BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsidesatl-2023//speaker//PGLW3G
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsidesatl-2023-VMVZAK@pretalx.com
DTSTART;TZID=EST:20231014T113000
DTEND;TZID=EST:20231014T115000
DESCRIPTION:Ransomware is no longer the leading method cyber criminals use 
 to infiltrate an organization. Cyber crime organizations have shifted to s
 ophisticated phishing campaign and backdoor deployment to gain control of 
 your IT infrastructure and access to your most important data. By adopting
  the long standing cybersecurity practice of defense in depth\, storage sy
 stems can be the last line of defense that gives organizations a chance to
  recover their operations. In this proposal\, we'll be looking at the best
  practices to ensure you have the harden process and systems to be cyber r
 esilient. We'll explore the basic security such as multi-factor authentica
 tion\, two person integrity\, role and object-based authentication to the 
 more advance immutable storage\, quantum safe encryption of data at rest a
 nd the emerging ransom activity detection in file and block storage.
DTSTAMP:20260410T114427Z
LOCATION:Room 300
SUMMARY:Building Your Cyber Defense in Storage Systems - Nat Prakongpan
URL:https://pretalx.com/bsidesatl-2023/talk/VMVZAK/
END:VEVENT
END:VCALENDAR
