- This event has passed.
Membership Meeting
November 16, 2016 @ 5:00 PM - 7:30 PM
November 16, 2016 General Meeting
Speaker: Don Woodard, Security Architect, Attivo Networks
Don Woodard is a versatile technical professional with over 20 years of experience working with market leading security companies and solid achievements in designing and implementing secure Internet-based solutions.
Don joined Attivo Networks as the Senior Sales Engineer responsible for US Federal business development. Don joined the company because he believes the traditional way of securing important assets and information is broken. The power of Deception is a unique solution to the new push to gain full visibility into all network activity. He focuses on the idea that CISO’s are in need of new approaches to fix the broken n architectures in place today.
He began his career in Information Technology in 1990, transitioning into Network Security as a Senior Security Engineer at Guidance Software, AccessData, NetWitness, and RSA. Don sold to and managed some of the largest agencies within the Federal Civilian Government throughout his career.
Don attended Elon University where he received his B.S. Management Information Systems.
Presentation: Cyber Attack Detection and Defense
Prevention, detection, and response are the core pillars for any company’s cybersecurity infrastructure. Always prevent what you can, but also have a solid plan for the real-time detection of an inside-the-network attacker and have the tools in place for post-compromise investigations and remediation. Deception is quickly becoming recognized as the most effective and efficient approach to detecting targeted, stolen credential, and ransomware attacks. Deception lures an attacker into revealing themselves and completes extensive attack analysis, which can be used to improve incident response by automatically blocking and quarantining an attacker. In this session you will learn how deception technologies accelerate time-to-detection, how attack analysis can be applied to expedite response actions, and how threat intelligence can be leveraged to strengthen prevention security systems.