Special Interest Group

Cyber Security SIG: The New Era of Cyber-Threats: Self-Learning Defence and Autonomous Response

The Cyber Security SIG aims to raise the profile of cyber security applications, explore ideas around standards and best practice and to disseminate information relating to cyber security technology and industry trends.

Telstra Conference Centre, conference room 1, Level 1, 242 Exhibition Street, Melbourne, VIC, 3000
Tue 17 Oct 2017 05:30 PM AEDT
Duration: 2.0 hours
Register by Tue 17 Oct 2017 02:00 PM AEDT
In Person
CPD Hours: 2
Skills Level: Information security (SCTY) -> Level 6

About this event

With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.

This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.

Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers. 

In this session, learn about: 
  • The new age of silent, stealthy attacks that lie low in networks for weeks and months.
  • Why legacy approaches, like rules and signatures, are proving inadequate on their own.
  • How new ‘immune system’ technologies based on advanced mathematics and machine learning are being deployed today.
  • Real-world examples of subtle, unknown threats that routinely bypass traditional control.

Speakers

Speaker
Mark Beaumont

Agenda

Schedule
Activity
5:30 PM - 6:00 PM
Registration
6:00 PM - 7:00 PM
Presentation
7:00 PM - 7:30 PM
Networking & Refreshments
Proudly sponsored by

Event Location

Telstra Conference Centre, conference room 1, Level 1, 242 Exhibition Street, Melbourne, VIC, 3000
Read