Session 1 Micro Segmentation, Contextual Analysis and Automation Most security products focus on “chasing threats”, either using some form of signature or behavioral models to find malicious indicators. Given the recent level of security incidents it’s clear that model has many flaws. We believe a far more effective model is to start with a well understood intended state for data center applications, and then enforce or monitor that runtime behavior does not deviate from the intended state. Much like micro-segmentation enables “least privilege” environments at a network level, AppDefense enables “least privilege” compute environments (what runs, how those components interact, etc.) Session 2 What I Have Learned from Watching Fools with Tools, A Journey Into AppSec Failures The key to a successful app sec program is learning from others and your own mistakes. This subject matter experts discusses the people, process & technologies to building that program. We'll start off with threat modeling, learn effective technologies (SAST,DAST,IAST,RASP) that help you make the go/no go decisions. Session 3 The Era of Ransomware, Cyber Extortion and Nation State Attack w/Demos Cyber extortion has reached new proportions, including ransomware attacks such as WannaCry of May 2017, and SamSam affecting major hospitals in 2016. Considering the payoff, cybersecurity experts expect these attacks to only increase. While stories made public provide limited knowledge of initial attack vector or details, this session presents real cases of cyber extortion on financial firms and high net worth individuals, including hacking techniques for full network compromise and deployment of ransomware kits. The second part of the presentation will focus on Nation state attacks from Asia with malware called PlugX, and operation Cloud Hopper that exfiltrated data from major MSP providers around the globe. Many of the cases discussed are currently under investigation by the FBI and Secret Service. Attendees will walk away from this session with knowledge of the tools and strategies needed for elevating their cyber resilience.