Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Threat Intelligence and Analysis
Collecting, analyzing, and leveraging threat data to predict and prevent attacks.
Join Patrick Benoit, Brian Kelley, and Fred Kwong as they address the shift from perimeter-centric security to mitigating insider risks in secure remote work.
In this session, Ran Shahor, IDF Brigadier General (Ret.), discusses the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected, and stay ahead of the curve.
According to research by the Identity Theft Resource Center, as of September 2021, there were 1,291 breaches publicly reported in 2021, compared to 1,108 breaches in 2020. That's a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren't stopping the breaches from happening. Join Jeff McCardel, Sales Engineer at Exabeam, to discuss cutting edge threat detection!
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Join Ram Vaidyanathan, Product Marketing Manager - IT Security and SIEM Solutions, ManageEngine in a discussion about using AI and ML to defend Against Cybersecurity Attacks.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
La Monte Yarborough of HHS, Laura Deaner of Northwestern Mutual and Preston Miller of Palo Alto Networks discuss emerging threats, zero-day attacks and leveraging AI/ML for threat detection.
Join Sumnesh Joshi in a discussion of cybersecurity strategy to fight today’s hybrid warfare.
Join Lt. Gen. Deependra Singh Hooda in a discussion about real-life innovative strategies and techniques that can be applied in a cyberwar by CISOs taking on a commandant’s role.
Quest Software's Sivaramakrishnan Krishnamurthy covers Active Directory monitoring, identity management, and authentication tools for risk mitigation.
OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.
Join Pavan Duggal, Gaurav Gupta, and Ashok Kumar in an exploration of cybercrime, "crime-as-a-service," the dark web, cryptocurrency, and what it means for cybersecurity.
Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.
Join Satyavathi Divadari, Shyam Krishnamurthy, Bastin Robin and Visagan Subburayalu in a discussion of growth and ambiguity in unprecedented times in the cybersecurity industry.
Rohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.
Join Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.
Neal Quinn of Radware examines AI-powered DDoS attacks in healthcare, offering practical defense strategies and real-world case studies of successful threat mitigation.
David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.
Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
John Lambert from Microsoft Security Research explores proactive threat detection strategies, advanced hunting techniques, and creative tactics for leveraging honeypot systems to enhance cybersecurity defenses.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Mikkel Planck will share the latest insights from the frontline and reveal how adversaries are targeting organizations.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Humayun Khan, Siham Eisele, Teemu Ylhäisi and Jari Rasinenwill discuss how modern threats exploit visibility gaps and methods for real-time threat detection through data analysis and correlation.
Sherelle Moore of Toyota Financial, Suryaparkash Nalluri of Fortune 500 Financial and Shawn Tuma of Spencer Fane dive into behavioral analytics for insider threat detection using machine learning and anomaly detection algorithms.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.
Chris Young explores strategies for defending against insider threats through data resilience measures and endpoint control, helping financial institutions protect sensitive information from internal risks.
Learn about cutting edge trends in AI-Powered SOCs today!
James Kettle of PortSwigger reveals sophisticated web race condition exploits, demonstrating how attackers can manipulate state machines and create backdoors through precise timing attacks.
Carlos Sanchez explores how global firewall deployments create automated threat detection networks, SOC automation addresses skills gaps and governance frameworks enable AI deployment in air-gapped OT environments.
Trevor Foskett of Virtru explores military-grade encryption and data-centric protection strategies for financial services compliance and security.
Steven Wallstedt, Vlad Brodsky and Bino Gopal discuss real-world applications and challenges of generative AI in financial services security.
Industry experts Gary Meshell and John Gutkowski explore how financial institutions can integrate AI and cyber mesh architecture to enhance threat detection and improve security resilience.
Claire Le Gal, SVP at Mastercard, explores payment security evolution, cyber risk mitigation and fraud prevention strategies in an evolving digital landscape.
David Pollino explores insider threat frameworks and rising incident trends. He discusses how to build risk-based programs, create awareness cultures that enable early detection, and customize defenses to your organization's unique threat landscape.
Learn from Gigi Mathew Thomas, Venkatesh Mahadevan, and Awais Ahmad about governance for generative AI, promoting responsible AI use, and enhancing security solutions to combat AI-enabled threats. Explore AI's potential and risks, including deepfakes and cyberattacks.
Holger Spohn of Candriam covers prioritizing tactical versus strategic intelligence to prevent SOC analyst fatigue, feeding IOCs into SIEM systems and using threat intelligence for brand protection, merger due diligence, and threat hunting.
Cameron Molfetto of Darktrace explores ransomware-as-a-service groups deploying nation-state AI tactics, examining anomaly detection through behavior baselines and autonomous containment during overnight attacks.
Swati Popuri explores the LINDDUN framework addressing seven privacy threat categories, detection risks from metadata tracking, and unawareness violations when cross-contextual advertising tracks behavior without transparent disclosure.
Jennie Davidowitz discusses why centralized detection fails against AI-powered personalized attacks, exploring granular controls protecting VIPs from gift card scams and AI agents creating instant detection rules for emerging threats.