Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Threat Intelligence and Analysis
Collecting, analyzing, and leveraging threat data to predict and prevent attacks.
Geoff Brown, former CISO of the City of New York, shares insights on machine-to-machine intelligence and lessons from Ukraine and Belgium's cybersecurity strategies.
Richard Cassidy of Rubrik explores how organizations can leverage AI and existing technology to predict and mitigate operational risks while maintaining critical business continuity.
Mihirr P Thaker, Yogesh Kulkarni, and Aditya Sarangapani explore threat intelligence for OT security. Learn strategies for asset visibility, cybersecurity resilience, and mitigating risks in legacy systems.
Richard Meeus of Akamai shares how comprehensive visibility across IT infrastructure, data streams and applications strengthens organizational defenses and ensures robust operational resilience.
Join Sumeet Prasad in an exploration of how organizations with a huge staff and a myriad of cybersecurity tools to secure their environment, yet, were still breached!
In this session, Ran Shahor, IDF Brigadier General (Ret.), discusses the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected, and stay ahead of the curve.
Neal Quinn of Radware examines AI-powered DDoS attacks in healthcare, offering practical defense strategies and real-world case studies of successful threat mitigation.
Join Ram Vaidyanathan, Product Marketing Manager - IT Security and SIEM Solutions, ManageEngine in a discussion about using AI and ML to defend Against Cybersecurity Attacks.
Join Satyavathi Divadari, Shyam Krishnamurthy, Bastin Robin and Visagan Subburayalu in a discussion of growth and ambiguity in unprecedented times in the cybersecurity industry.
OPSWAT's Manish Gautam explains implementing multiscanning techniques for enhanced threat detection and endpoint security in perimeterless environments.
Join Mrutyunjay Mahapatra as he explores Global Security Challenges and Opportunities.
Kaspersky's Georgy Kucherin explores APT41's evolution in 2024, examining their shift from supply chain attacks to targeted operations, new persistence mechanisms and enhanced detection evasion techniques.
Join Lt. Gen. Deependra Singh Hooda in a discussion about real-life innovative strategies and techniques that can be applied in a cyberwar by CISOs taking on a commandant’s role.
Join Patrick Benoit, Brian Kelley, and Fred Kwong as they address the shift from perimeter-centric security to mitigating insider risks in secure remote work.
The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.
SafeGuard Cyber CEO Chris Lehman discusses AI-powered defense strategies against language-based attacks across communication channels.
Siddharth Iyer from Radware examines current DDoS attack trends and proactive protection strategies for financial institutions.
John Lambert from Microsoft Security Research explores proactive threat detection strategies, advanced hunting techniques, and creative tactics for leveraging honeypot systems to enhance cybersecurity defenses.
Fred Harris, Matanda Doss and Patrice Boffa examine emerging attack patterns targeting financial services' revenue-generating digital assets.
La Monte Yarborough of HHS, Laura Deaner of Northwestern Mutual and Preston Miller of Palo Alto Networks discuss emerging threats, zero-day attacks and leveraging AI/ML for threat detection.
David Cifuentes of Devo Technology demonstrates how AI can eliminate 95% of security alerts and enable real-time threat detection in financial SOCs.
Quest Software's Sivaramakrishnan Krishnamurthy covers Active Directory monitoring, identity management, and authentication tools for risk mitigation.
Lance Moraitis-Jones from Recorded Future delves into automated threat profiling implementation, exploring dynamic prioritization methods and practical strategies for enhancing organizational security.
Join Michael DeNicola in a conversation about social engineering tactics and what organizations can do to thwart them.
Join Shobha Jagatpal in a discussion of the cloud, security, network operations, threat detection and response.
Strategies Against Geopolitical Cyber Threats outlines strategies to defend critical infrastructure from state-sponsored attacks.
Learn about taming ICS and OT cyber threats to implement more secure cybersecurity risk management strategies today!
Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.
Dom Lucas of British International Investment and Brian Brackenborough of Channel 4 discuss advanced strategies for supply chain security, drawing key lessons from recent high-profile breaches including the 2024 UK MOD incident.
Trend Micro's senior threat researcher Nitesh Surana reveals critical vulnerabilities in Azure Machine Learning services, demonstrating how attackers can compromise ML workspaces.
Join Pavan Duggal, Gaurav Gupta, and Ashok Kumar in an exploration of cybercrime, "crime-as-a-service," the dark web, cryptocurrency, and what it means for cybersecurity.
Join Sumnesh Joshi in a discussion of cybersecurity strategy to fight today’s hybrid warfare.
According to research by the Identity Theft Resource Center, as of September 2021, there were 1,291 breaches publicly reported in 2021, compared to 1,108 breaches in 2020. That's a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren't stopping the breaches from happening. Join Jeff McCardel, Sales Engineer at Exabeam, to discuss cutting edge threat detection!
Rohit Shrivastava of Barclays shares expertise on conducting threat hunting in Windows environments and building proactive defense strategies.