[Busec] Fwd: ECE Seminar Speaker Israel Barak, Mar. 15 at 2 pm in PHO 339
trachten at bu.edu
Tue Mar 7 11:55:08 EST 2017
> Begin forwarded message:
> From: "McNevin, Gabriella Diamond" <gmcnevin at bu.edu>
> Subject: ECE Seminar Speaker Israel Barak, Mar. 15 at 2 pm in PHO 339
> Date: March 7, 2017 at 11:40:05 AM EST
> To: "ece-faculty at bu.edu" <ece-faculty at bu.edu>, ece-undergrad <ece-undergrad at bu.edu>, ece-researchstaff <ece-researchstaff at bu.edu>, "ecegrad-students at bu.edu" <ecegrad-students at bu.edu>
> Resent-From: <trachten at bu.edu>
> Operation Escalation: How Targeted Cyber Attack Actors Leverage Darknet Black Markets to Gain Access into Enterprise Networks
> <https://twitter.com/BU_ece> <https://www.facebook.com/BUece/> <https://www.linkedin.com/groups/1898316> <http://www.bu.edu/eng/files/2017/03/IsraelBarakLowRes-01-01.jpg> <http://www.bu.edu/eng/departments/ece/events/>
> Israel Barak
> Chief Information Security Officer
> Mar. 15, 2017 (Weds.), 2:00 pm
> 8 St. Mary’s St., PHO 339
> Faculty Host: Ari Trachtenberg
> Light refreshments will be available at 1:45 pm.
> View all upcoming events <http://www.bu.edu/eng/departments/ece/events/>
> Detected breaches are often classified by security operation centers and incident response teams as either "targeted" or "untargeted." This quick classification of a breach as "untargeted," and the following de-prioritization for remediation, often misses a re-classification and upgrade process several attack groups have been conducting. As part of this process, assets compromised as part of broad, untargeted "commodity" malware campaigns are re-classified based on the organizational network they're part of to determine their potential value in the market. The higher value ones are upgraded and taken out of the "commodity" campaign to prepare them for a sale, to buyers planning a targeted attack. Organizations overlooking this often miss the opportunity to eliminate the threat prior to its escalation.
> This session will cover the analysis of endpoint and network data captured during these re-classification operations, demonstrating the techniques and procedures used by some of the attack groups as they migrate compromised endpoints from the "commodity" threat platform to the valuable-target's platform. What measures can be taken to detect that a commodity threat is going through a migration process? How can this be leveraged to increase the efficiency of the incident response process?
> Israel Barak is the CISO at Cybereason, a fast-growing cybersecurity company headquartered in Boston. Mr. Barak is a cyber defense and warfare expert, with his extensive background established at the Israeli Defense Forces and the Government of Israel. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats. Mr. Barak founded and headed the Israeli Defense Forces red team unit, as well as established and operated various cyber warfare teams. As part of his various roles, Mr. Barak developed cyber warfare infrastructure and proprietary technologies, including leading development of proprietary cryptographic solutions, research and analysis of security vulnerabilities, information security products and technologies, and managed enterprise-wide large scale development and implementation projects of cyber technologies. Mr. Barak spent years training, guiding and professionally mentoring new personnel, providing in-depth cyber expertise as it relates to cyber warfare, cyber security, and threat actor’s tactics and procedures.
Prof. Ari Trachtenberg ECE, Boston University
trachten at bu.edu http://people.bu.edu/trachten
-------------- next part --------------
An HTML attachment was scrubbed...
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 495 bytes
Desc: Message signed with OpenPGP
More information about the Busec