BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//hack-lu-2024//speaker//TCLCCY
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-hack-lu-2024-DNBRHN@pretalx.com
DTSTART;TZID=CET:20241023T114500
DTEND;TZID=CET:20241023T121500
DESCRIPTION:Over the past 12 months\, Volexity has identified two security 
 incidents in customer environments caused by zero-day exploits: CVE-2023-4
 6805 & CVE-2024-21887 (Ivanti Connect Secure)\, and CVE-2024-3400 (Palo Al
 to Networks Global Protect). This talk will explore why security issues af
 fecting edge devices remain a persistent problem\, examine common detectio
 n approaches used by Volexity to identify such incidents\, and outline met
 hods organisations can employ to detect similar incidents within their own
  environments.
DTSTAMP:20260309T210238Z
LOCATION:Europe - Main Room
SUMMARY:It Has Been [0] Days Since the Last Edge-Device Security Incident -
  Rascagneres
URL:https://pretalx.com/hack-lu-2024/talk/DNBRHN/
END:VEVENT
END:VCALENDAR
