Select Page

Thursday, Nov 12 @ 8:30 PM

DESCRIPTION

Join us for a free, all-day online conference produced by the editors of Dark Reading. This virtual event offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Why Should Attend

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Among the topics that will be covered:

1) An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
2) A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
3) Insight on how malware is typically deployed, and how it works after it’s infected your systems

AGENDA / DISCUSSION TOPICS

Join us for a full-day virtual event on tools, technologies, and processes for ensuring the cybersecurity of your enterprise’s most sensitive information

11:00am ET – KEYNOTE: Who Are the Bad Guys? An Overview of Attacker Profiles, Motivations, and Methods
        One of the first rules of defense is to know your adversary. Who are the online attackers most likely to target your enterprise, and what do they want? In this keynote address, a top security expert will provide an overview of some of the most current and prevalent threat actors and their most common exploits. You’ll also get advice on how you can use your knowledge about your adversaries to improve your data defense.
12:30PM ET – KEYNOTE: Profile of an Online Attack
     It’s happened. A sophisticated attacker has chosen your enterprise as its next target, and is now developing a plan to find every possible avenue into your systems and data. What does that plan look like? How will it be executed? In this keynote session, a top penetration tester will describe the many methods used to discover and exploit vulnerabilities in an enterprise’s computing environment. You’ll get a step-by-step look at how a sophisticated attacker would research, assess, and exploit your enterprise assets, and how you can use that information to stop them.
2:15PM ET – PANEL DISCUSSION: Collecting and Using Enterprise Threat Intelligence
     To prepare an effective cyber defense, you need an up-to-the-minute understanding of the attackers who would most likely target an organization like yours, and the specific threats your team is likely to face. This “threat intelligence” can be collected from many sources, but it takes a special set of processes and tools to analyze the information and assess the threat to your specific enterprise. In this panel discussion, top experts on threat intelligence offer insight on how to identify, analyze, and interpret threat intelligence data to help build an effective defense for your organization.
3:15PM ET – PANEL DISCUSSION: Detecting and Analyzing Enterprise Security Data
    Today’s sophisticated attackers have developed a wide range of staging an online attack, often using multi-pronged exploits that are designed to evade traditional enterprise defenses. To detect this type of attack, your organization needs processes and tools that can winnow through a wide range of security telemetry and ferret out potential indicators of compromise. How does this analysis work? How much of it can be automated? What role do artificial intelligence and machine learning play in security analysis? In this panel discussion, experts will discuss the issues and challenges facing today’s security analyst, and how your organization can improve its detection and analysis processes.
4:15PM ET – PANEL DISCUSSION: Building and Managing an Effective Incident Response Process
    Your security team has discovered a potential cyber compromise. Now you’ll need tools and processes for assessing the incident, determining its validity, and discovering the extent of the damage. You’ll also need tools and processes for stopping the attack and mitigating its effects. In this panel session, top experts offer their insights on building an effective incident response program, including the people who need to be involved, the technology you’ll need to assess and remediate, and the processes you’ll need to initiate a quick response.

PARTICIPANTS

KEVIN O’BRIEN   –  CEO, GREATHORN

TERENCE JACKSON   –  CHIEF INFORMATION SECURITY OFFICER, THYCOTIC

SOHAIL IQBAL   –  CHIEF INFORMATION SECURITY OFFICER, VERACODE

SARA PETERS    –      SENIOR EDITOR, DARK READING

TIM WILSON     –    EDITOR IN CHIEF, DARK READING

GREG IDDON    –   THREAT RESPONSE STRATEGIST, SOPHOS

KELLY SHERIDAN   –  STAFF EDITOR, DARK READING

KELLY JACKSON HIGGINS   –  EXECUTIVE EDITOR, DARK READING

ZIV MADOR   –   VP OF SECURITY RESEARCH, TRUSTWAVE

ILIA SOTNIKOV    –   VP OF PRODUCT MANAGEMENT, NETWRIX

Webinar/Workshop organized by: Dark Reading

iSeekh Disclaimer

We list events as per details provided by the organizer. We are NOT responsible or liable in case of any non-availability or deficiency of the service provided, including any paid event/services.