The Fast Evolving Threat Environment11/06/2018
KPMG Tauranga Office | 247 Cameron Road - Level 2, Tauranga, Bay of Plenty
|12:00-12:15||Arrivals & Networking|
|12:15-12:30||Welcome and Cyber Security News Update, Jon Edney [CISSP, CEH]|
|12:30-13:30||The Fast Evolving Threat Environment, Peter Benson, Director Cyber Security Services, KPMG|
Reactive threat detection is no longer enough to manage security threats, particularly as attacks now don’t include traditional “file based malware”. Surveys such as Ponemon Institute still show that threats can be within your environment for up to 100 days before they are finally detected, often by someone telling you that you are compromised. In this session, KPMG will discuss the fast evolving threat environment, and why earlier detection and proactive threat hunting is so important. We will include a case study on how we detected an active compromise from Palestine within one of our customers in the first 24 hours of a Compromise Assessment exercise.
Peter Benson is a Director in KPMG’s Cyber Security Services practice with over 25 years’ cyber security experience. Since joining KPMG in June 2017, he has delivered a number of risk assessments and security architectures to a number of companies. In addition, Peter has grown KPMG’s cyber security incident response capability, and developed a range of new cyber security services to meet the requirements of a changing market. Prior to KPMG, he was the security architect for Trend Micro for New Zealand. Peter was also the founder of Security Assessment.com, New Zealand’s premier penetration testing and security assessment company. Peter sold this company to Dimension Data in 2007.
Peter has extensive New Zealand and international experience in cyber security, and has designed security architectures, consulted to boards, implemented new operational frameworks, and transformed security within digital and business transformation projects. He is considered one of the visionaries and leaders in the New Zealand information security industry, and is in high demand as a speaker in cyber security, from board level through to detailed technical audiences.