And Now, a Word from Our Experts
Throughout the Black Hat conference, Cylance executives will host training courses and speak about the most relevant topics impacting cybersecurity today, sharing insights about the role that artificial intelligence plays in securing personal information and data.
Senior Director Product Marketing
Technical Marketing Manager
The Predictive Advantage: Prevent Zero-Day Attacks Before They Start
Endpoints are coming under constant attack, whether from a ransomware campaign, stealthy targeted initiative, or fileless attack. While traditional AV solutions incorporate a detection model to protect against known malware, Cylance leverages artificial intelligence to prevent attacks from both known and unknown strains — and even fileless attacks.
The AI based approach provides Cylance users with a predictive advantage that gives them an upper hand against zero-day threats. Come discover more about the Cylance predictive advantage, and see firsthand how artificial intelligence can stop zero-day attacks and help users achieve truly preventive endpoint security.
August 8, 10:20 AM - 11:10 AM
Business Hall, Theater A, Shoreline Ballroom, Booth 1502
Senior Director of Consulting Services
CyBot: Open-Source Threat Intelligence Chat Bot (Full Circle)
Threat intelligence chat bots play a useful role in performing interactions and tasks for both personal and business applications. While most organizations design bots privately for internal use only, Tony Lee will share Cylance’s efforts at creating a free and open source framework for bot design with you. At the end of the session, he will help you build your own threat intelligence chat bot — in less than an hour.
August 8, 11:30 AM - 12:50 PM
Business Hall (Oceanside), Arsenal Station 9
A Guide To Threat Hunting: Utilizing the ELK Stack and Machine Learning
As malicious activity grows increasingly complex, the need for an effective, enterprise-wide hunting platform is paramount. This two-day course will teach you how to create a powerful hunting platform using ELK with data enrichment feeds that protects your system against today’s threat environment. Participants will conduct three to four labs each day, learning how to build out the ELK stack and its respective modules while gaining an understanding of the role that they play in finding malicious activity.
It is an ideal, hands-on experience for anyone tasked with implementing threat hunting and enhancing the incident response processes at their organizations, including IT administrators, CERT analysts, and forensic analysts.
Tom Pace, Sr. Director, Worldwide Consulting
Derek McCarthy, Consulting Technical Director
August 4 - 5, August 6 - 7