Want to Learn More About How the Dark Web Uses Your Data? You’ll Find This Sept. 19 Conference Most Enlightening!
This post, written by Esther Surden, contains sponsored content.
C-Suite executives are invited to the Yogi Berra Museum on Sept. 19th for “Diving Into the Dark Web, Where Your Data Goes After the Hack,” a cyber security conference organized by ATSG (New York and Parsippany) and Secure Network (Syracuse, NY).
ATSG is a technology-enabled managed services provider who has been in business for more than two decades. The company focuses on digital workplace, digital infrastructure and security.
ATSG and Secure Network are putting on the event to raise awareness of a more enlightened approach to cybersecurity. “We believe that the landscape has changed and the threat level around cybersecurity has never been greater,” Anthony D’Ambrosi ATSG CEO said. “How you detect, defend against and remediate during security events is one of the hottest topics in the market right now.”
“As we work with enterprises of all sizes and scale to help them with digital transformation, this is one area that produces the most sleepless nights. You can imagine the plethora of security events we encounter as we connect inside our client’s facilities to help them plan, deploy and run their IT operations.” D’Ambrosi noted that his company looks at every way to secure an environment, from a software tools, people and personnel perspective.
“We have partnered with Secure Network to do something very unique around security consulting,” D’Ambrosi noted. Secure Network is an information security assessment services company that focuses on ethical hacking, forensic analysis, vulnerability assessments, penetration testing, as well as employee “social engineering,” figuring out which employees might click on the wrong attachment.
“We are essentially professional hackers hired to break into organizations every day,” Steve Stasiukonis, President of Secure Network said.
At the conference, Stasiukonis plans to demonstrate how and where data that is stolen and breached winds up on the dark market. He will uncover the particular dark websites where that data is being brokered. Then he will buy the data by dealing with a black-market vendor using bitcoin. “We will buy that content and open it up in protected space and show the audience the information that’s there.”
Stasiukonis added that “crimeware” is big business now. Hackers with very little technical background can acquire kits on the dark web. “We’ll show you where to go on the dark web to buy a new crimeware kit. If you are a hacker who wants to get into ransomware, we’ll go to a dark market, sort out the kits that are right for you and buy a kit. We’ll even show how to download it in another site. From that point forward we’ll have a kit that will allow us to build malware and launch zero-day attacks.”
Secure Network spares no effort in finding the intelligence that will allow it to break into a network or system. Most of the effort comes not from using tools and hacking an exploitable device, Stasiukonis said. It’s the intelligence gathering. It’s going into the dark web or going on the internet and finding all the information about your target and leveraging that to the point where you can take that business down. This is what people don’t understand. They think the bulk of this is to exploit an operating system or to break into a computer. Hackers are methodical, they plan everything out. The hackers who really know how to take down a company or break into an organization, sit, watch and learn to figure out a game plan.”
Once Secure Network unveils a company’s vulnerabilities, ATSG comes in and remediates the environment. ATSG goes through the report with Secure Network and if devices must be patched, if websites need to be fixed because they are susceptible to hacking, ATSG can send their remediation experts in. If there is a piece of technology that needs to be put in to lessen the threat level, the ATSG folks will have something they can recommend that would meet that requirement. It’s strategic.”
D’Ambrosi concludes, “Security needs to be baked into the continuous fabric of the enterprise. We believe in the notion of ongoing security operations and ongoing security services. It’s no longer a one-time event. We offer a remediation service that’s highly automated and highly reliable, so it can solve today’s problems while also monitoring for tomorrow’s problems.”
Come to “Diving Into the Dark Web, Where Your Data Goes After the Hack,” at the Yogi Bera Museum, 8 Yogi Bera Drive, in Little Falls, Sept. 19, 6PM to 9PM. Register here.