Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Kolin Whitley delves into evolving payment card fraud trends, the migration of risk, and the growing importance of mobile payments. Gain insights from Visa’s expert on navigating the changing landscape of payment security.
Fang Yu explores the evolving tactics of fraudsters in online finance. This session covers popular banking fraud types, attack techniques, a detailed cash-out fraud case study, and how advanced technology can mitigate these threats effectively.
Microsoft Sentinel is a scalable, cloud-native, security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution.
Linux for Beginners is a technical skills course designed to introduce new users to the Linux operating system.
In this series, Daniel and Justin take a look at some of the more advanced scripting practices. Here they will empower your scripts by taking advantage of things like Functions, Libraries, creating graphical elements, sed (Stream EDitor), gawk, and Regular Expression.
Arpan Jati reveals critical vulnerabilities in Xilinx's Zynq-7000 SoC platform, demonstrating RSA authentication bypass and encrypted bitstream recovery techniques that impact critical infrastructure security.
Security researcher Nemo examines UPI's security architecture, revealing critical vulnerabilities in mobile number verification and offering recommendations to strengthen India's digital payment ecosystem.
Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.
Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.
Chris Young explores strategies for defending against insider threats through data resilience measures and endpoint control, helping financial institutions protect sensitive information from internal risks.
Learn about cutting edge trends in AI-Powered SOCs today!
James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.
Carlos Sanchez explores how global firewall deployments create automated threat detection networks, SOC automation addresses skills gaps and governance frameworks enable AI deployment in air-gapped OT environments.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Humayun Khan, Siham Eisele, Teemu Ylhäisi and Jari Rasinenwill discuss how modern threats exploit visibility gaps and methods for real-time threat detection through data analysis and correlation.
Sherelle Moore of Toyota Financial, Suryaparkash Nalluri of Fortune 500 Financial and Shawn Tuma of Spencer Fane dive into behavioral analytics for insider threat detection using machine learning and anomaly detection algorithms.
Mikkel Planck will share the latest insights from the frontline and reveal how adversaries are targeting organizations.
Rohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.
Join Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.
Neal Quinn of Radware examines AI-powered DDoS attacks in healthcare, offering practical defense strategies and real-world case studies of successful threat mitigation.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Quest Software's Sivaramakrishnan Krishnamurthy covers Active Directory monitoring, identity management, and authentication tools for risk mitigation.
La Monte Yarborough of HHS, Laura Deaner of Northwestern Mutual and Preston Miller of Palo Alto Networks discuss emerging threats, zero-day attacks and leveraging AI/ML for threat detection.
OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.
Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.
Niels Renken of Magnet Forensics demonstrates remote evidence collection, MITRE ATT&CK framework integration, and workflow automation between EDR platforms and forensic tools to accelerate investigations across distributed endpoints.