Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Threat Intelligence and Analysis
Collecting, analyzing, and leveraging threat data to predict and prevent attacks.
Strategies Against Geopolitical Cyber Threats outlines strategies to defend critical infrastructure from state-sponsored attacks.
Join Patrick Benoit, Brian Kelley, and Fred Kwong as they address the shift from perimeter-centric security to mitigating insider risks in secure remote work.
In this session, Ran Shahor, IDF Brigadier General (Ret.), discusses the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected, and stay ahead of the curve.
According to research by the Identity Theft Resource Center, as of September 2021, there were 1,291 breaches publicly reported in 2021, compared to 1,108 breaches in 2020. That's a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren't stopping the breaches from happening. Join Jeff McCardel, Sales Engineer at Exabeam, to discuss cutting edge threat detection!
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Join Ram Vaidyanathan, Product Marketing Manager - IT Security and SIEM Solutions, ManageEngine in a discussion about using AI and ML to defend Against Cybersecurity Attacks.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
Learn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
La Monte Yarborough of HHS, Laura Deaner of Northwestern Mutual and Preston Miller of Palo Alto Networks discuss emerging threats, zero-day attacks and leveraging AI/ML for threat detection.
Join Sumnesh Joshi in a discussion of cybersecurity strategy to fight today’s hybrid warfare.
Join Lt. Gen. Deependra Singh Hooda in a discussion about real-life innovative strategies and techniques that can be applied in a cyberwar by CISOs taking on a commandant’s role.
Quest Software's Sivaramakrishnan Krishnamurthy covers Active Directory monitoring, identity management, and authentication tools for risk mitigation.
OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.
Join Pavan Duggal, Gaurav Gupta, and Ashok Kumar in an exploration of cybercrime, "crime-as-a-service," the dark web, cryptocurrency, and what it means for cybersecurity.
Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.
Join Satyavathi Divadari, Shyam Krishnamurthy, Bastin Robin and Visagan Subburayalu in a discussion of growth and ambiguity in unprecedented times in the cybersecurity industry.
Rohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.
Join Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.
Neal Quinn of Radware examines AI-powered DDoS attacks in healthcare, offering practical defense strategies and real-world case studies of successful threat mitigation.
David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.
Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
John Lambert from Microsoft Security Research explores proactive threat detection strategies, advanced hunting techniques, and creative tactics for leveraging honeypot systems to enhance cybersecurity defenses.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Mikkel Planck will share the latest insights from the frontline and reveal how adversaries are targeting organizations.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Humayun Khan, Siham Eisele, Teemu Ylhäisi and Jari Rasinenwill discuss how modern threats exploit visibility gaps and methods for real-time threat detection through data analysis and correlation.
Sherelle Moore of Toyota Financial, Suryaparkash Nalluri of Fortune 500 Financial and Shawn Tuma of Spencer Fane dive into behavioral analytics for insider threat detection using machine learning and anomaly detection algorithms.
Gareth Dothie explores how criminal organizations systematically infiltrate financial institutions through insider targeting, examining governance failures and sophisticated intelligence gathering tactics.