SolarWinds Threat Landscape Overview
Notice: Luke Emrich, the presenter at the meeting, decided to not provide permission for us to post the recording and his presentation. If you have any questions for him, he can be reached via e-mail. His e-mail will be on the bottom of his photo.
However, Luke did provide the following 3 links for additional related info:
https://warroom.rsmus.com/fireeye-intrusion-red-team-tools-stolen/
https://warroom.rsmus.com/solarwinds-orion-supply-chain-attack/
On December 13th 2020, SolarWinds reported a supply chain attack that resulted in a backdoor being left in approximately 18,000 of their customers networks. We will be discussing this event, providing insight into what is known at this point and hopefully ask some thought provoking questions that the audience can take back to their organization or clients. We have learned quite a lot while assisting multiple clients respond to this news, we will be providing provide insight and sharing the various approaches we have seen organizations take. Lastly we will share some cyber security history and predictions what the future of cyber security will look like.
After this session, participants will learn:
- How organizations may be directly or indirectly impacted by the attack
- How organizations are responding and reacting to this event
- Insights gained by RSM’s support of clients
About Our Speaker
Luke B. Emrich
Director, Risk Advisory Services, RSM US LLP
Luke is a member of RSM’s digital forensics and incident response (DFIR) practice. His team supports global operations for cybercrime and data breach investigations and DFIR services within the security, privacy and risk consulting group. Luke has over five years of experience conducting information security, privacy and risk assessments, digital forensic investigations and network vulnerability testing. He services a diverse client base across a variety of industries. Luke understands how emerging risks and vulnerabilities impact the operation and growth of organizations, as well as the challenges associated with digital evidence collection and analysis.
Luke’s primary focus is on data breach investigations, cybersecurity and incident response, digital forensic analysis, malware analysis, collection of electronically stored information (ESI) and intellectual property theft matters. In his role, Luke manages and leads investigations in digital-related investigations on all types of media, ensures compliance with accepted computer forensic protocols and reports on numerous cases related to computer crime and digital forensics.
Agenda
5:00 PM – 6:30 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
Webinar Rates
ISACA, IIA, ISSA,
ACFE, OWASP |
Non-Members | Full-Time Students & Faculty |
|
Rate |
$0 | $10 | $0 |
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
*Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.