Opportunities to Meet LEO's Experts

LEO CYBER SECURITY SPEAKING EVENTS

LEO speakers are often sought after having spoken, keynoted, or served on panels at conferences such as RSA Security Conference, Blackhat, SxSW Interactive, ISC2 Congress, Infosecurity Europe, SOURCE Boston, SOURCE Barcelona, SANS Digital Forensics and Incident Response (DFIR) Summit, Security BSides San Francisco, Security BSides Boston, Security BSides Ottawa, Security BSides Las Vegas, Security BSides Los Angeles, Countermeasure, PuppetConf, ChefConf, BayThreat, CloudBeat, OpenStack Summit, HTCIA Conference, AccessData User Conference, Americas Growth Capital West Coast Infosec and Technology Growth Conference 2011, BrightTalk Log Management Summit 2010, and others.

 

The following is the upcoming list of events where you can see LEO Cyber Security presentations and meet with the speakers.

Security BSides Oklahoma | Cryptology: It’s a Scalpel, not a Hammer
Mikhail Sudakov
April 13th, 2018 | 11:05am CST
Glenpool, OK
https://www.bsidesok.com/
In this not-too-technical presentation (not much math!), attendees will get a bird’s eye view of why crypto should be left to mathematicians and professionals and not approached lightly. Unfortunately, cryptology blunders are all too common today. Attendees will gain insight into why crypto is not something one can look up and hope to understand overnight. History has shown that implementing weak crypto, or rolling your own crypto, is often fraught with disaster. The slightest mistake often leads to complete scheme, not to mention data, compromise.
Presentation
Security BSides Oklahoma | The Stick, the Sting, & the Squirm: How to Get The Board to Focus on Cyber
Seth Jaffe
April 13th, 2018 | 2:05pm CST
Glenpool, OK
https://www.bsidesok.com/
Boards of Directors are finally taking note of cybersecurity risks. This session will arm attendees with legal opinions, authority recommendations, legislation, and proposed regulations for the purpose of soliciting resources from executives and board members.
Presentation
RSA Security Conference | Ransomware and Destructive Attacks
Andrew Hay
April 16, 2018 | 8:30 AM - 5:00 PM
San Francisco, CA
https://www.rsaconference.com
The impact of ransomware, destructive malware and related attacks is growing globally, with new actors taking part in leveraging crippling assaults. This seminar will provide a full day of focus on ransomware and its multi-faceted implications across technical, policy, compliance and financial responses. Full of firsthand case studies and lessons learned—some by virtue of being attacked directly and others hit downstream in the ripple effect, resulting in production losses—sessions will discuss the changing threat landscape, innovative research, response and recovery, and how to combat ransomware.
Presentation
Cybersecurity Law Summit | Incident Response Planning
Seth Jaffe
April 19, 2018
This is a three-part summit. Part 1 Planning. Part 2 the incident. Part 3 post incident.
Presentation
Cyber Security Summit Memphis | Incident Response Planning
Seth Jaffe
April 25, 2018
This is a three-part summit. Part 1 Planning. Part 2 the incident. Part 3 post incident.
Presentation
Atlantic Security Conference | Color Wars: Examining Models for Blue and Red Team Collaboration
Justin Silbert
April 27, 2018 | 9:15am AST
Halifax, NS, Canada
https://atlseccon.com/
In this talk, we will evaluate multiple scenarios and models that will help organizations and defenders determine the best red, blue, purple, green, or yellow architecture to ensure continuous 360 insight into security gaps. We will cover how to evaluate if a model is working, where tweaks can be made, and starting small, but getting big results.
Presentation
Atlantic Security Conference | Cryptology: It’s a Scalpel, not a Hammer
Mikhail Sudakov
April 27, 2018 | 1:00pm AST
Halifax, NS, Canada
https://atlseccon.com/
In this not-too-technical presentation (not much math!), attendees will get a bird’s eye view of why crypto should be left to mathematicians and professionals and not approached lightly. Unfortunately, cryptology blunders are all too common today. Attendees will gain insight into why crypto is not something one can look up and hope to understand overnight. History has shown that implementing weak crypto, or rolling your own crypto, is often fraught with disaster. The slightest mistake often leads to complete scheme, not to mention data, compromise.
Presentation
ISOI XX | "I" Before "R" Except After "IOC"
Andrew Hay
April 27, 2018 | 4:15pm PST
Victoria, BC, Canada
http://www.isotf.org/isoi20.html
Just because the security industry touts indicators of compromise (IOCs) as much needed intelligence in the war on attackers, the fact is that not every IOC is valuable enough to trigger an incident response (IR) activity. All too often our provided indicators contain information of varying quality including expired attribution, dubious origin, and incomplete details. So how many IOCs are needed before you can confidently declare an incident? Using actual investigations and research, this session will help attendees better understand the true value of an individual IOC, how to quantify and utilize your collected indicators, and what constitutes an actual incident.
Presentation
RMISC | "I" Before "R" Except After "IOC"
Andrew Hay
May 10, 2018 | 10:10am MST
Denver, CO
https://www.rmisc.org/
Just because the security industry touts indicators of compromise (IOCs) as much needed intelligence in the war on attackers, the fact is that not every IOC is valuable enough to trigger an incident response (IR) activity. All too often our provided indicators contain information of varying quality including expired attribution, dubious origin, and incomplete details. So how many IOCs are needed before you can confidently declare an incident? Using actual investigations and research, this session will help attendees better understand the true value of an individual IOC, how to quantify and utilize your collected indicators, and what constitutes an actual incident.
Presentation
Finovate Spring | Has the threat landscape expanded – or just shifted?
Heath Renfrow
May 10, 2018 | 4:00pm PST
Santa Clara, CA
https://finance.knect365.com/finovatespring/
A discussion of phishing, misconfigured servers (cloud), credential reuse and extortion.
Presentation
NolaCon | Fighting Child Exploitation with Oculum
Andrew Hay & Mikhail Sudakov
May 18, 2018
New Orleans, LA
https://nolacon.com/
This session will present the open source Oculum tool which was designed to aid forensic analysts in determining the probability that visual content (images and video) contains illicit content and provide a detailed report on its findings. The tool allows forensic analysts to narrow the analysis using automatically assigned tags, review specific illicit child exploitation content as it pertains to a particular case, victims, or suspects, and maintain a database of known cryptographic hashes, filenames, and other metadata for use in future cases.
Presentation

CONTACT US TO LEARN MORE

  • Please complete the following form and one of our team members will get back to you as soon as possible.


    If you would prefer, you may call LEO directly at (530)-FINDLEO