Enable Visibility across Disparate Air-Gapped Networks
Event Details
Date: 15 Nov 2023
Time: 2.00pm-5.00pm
Event Description
Join us for an exclusive event where we will explore the critical role of threat hunting in mitigating both insider and external threats. In the ever-evolving cybersecurity landscape, the need to protect your Critical Information Infrastructure (CII) assets from malicious attacks and data loss has never been more crucial.
During the event, you will discover:
- How integrating Data Diode together with a robust Security Information and Event Management (SIEM) system can fortify your CII against potential vulnerabilities
- How you can consolidate security events from multiple disconnected air-gapped networks into a centralized platform
- A better approach for proactive and comprehensive security strategy, enabling efficient threat detection and response
Agenda
2.30pm – 2.40pm – Knit Technologies Welcome Speech
2.40pm – 3.00pm – Defending Cyber Security for CII by ST Engineering
3.00pm – 3.40pm – NextGen SIEM Platform for Threat Hunting by LogRhythm
3.40pm – 4.00pm – Q&A
4.00pm – 5.00pm – Tea Break & Networking Session
Fill in the form to register
Brief Topic Outline
Defending Cyber Security for CII
Speaker: Qi Feng Ho, Snr Engineer, Cybersecurity Products, ST Engineering
As the dependency on digital infrastructure grows, so does the vulnerability of Critical Information Infrastructure (CII) to malicious attacks and data breaches, emphasizing the urgency of robust protective measures. This presentation delves into the significance of safeguarding CII from cyber threats and data loss, highlighting the implementation of effective strategies such as air-gapping and network segregation. The discussion further introduces Data Diode, which, when integrated with Security Information and Event Management (SIEM), fortifies CII cybersecurity by ensuring secure data transmission and comprehensive threat detection.
NextGen SIEM Platform for Threat Hunting
Speaker: Yuchang Chang, Enterprise Solutions Engineer, LogRhythm
Security analysts are playing an never-ending cat-and-mouse game when it comes to insider threats and external threats. Except, unlike playing a game, failing to mitigate the threat in time will cause serious loss to the company. And there’s no reset button. To mitigate the risk, it is important to use Threat Hunting capabilities. Threat hunting refers to the process of proactively searching for advanced threats that may have eluded security systems. In other words, going after the ones that slipped through the net.