Exciting Times for GoSecure

RSA is right around the corner and GoSecure is excited to be there in our new booth. A lot of things have changed for GoSecure since last year’s RSA conference. Not only did GoSecure acquire EdgeWave, an industry leader in Inbox Detection and Response services, but we also launched new solutions and services including Next-Gen AV, Insider Threat Detection and Response, and several different Managed Detection and Response services.

Booth Activities

Be sure to stop by our booth — #1341 in South Expo Hall — to learn how we protect customers against the latest threats. You’ll have an opportunity to see our solutions in a 1:1 setting via our demo kiosks or you can attend one of our daily theater demonstrations.

No time for a demo? No problem. We will have cybersecurity analysts and experts on hand to quickly answer any questions you may have.

Chance to Win

Another reason to stop by our booth is a chance to win a Traeger Pro Series Pellet Grill, the best-selling pellet grill in the world. This grill just got better with an enhanced controller that allows you to monitor and adjust your grill anytime, anywhere from the Traeger app on your smartphone.

Even if you don’t win the grill, you can still pick up some GoSecure BBQ spice and other goodies.

Free Expo Pass

A great opportunity to explore the exhibit hall and hear the expo briefing center sessions and partner seminars. And of course, you will want to stop by the GoSecure booth to pick up some BBQ spice and a chance to win a Traeger Pellet Grill.

Register here to get your free expo pass. Here is your registration code: XE0UGOSEC

We hope to see you at RSA 2020!

Booth Theater

Tuesday, February 25th

  • 11:30Olivier Bilodeau – More than Free Schwag: GoSecure’s Open Source Contributions to Malware Analysis, Code Hardening and RDP Snooping
  • 2:30Eric Rochette – CyberSecurity: Would you rather look good or be good?
  • 4:30Katie Horne – Threat Hunter Life: Tales from the ARC

Wednesday, February 26th

  • 11:30Olivier Bilodeau – More than Free Schwag: GoSecure’s Open Source Contributions to Malware Analysis, Code Hardening and RDP Snooping
  • 2:30Eric Rochette – CyberSecurity: Would you rather look good or be good?
  • 4:30Sunny Jamwal – IR lessons taught by Russia

Thursday, February 27th

  • 11:00Olivier Bilodeau – More than Free Schwag: GoSecure’s Open Source Contributions to Malware Analysis, Code Hardening and RDP Snooping
  • 1:00Katie Horne – Threat Hunter Life: Tales from the ARC
Olivier Bilodeau
More than Free Schwag: GoSecure’s Open Source Contributions to Malware Analysis, Code Hardening and RDP Snooping Abstract

GoSecure Research group’s vision is simple: if we can raise the costs to online adversaries, everyone wins. We accomplish that by having good products, excellent service and by providing tools and training. We do it for clients but being one is not strictly necessary: if the ecosystem is more resistant it will discourage attackers. Helping anyone indirectly benefits our clients.

So, avoiding this year’s shiny object syndrome* (what’s next after the Minecraft sword?), we decided to highlight our significant open source contributions to the community in a booth presentation. We will cover three key open source projects created or maintained by GoSecure to help achieve the aforementioned vision:
• Malboxes: Safer Malware Analysis in the Cloud
• Find-Security-Bugs: Resolving Problems at the Source
• PyRDP: Advanced Offensive and Defenses Use Cases for RDP

Join us to hear about what we are doing with these and how you can use these in your organization!

Eric Rochette
Cybersecurity: Would you rather look good or look bad?

Discuss the realities behind cybersecurity assessments and what GoSecure learned when building our own methodology.

Katie Horne
Threat Hunter Life: Tales from the ARC

Good analysts are essential to any cybersecurity team’s success. Join Katie as she recounts some of her experiences with poor security practices, malware, and insider threat as a member of GoSecure’s MDR service.

Sunny Jamwal
IR lessons taught by Russia

This presentation will discuss the Incident Response lessons learned by hacks attributed to APT groups from Russia. Russian APT groups have been attributed to major hacks such as DNC hack in 2016. However, Russian was the first country to use military and cyber warfare in conjunction during Crimea annexation. Russian actors have been known to leverage mostly living off the land capabilities to compromise a system. The wold of cybersecurity is known to rinse and repeat methodology, hence these techniques are now leveraged by other APT groups as well. This talk will focus these techniques used by Russian Actors and focus on key system attributes to analyze when responding to an Incident.

Pin It on Pinterest