
||Andrew Scully – Head of Cyber at Shelde
Andrew is an information security executive with over 15 years’ experience delivering outcomes that have aligned risk strategies and technical controls for commercial, military, technology, telecommunications and federal government sectors. Roles have included; CISO for Telstra Defence, Sr Director Defensive Cyber Operations at Symantec and Strategic Cyber Security Advisor to the Royal Australian Air Force (Reservist). Andrew also enjoys volunteering his time to assist Australian cyber startup’s through Cyrise. Currently, Andrew is Head of Cyber for Shelde.
This webinar is free and only available to AISA Members, please click here to register online
Non AISA Members: If you would like to become an AISA member you can join here
For any queries regarding this event, please contact AISA Event & Sponsorship Manager, Susanna Palermo via email firstname.lastname@example.org or visit our website www.aisa.org.au
- 11:00am - 12:00pm AEST (Brisbane, Canberra, Hobart, Melbourne & Sydney)
- 10:30am - 11:30am ACST (Adelaide & Darwin)
- 9:00am - 10:00am AWST (Perth)
Participate in the webinar:
- Once you have registered you will receive a confirmation email with the webinar registration link. Use this link and ensure you logon to the webinar at least 10 minutes prior to the start time
- You will require a strong and stable internet connection
- It is recommended you use a headset or headphones so you can hear the presentation
- A recording of the live session will be available for registrants after the event
This webinar is proudly sponsored by:
AISA has evaluated the use of Zoom based on the Traffic
Light Protocol which was facilitated for greater information
sharing. AISA webinars are considered TPL White as the information
contains minimal or no foreseeable risk of misuse. In addition AISA has evaluated the
use of Zoom for this purpose as aligned to ACSC
Web Conferencing Security, April 2020, see link at https://www.cyber.gov.au/publications/web-conferencing-security
and has implemented controls to minimise risks. You are required to register for the webinar via the Zoom