

Exciting Times for GoSecure
RSA is right around the corner and GoSecure is excited to be there in our new booth. A lot of things have changed for GoSecure since last year’s RSA conference. Not only did GoSecure acquire EdgeWave, an industry leader in Inbox Detection and Response services, but we also launched new solutions and services including Next-Gen AV, Insider Threat Detection and Response, and several different Managed Detection and Response services.
Booth Activities
No time for a demo? No problem. We will have cybersecurity analysts and experts on hand to quickly answer any questions you may have.
Chance to Win
Even if you don’t win the grill, you can still pick up some GoSecure BBQ spice and other goodies.
Free Expo Pass
Register here to get your free expo pass. Here is your registration code: XE0UGOSEC
We hope to see you at RSA 2020!
Booth Theater
- 11:30 – Olivier Bilodeau – More than Free Schwag: GoSecure’s Open Source Contributions to Malware Analysis, Code Hardening and RDP Snooping
- 2:30 – Eric Rochette – CyberSecurity: Would you rather look good or be good?
- 4:30 – Katie Horne – Threat Hunter Life: Tales from the ARC
Wednesday, February 26th
- 11:30 – Olivier Bilodeau – More than Free Schwag: GoSecure’s Open Source Contributions to Malware Analysis, Code Hardening and RDP Snooping
- 2:30 – Eric Rochette – CyberSecurity: Would you rather look good or be good?
- 4:30 – Sunny Jamwal – IR lessons taught by Russia
Thursday, February 27th
- 11:00 – Olivier Bilodeau – More than Free Schwag: GoSecure’s Open Source Contributions to Malware Analysis, Code Hardening and RDP Snooping
- 1:00 – Katie Horne – Threat Hunter Life: Tales from the ARC
More than Free Schwag: GoSecure’s Open Source Contributions to Malware Analysis, Code Hardening and RDP Snooping Abstract
GoSecure Research group’s vision is simple: if we can raise the costs to online adversaries, everyone wins. We accomplish that by having good products, excellent service and by providing tools and training. We do it for clients but being one is not strictly necessary: if the ecosystem is more resistant it will discourage attackers. Helping anyone indirectly benefits our clients.
So, avoiding this year’s shiny object syndrome* (what’s next after the Minecraft sword?), we decided to highlight our significant open source contributions to the community in a booth presentation. We will cover three key open source projects created or maintained by GoSecure to help achieve the aforementioned vision:
• Malboxes: Safer Malware Analysis in the Cloud
• Find-Security-Bugs: Resolving Problems at the Source
• PyRDP: Advanced Offensive and Defenses Use Cases for RDP
Join us to hear about what we are doing with these and how you can use these in your organization!
IR lessons taught by Russia
This presentation will discuss the Incident Response lessons learned by hacks attributed to APT groups from Russia. Russian APT groups have been attributed to major hacks such as DNC hack in 2016. However, Russian was the first country to use military and cyber warfare in conjunction during Crimea annexation. Russian actors have been known to leverage mostly living off the land capabilities to compromise a system. The wold of cybersecurity is known to rinse and repeat methodology, hence these techniques are now leveraged by other APT groups as well. This talk will focus these techniques used by Russian Actors and focus on key system attributes to analyze when responding to an Incident.