Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
A Threat Intelligence Analyst is responsible for identifying, analyzing, and interpreting cyber threats that could impact an organization’s systems and operations. They collect and evaluate data from various sources to uncover threat actors, tactics, techniques, and procedures (TTPs). These professionals transform raw intelligence into actionable insights, helping security teams anticipate, prevent, and respond to cyberattacks effectively.
Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.
Join Patrick Benoit, Brian Kelley, and Fred Kwong as they address the shift from perimeter-centric security to mitigating insider risks in secure remote work.
Avinash Narasimhan explores strategies to secure file transfers, a critical yet vulnerable aspect of business operations. Learn to combat threats with layered protection, deep CDR technology in a zero trust framework, and next-gen sandboxing tools to safeguard files in transit and at rest.
Jonathan Andresen, Senior Director, Marketing and Products, Asia Pacific and Japan, Bitglass examines the shift to Secure Access Service Edge (SASE) architecture in response to evolving cyber threats like the SolarWinds breach. Learn about modern breach trends, SASE's key pillars, and the cost-benefit analysis of SASE protection versus data breaches.
Grant Schneider talks about new cybersecurity strategy outlines five pillars that urge more mandates on the private sector, which controls most of the nation's digital infrastructure, and an increased government role to disrupt and dismantle threat actors. The strategy has been widely praised and has garnered conversations; however, it raises several questions - who is going to pay for it and who is going to execute it?
Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
John Lambert from Microsoft Security Research explores proactive threat detection strategies, advanced hunting techniques, and creative tactics for leveraging honeypot systems to enhance cybersecurity defenses.
Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
WSP's Christopher Johnson examines the evolution of OT-focused security operations centers, highlighting critical differences from traditional IT SOCs.
Learn about cutting edge trends in AI-Powered SOCs today!
Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
Luke Babarinde of Imperva shares strategies for securing critical data assets and maintaining regulatory compliance across diverse environments.
Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.
David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.
Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.
Learn from Gigi Mathew Thomas, Venkatesh Mahadevan, and Awais Ahmad about governance for generative AI, promoting responsible AI use, and enhancing security solutions to combat AI-enabled threats. Explore AI's potential and risks, including deepfakes and cyberattacks.