PowerShell For The Blue Team
Erwin Dusojan is a Senior Threat Researcher and has been working in Trend Micro since 2010.
He is providing CyberSecurity-related training to Trend Micro employees, students,professionals, and law enforcement(Interpol).
He is an a Certified Advanced Threat Defense Trainer, GCFA (GIAC Certified Forensic Analyst) CEH( Certified Ethical Hacker), MCSE (Microsoft Certified System Engineer), RHCSA (Red Hat Certified System Administrator), LPI Certified(Linux Professional Inistitue) and VCP5(Vmware Certified Professional).
PowerShell For The Blue Team
Ready for Battle: Today's Cybercrime Threats and Gearing Up to Defend Against Them
Christina Lekati is a psychologist and a social engineer. With her background and degree in psychology, she learned the mechanisms of behavior, motivation, decision making, as well as manipulation and deceit. She became particularly interested in human dynamics and passionate about social engineering.
Contrary to typical career paths, her history and involvement in the cybersecurity field started quite early in her life. Being raised by a cyber security expert, she found herself magnetized by the security field at a very young age. Growing up, she was able to get involved in different projects that were often beyond her age, that gave her an edge in her own knowledge and experience.
Christina has participated among other things in penetration tests, in training to companies and organizations, and in needs and vulnerability assessments.
She is working with Cyber Risk GmbH as a social engineering expert and trainer. Christina is the main developer of the social engineering training programs provided by Cyber Risk GmbH. Those programs are intertwining the lessons learned from real life cases and previous experiences with the fields of cybersecurity, psychology and counterintelligence.
Information Security is up Against Weaponized Psychology
Cybersecurity nowadays is not only a technical challenge, it is also a behavioral challenge. As long as managers and employees can provide access to critical assets, systems and data, attackers will be targeting them through social engineering schemes in order to acquire this access. Those that have access to technology and organizational assets have also become responsible for the protection of those assets.
Recent threat landscape reports show consistently, that today hackers prefer attacking humans instead of systems. That’s because it is simpler. While technology keeps advancing and security systems become stronger and more complicated to compromise, human psychology has remained the same over centuries and is thus easier to exploit. This is where weaponized psychology starts becoming a tool employed to infiltrate organizations in the public and private sectors, to steal sensitive information, and to help attackers breach organizational security. The stimulus response effect in human vulnerabilities is consistent, and exploiting these vulnerabilities is consistently successful. In addition, it is often a low cost, low risk, and high reward approach.
This talk discusses the social domain involved in cybersecurity and the threat of social engineering. It will provide an understanding on the mechanisms and modus operandi of social engineering and explain the concept of weaponized psychology. It will also discuss the ways in which attackers elicit information that assist them in initiating or delivering an attack. The talk will include case studies and lessons learned on the use of weaponized psychology from the fields of business and human intelligence operations (HUMINT). Recommend ations and defense mechanisms will conclude this presentation.
Mr. Azmi is currently a Digital Crime Officer working under the ASEAN Cyber Capability Desk (ASEAN Desk) team on the INTERPOL Cybercrime Directorate. The ASEAN Desk seeks to further deepen the engagement in the ASEAN region by facilitat ing the design and developme nt of an ASEAN Coordination Framework to combat Cybercrime that caters to the unique challenges and needs of the region.
He is seconded from the Royal Brunei Police Force. Azmi has over 8 years of experience in the police. He has led and planned frontline police operations. One of his previous postings was in investigations, which also included cybercrime. His most recent posting was in the Royal Brunei Police force’s International Cooperati on Affairs Department.
Mr Azmi has a University Degree in Business Marketing from Bangor University, United Kingdom
Combating Cybercrime with Actionable Intelligence
In the current world, criminals use new technologies to commit cyberattacks against governments, businesses and individuals. These crimes know no borders, either physical or virtual, and can cause serious harm and pose very real threats to victims worldwide.
Traditional forms of crime have also evolved as criminal organizations turn increasingly to the Internet to facilitate their activities and maximize their profit in the shortest time. These ‘cyberenabled’ crimes are not necessarily new but they have taken on a new online dimension.
Cybercrime is progressing at an incredibly fast pace, with new trends constantly emerging. INTERPOL together with Police from around the World must therefore work together to keep pace with new technologies, to understand the possibilities they create for criminals and how they can be used as tools for fighting cybercrime.
Reducing Complexity Through Increased Visibility
The computing landscape promises a lot of challenges for the internetusing public. As an organization’s first line of defense, IT professionals need to have a deep understanding of these issues. What can they learn from the past? What can they do now to prepare for, withstand , and quickly recover from cybersecurity threats? What possible risks should they expect from emerging trends and technologies?
In the fight to keep the connected world safe and secure, today's cyber defenders need to gear up and be battleready, anytime, anywhere.
ABOUT THE CONFERENCE
DECODE is the premier cyber security conference in the Philippines hosted by Trend Micro. It aims to decode to local technology professionals the up-to-date information about the threat landscape, industry trends, and new technologies in order to empower them to secure the digital infrastructures of their organizations, as well as to inspire them to embark on a continuous learning journey.
GEAR UP! Defending the Connected World
The computing landscape promises a lot of challenges for the internet-using public. As an organization’s first line of defense, IT professionals need to have a deep understanding of these issues. What can they learn from the past? What can they do now to prepare for, withstand, and quickly recover from cybersecurity threats? What possible risks should they expect from emerging trends and technologies?
In the fight to keep the connected world safe and secure, today's cyber defenders need to gear up and be battle-ready, anytime, anywhere.
KEYNOTE SPEAKERS
Robert McArdle
FTR
Christina Lekati
External
Mohammad Zulhelmi Azmi
Interpol
Jay Yaneza
MDR
TRACK SESSIONS
MAN & MACHINE
IoT, IIoT, ML, AI
TAKE CONTROL
Incident Response/Cybercrime
PROTECT AND DEFEND
New and Emerging Threats /Vulnerabilities
HANDS-ON LAB
Ambrosio Berdijo
PowerShell For The Blue Team
Erwin Dusojan
PowerShell For The Blue Team
AGENDA
START | END | ACTIVITY | SPEAKER | DETAILS | ||
06:30 | 09:00 | REGISTRATION | ||||
09:00 | 09:10 | Opening Number | Juleaus the Violinist with the Whiplash Dancers | |||
9:10 | 9:40 |
Keynote 1 |
Robert McArdle Director, Cybercrime Research Trend Micro |
Ready for Battle: Today's Cybercrime Threats and Gearing Up to Defend Against Them |
||
9:40 | 10:10 |
Keynote 2 |
Christina Lekati Social Engineer and Psychologist Cyber Risk GmbH |
Information Security is up Against Weaponized Psychology |
||
10:10 | 10:30 | BREAK | ||||
10:30 | 11:00 |
Keynote 3 |
Mohammed Zulhelmi Azmi Digital Crime Office Interpol |
Combating Cybercrime with Actionable Intelligence |
||
11:00 | 11:30 |
Keynote 4 |
Jay Yaneza Global Operations Manager for Managed XDR Trend Micro |
Reducing Complexity Through Increased Visibility |
||
11:30 | 12:00 |
PANEL DISCUSSION |
||||
12:00 | 13:00 |
LUNCH BREAK |
||||
TRACK SESSIONS | ||||||
Man and Machine (IoT, IIoT, ML, AI) Room ISABELA A & B |
Protect and Defend (New and Emerging Threats/Vulnerabilities) Room ISABELA C |
Take Control (Incident Response/Cybercrime) Room MANILA A & B |
HANDS ON LAB - PowerShell For The Blue Team Room MAKATI A & B |
|||
13:00 | 13:40 |
Securing Your Journey to Industry 4.0 Ryan Flores |
Code execution on a Connected Car: A Practical Analysis of the Tesla Model 3 Jasiel Spelman |
Fraud Wars Marvin Cruz |
Session 1 PowerShell For The Blue Team Ambrosio Berdijo / Erwin Dusojan |
|
13:40 | 13:50 | Transfer Sessions / Break | ||||
13:50 | 14:30 |
SDR for Fun: Make Your Own TV Show Philippe Lin |
Security Group speak a common language: MITRE ATT&CK Pawan Kinger Suraj Sahu |
IoT in the Underground David Sancho |
||
14:30 | 14:40 | Transfer Sessions / Break |
Break |
|||
14:40 | 15:20 |
Digital Home Invasion: Exploiting Home Automation with Logic Manipulation Smart Attacks Stephen Hilt |
An Analyst Day at the Zero Day Initiative Hossein Lofti |
Attacks on Telco’s in the transition to 5G Era: the view from the cyber-underground Vladimir Kropotov |
||
15:20 | 15:30 | Transfer Sessions / Break | ||||
15:30 | 6:10 |
The role of Machine Learning in Cyber Security Jon Oliver |
What I learned investigating DevOps honeypots for 6 months Alfredo Oliveira |
Discovering Enterprise Networks Weaknesses through Managed Detection and Response Jana Cabuhat |
Session 2 PowerShell For The Blue Team Ambrosio Berdijo / Erwin Dusojan |
|
16:10 | 16:20 | Transfer Sessions / Break | ||||
16:20 | 17:00 |
IOT Hacking that won’t cost you a Penny Manuel Gatbunton |
Discovery, Disclosure and Closure: Adventures in Finding and Reporting a Critical 0-Day Vulnerability in Solarwinds NPM Ron Waisberg |
Threat detection with open source Intelligence/Malware Market Analysis and accelerate the incident response Aliakbar Zahravi |
||
17:00 | 17:30 | CLOSING |