The Five Most Dangerous New Attack Techniques | Demystifying The Top Emerging Cyber Threats

Channel:
Subscribers:
4,530
Published on ● Video Link: https://www.youtube.com/watch?v=IG_TBpxMmU4



Duration: 27:03
60 views
0


ITSPmagazine Event Coverage: RSAC 2023 San Francisco, USA | A Conversation with SANS Instructors Katie Nickels and Johannes Ullrich

Guests:

Katie Nickels, Certified Instructor and Director of Intelligence Operations at SANS Institute [@sansforensics] and Red Canary [@redcanary]

On LinkedIn | https://www.linkedin.com/in/katie-nickels/

On Twitter | https://twitter.com/likethecoins

On Mastodon | https://infosec.exchange/@likethecoins

Johannes Ullrich, Dean of Research at SANS Technology Institute [@sansforensics]

On LinkedIn | https://www.linkedin.com/in/johannesullrich/

On Twitter | https://twitter.com/sans_isc

On Mastodon | https://infosec.exchange/@jullrich

____________________________

Host:

Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]

On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin

____________________________

This Episode’s Sponsors

BlackCloak | https://itspm.ag/itspbcweb

Brinqa | https://itspm.ag/brinqa-pmdp

SandboxAQ | https://itspm.ag/sandboxaq-j2en

____________________________

Episode Notes

In this new RSA Conference Coverage podcast episode with ITSPmagazine, cybersecurity experts and SANS instructors, Katie Nickels and Johannes Ullrich, delve into the "Five Most Dangerous New Attack Techniques" panel, a discussion they've been part of for the past few years. They shed light on how they identify these top techniques by examining their increasing prevalence and potential impact. Joined by an outstanding panel of experts, including Heather Mahalik, a mobile technology specialist, and Steve Sims, an offensive security guru, they offer unique insights from different sides of the industry while also highlighting the importance of practical, hands-on advice and defense strategies against these threats.

The panel emphasizes the importance of practical, hands-on advice and defense strategies to combat these emerging threats. Furthermore, Johannes shares valuable information about the Internet Storm Center's role in monitoring attacks and disseminating knowledge within the cybersecurity community.

Tune in to this must-listen episode for a sneak peek of the latest attack techniques, evolving defense mechanisms, and the collaborative efforts of the cybersecurity community that will be presented during the panel so you can stay one step ahead of the attackers.

Don't forget to share and subscribe to ITSPmagazine's RSA Conference Coverage to keep up with the latest trends in technology and cybersecurity.

____________________________

Resources

Session | The Five Most Dangerous New Attack Techniques: https://www.rsaconference.com/USA/agenda/session/The%20Five%20Most%20Dangerous%20New%20Attack%20Techniques

Internet Storm Center Diaries: https://isc.sans.edu/

Learn more, explore the agenda, and register for RSA Conference: https://itspm.ag/rsa-cordbw

____________________________

For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2023-rsac-san-francisco-usa-cybersecurity-event-coverage

Are you interested in telling your story in connection with RSA Conference by sponsoring our coverage?

👉 https://itspm.ag/rsac23sp

Are you interested in sponsoring an ITSPmagazine Channel?

👉 https://www.itspmagazine.com/podcast-series-sponsorships

To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:

https://www.itspmagazine.com/redefining-cybersecurity-podcast

Be sure to share and subscribe!




Other Videos By ITSPmagazine


2023-04-20Strategies for Building a Positive Work Environment for Security Teams and CISOs with Dr. Rebecca Wy
2023-04-19Introducing 'The Leadership Student Podcast' | A Conversation With Podcast Host MK Palmore
2023-04-19From Tech Silos to Cyber Synergy: Smarter Vulnerability Management with Brinqa
2023-04-19The C-Suite Culture Compass: A Diplomat's Guide to Cyber Leadership and Culture
2023-04-19Ethical Dilemmas in the Age of AI: Balancing AI Advancements and Cybersecurity
2023-04-17One Health Lessons: Inspiring Understanding & Change Through Education and global collaboration.
2023-04-16Hacking the Skies: A Deep Dive into Airplane Cybersecurity. The reality of hacking airplanes RSAC 23
2023-04-14Ready for Takeoff: The Autonomous Aviation Revolution. The New Air Mobility On Redefining Society
2023-04-14ITSPmagazine Podcast Network Weekly Catch-Up | April 14, 2023 | With Marco Ciappelli and Sean Martin
2023-04-13Rebooting Cybersecurity: A Revived Conference Takes Center Stage in New York City
2023-04-13The Five Most Dangerous New Attack Techniques | Demystifying The Top Emerging Cyber Threats
2023-04-11Book | The Experience Machine: How Our Minds Predict and Shape Reality | With Philosopher Andy Clark
2023-04-11The Importance of Software Bill-of-Materials (SBOMs) | A Conversation with Allan Friedman from CISA
2023-04-10Black Resilience: The Blueprint for Black Triumph in the Face of Racism | Black Resilience Movement
2023-04-10CT Cubed At The RSAC 2023's Aerospace Village | ITSPmagazine Event Coverage RSAC 2023 San Francisco
2023-04-10New Show, Locked Down Podcast Introduction with Taylor Parsons + Kayla Williams
2023-04-07ITSPmagazine Podcast Network Weekly Catch-Up | April 7, 2023 | With Marco Ciappelli and Sean Martin
2023-04-07The Art of Storytelling: How to Engage Your Audience and Achieve Your Goals
2023-04-06ChatGPT: Revolutionizing Healthcare with Dr. Robert Pearl | Why every physician will be using it...
2023-04-06Robotic Waterway Crusaders | Harnessing Technology to Tackle Waterway Pollution | A Ranmarine Story
2023-04-05Book: More than a Glitch, Confronting Race, Gender, and Ability Bias in Tech with Meredith Broussard



Tags:
techniques
panel
threats
katie
year
people
talking
sessions
heather
rsa
supply chain
sensors
steve
stories
incidents
rsa conference
johanna
theme
malware
volunteers
cybersecurity
attack techniques
threat intelligence
ITSPmagazine
RSA Conference
Internet Storm Center
defense strategies
mobile technology
digital security
hacking tactics
cybersecurity experts
emerging threats
practical advice
information sharing
cybersecurity collaboration
SANS