This post was originally published on this site

ltechnologygroup.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.

The first day of MIRcon 2014 is officially done and was
packed with thought-provoking keynotes, presentations and a
one-of-a-kind reception. While there’s too much to fit into this
blog post, I wanted to provide you with some of the highlights:

  • FireEye’s COO, Kevin Mandia kicked-off MIRcon and
    was accompanied by FireEye CEO, Dave DeWalt and FireEye
    CTO, Dave Merkel.
  • Matt Graeber’s Analysis of
    Malicious Security Support Provider DLLs
    gave attendees a
    technical overview of SSPs, installation procedures, and detection
    guidance.
  • Brian Finch covered cyber security from a legal
    perspective in his talk on The Past As Prologue – Potential
    Theories Of Liability Following A Cyber Attack
    .
  • A
    roundtable made up of the industry’s leading journalists from the
    Wall Street Journal, POLITICO and Bloomberg
    covered the biggest stories of the last 12 months and some of
    their favorite interviews.
  • Shannon Lietz and Shrikant
    Raman discussed how Intuit and Mandiant secured a major migration
    of customer applications to the cloud in their talk To Cloud Or
    Not To Cloud: Enterprise Cloud Security via Devsecops.
  • Mandiant consultant Matt Hastings went over how attackers can
    enable and abuse PowerShell in his session Investigating
    PowerShell Attacks.
  • The closing keynote from
    Gen. Keith B. Alexander, USA (Ret.) provided a look into
    the past, present and future of cyber security and how to get the
    C-level involved as awareness continues to grow.

Sharing expertise Sharing expertise

Stay tuned to
this space as we’ll have more conference highlights tomorrow! You
can also view live highlights from the conference by following the
#MIRcon hashtag
on Twitter.

At L Technology Group, we know technology alone will not protect us from the risks associated with in cyberspace. Hackers, Nation States like Russia and China along with “Bob” in HR opening that email, are all real threats to your organization. Defending against these threats requires a new strategy that incorporates not only technology, but also intelligent personnel who, eats and breaths cybersecurity. Together with proven processes and techniques combines for an advanced next-generation security solution. Since 2008 L Technology Group has develop people, processes and technology to combat the ever changing threat landscape that businesses face day to day.

Call Toll Free (855) 999-6425 for a FREE Consultation from L Technology Group, https://www.ltechnologygroup.com.