WHY ATTEND?

Russian hackers. Organized cyber criminals. State-sponsored espionage from China.

Today’s enterprises are threatened by a broad range of online attackers using an even broader range of electronic exploits. And today’s security professionals are faced with two key questions: Who are these cyber attackers and which threats are the most likely to affect their own organization?

On June 21, Dark Reading presents a unique, all-day virtual event designed to answer these questions – and many more.

By attending the online keynote presentations and panels, presented by some of the industry’s top experts on cybercrime and online threats, you will get a deeper insight into the “bad guys” of cyberspace.

Who They Are

How They Work

What They Do

How to Stop Them

WHAT  YOU’LL LEARN

icon1Current attacker profiles, including their motivations and the ways they identify and target businesses

icon4How the most valuable enterprise data is extracted – even from well-defended enterprises

icon5Ways you can use the knowledge from today’s criminals to help defend your critical information

icon3How insider data leaks occur and what you can do to prevent them

icon2Threat intelligence data collection and analysis best practices to find threats most likely to hit your enterprise

icon6How threat intelligence + security data analysis + incident response plans = increased data security

AGENDA

11:00am Keynote

Russia, China, and Other State-Sponsored Cyber Attackers

An expert on the latest methods and exploits in online attack provides an overview of the most current ways that criminals target the business. You’ll get insight on how the most sophisticated attackers choose their targets, what they are looking for, and how they extract valuable data from well-defended enterprises and data centers.

12:15pm  Keynote

The Financially-Motivated Cybercriminal

Who are the attackers that launch ransomware and other malware targeted at your enterprise? What methods do cybercriminals use to compromise customer lists and intellectual property? In this fascinating session, you’ll get a glimpse inside the minds of today’s financially-motivated online criminals – how they choose their methods and targets, how they extract valuable data from enterprises, and how they make a profit. Most importantly, you’ll get some ideas on how you can use knowledge of today’s criminals to help defend your critical information.

1:30pm Panel

Detecting and Preventing Insider Data Leaks

While sophisticated hackers pose a great threat to today’s enterprise, most security professionals are even more worried about a potentially greater threat: the insider. In recent years, both private enterprises and government agencies have fallen victim to major breaches caused by insider leaks, both malicious and accidental, resulting in the exposure of critically-sensitive information. In this session, you’ll hear how data leaks occur, how they are motivated, and how long they last. You’ll also get recommendations on ways to protect your most sensitive data from leaking out.

2:45pm Panel

Collecting and Analyzing Threat Intelligence Data

Over the past few years, the IT security industry has seen the rise of a whole new class of data that can be used to defend your enterprise: threat intelligence. Derived from a wide range of sources, threat intelligence can be used to help you identify sophisticated attacks on your organization and recognize new threats before they hit your data. In this session, expert panelists discuss the best ways to collect and analyze threat intelligence data, and emerging best practices for prioritizing and winnowing through threat data to find the threats that are most likely to hit your specific enterprise.

3:45pm Panel

Prioritizing Threats and Developing an Effective Incident Response Plan

Once you know who your adversaries are and the methods they use, you can begin to develop a more sophisticated plan for stopping threats and responding to data compromise. This intelligent incident response plan not only provides a set of guidelines and practices for reacting to a breach, but anticipates the most likely threats and helps your organization to prepare a faster, more effective response. In this session, security experts discuss how to combine threat intelligence and security data analysis with effective incident response plans to maximize your organization’s data security.

SPEAKERS

  • Albert Murray
    Albert Murray Assistant Section Chief, FBI Cyber Division

    Albert Murray III current serves as an Assistant Section Chief in the FBI’s Cyber Division at FBI Headquarters in Washington, DC. Mr. Murray oversees all criminal cyber investigations for the FBI. Previously, Mr. Murray was a Supervisor on squad on the New York Office’s Cyber Branch, managing investigations related to financially-motivated cyber intrusions and emerging cyber threats. In 2010, Mr. Murray was awarded the FBI Director’s Award for Outstanding Cyber Investigation due to his work on a multi-year investigation into a criminal enterprise.

  • Joe Savini
    Joe Savini Senior Security Consultant, Rapid7

    Joe has over 12 years of information security experience. Joe has held several information security related positions including systems and network administration, penetration testing, threat intelligence and incident response. Joe is well versed in attacker tools and methods as well as malware analysis and digital forensics. Joe currently holds over nine certifications including CISSP, OSCP, OSWP and CEH. During his career, Joe has developed and grown a threat intelligence practice for a large managed security services provider, contributed to tools related to network and open source threat intelligence gathering and participated in attack simulations for various Fortune 500 companies.

  • Tim Wilson
    Tim Wilson Editor in Chief, Dark Reading

    Tim Wilson is Editor in Chief and co-founder of Dark Reading, UBM Tech’s online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute.

  • Nathan Palanov
    Nathan Palanov Solutions Manager, Rapid7

    As a solutions manager for Rapid7’s Vuln Mgmt offerings, Nate applies his understanding of customer challenges to create compelling go-to-market strategies for InsightVM & Nexpose.

  • Ken Mizota
    Ken Mizota Product Manager, Rapid7

    As a Product Manager at Rapid7, Ken leads vuln mgmt product development. Ken brings a unique blend of IT ops, digital forensics, incident response and vuln mgmt experience to solving real-world problems facing security teams today.

  • Andy Jordan
    Andy Jordan Senior Security Associate, Bishop Fox

    Andy (CISSP, CISM, ITIL v3, LeanIT, MCSA – S, MCP, Security+, Network+) focuses on resolving IT security and risk gaps in enterprise environments as well as creating and spearheading security programs. Andy has built and managed multiple security programs throughout the duration of his 10-year career. These included asset, patching, configuration, hardening, vulnerability, threat, risk management, and SIEM programs.

  • Jeremy Linden
    Jeremy Linden Senior Product Manager, Cisco Umbrella Investigate

    Jeremy is the product manager for Cisco Umbrella Investigate. He has previously held product management positions with Lookout and a number of other security, machine learning, and natural language processing companies.

  • Serge Droz
    Serge Droz VP at OS-CERT and Director for the board of FIRST, Open Systems

    Serge is the Vice President CERT (Computer Emergency Response Team) at Open Systems, one of the leading managed security service providers in Europe. He studied physics at ETH Zurich and the University of Alberta, Canada and holds a PhD in theoretical astrophysics. Before joining Open Systems, he worked in academia in Switzerland and USA, later as a Chief Security Officer of Paul Scherrer Institute, as well as in different security roles at SWITCH for more than 15 years. Serge is a member of the board of directors of FIRST (Forum for Incident Response and Security Teams), the premier organization of recognized global leaders in incident response.

  • Kyle Wilhoit
    Kyle Wilhoit Senior Security Researcher, DomainTools

    Kyle Wilhoit is an internationally recognized security researcher with more than a decade of experience leading research teams to deliver timely and organized threat intelligence to internal and external customers. In his current role as senior security researcher at DomainTools, Wilhoit is leading efforts to do primary research on DNS-related exploits, investigate current cyber threats, and explore attack origins and threat actors. Before joining DomainTools, Wilhoit was a threat researcher for Trend Micro, responsible for identifying, vetting, and exposing threat actors, performing research on the deep web and dark web, and leading forensic investigations into high priority security incidents.

  • Paul Kurtz
    Paul Kurtz CEO and Co-Founder, TruSTAR

    Paul Kurtz is the CEO and cofounder of TruSTAR Technology. Prior to TruSTAR, Paul was the CISO and chief strategy officer for CyberPoint International LLC where he built the US government and international business verticals. Prior to CyberPoint, Paul was the managing partner of Good Harbor Consulting. Paul was also the founder and executive director of the Cyber Security Industry Alliance and worked closely to bridge the gap between commercial companies and the US government to share information and raise cybersecurity awareness.

  • Dan Holden
    Dan Holden Intelligence Director, Retail Cyber Intelligence Sharing Center (R-CISC)

    Dan Holden is the intelligence director at the Retail Cyber Intelligence Sharing Center (R-CISC), where he focuses on new technology and service development as well as threat intelligence production and exchange. Previously he was the chief technology strategist and director of ASERT, Arbor’s Security Engineering and Response Team at Arbor Networks. Prior to Arbor, Holden was director of TippingPoint’s DVLabs and a founding member of IBM/ISS X-Force. Holden is a frequent speaker at major industry conferences and has been quoted and featured in many top publications, radio and television.

  • Mike Pittenger
    Mike Pittenger VP Security Strategy, Black Duck Software

    Mike has served as Vice President and General Manager of the product division of @stake. After @stake’s acquisition by Symantec, Pittenger led the spin-out of his team to form Veracode. He later served as Vice President of the product and training division of Cigital. At Black Duck, he is responsible for strategic leadership of our security solutions, including product direction and Black Duck’s security research group in Belfast, UK.

  • Jason Clark
    Jason Clark Researcher, Software Engineering Institute Carnegie Mellon University

    Dr. Jason W. Clark is a researcher at the Software Engineering Institute (SEI) / CERT / Carnegie Mellon University. His main area of interest is insider threat and cyber-security. Dr. Clark completed his doctorate in Information Technology with a focus on cyber-crime and anonymous searching of the Internet. He previously worked at the Institute for Defense Analyses (IDA) as a lead information security analyst and at the United States Census Bureau writing security documentation and policy.

  • Ryan LaSalle
    Ryan LaSalle Global Managing Director, Growth and Strategy, Accenture Security

    Ryan leads Accenture Security’s Growth & Strategy globally. He plays a strategic role in helping clients adapt and thrive in an evolving security threat landscape. He drives the offering and innovation strategy, people agenda, industrialization of solutions and global delivery strategy for Accenture Security. Currently, Ryan is focusing on solutions at the intersection of analytics, knowledge discovery and cyber security, with the goal of improving threat assessment methodologies and enhancing knowledge of successful responses.

  • Narayan Makaram
    Narayan Makaram Sr. Director of Product Marketing, Arctic Wolf Networks

    Narayan Makaram is a Sr. Director of Product Marketing at Arctic Wolf Networks, a Managed Detection and Response (MDR) company that provides SOC-as-a-service. Narayan has over 15 years of information security experience, with expertise in application security, malware detection, SIEM, vulnerability management and network security, in leading cyber security companies – Imperva, FireEye, ArcSight, Tenable, and Hewlett-Packard.

  • G. Mark Hardy
    G. Mark Hardy President of National Security Corporation

    G. Mark Hardy has been providing information security expertise to government, military, and commercial clients for over 25 years. A long-standing industry veteran, he is a perennial speaker at major industry trade shows. As president of National Security Corporation, he directs the efforts of the information security consulting firm he founded in 1988.

  • Lenny Liebmann
    Lenny Liebmann Contributing Editor, Dark Reading

    Lenny is an InformationWeek contributing editor and principal analyst at Morgan Armstrong. His unique insight into how organizations succeed and fail at using technology in the real world to achieve their objectives is informed by 40+ years of front-line engagement, dating back to writing his first line of code in 1973. His work has appeared in every leading IT and business publication, and he is a sought-after moderator and speaker for industry events.

  • Marilyn  Cohodas
    Marilyn Cohodas Community Editor, Dark Reading

    Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting enterprise Windows platforms and technologies.

  • Allan Liska
    Allan Liska Solutions Architect, Recorded Future

    Allan Liska is a solutions architect at Recorded Future. Allan has more than 15 years of experience in information security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of “The Practice of Network Security, Building an Intelligence-Led Security Program,” and “Securing NTP: A Quickstart Guide” and the co-author of “DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion

  • Travis Farral
    Travis Farral Director of Security Strategy, Anomali

    Travis Farral is the Director of Security Strategy for Anomali.  With over 20 years of security industry experience, he has developed a strong background in threat intelligence, incident response, and Industrial Control Systems security.   Previously Travis ran the Cybersecurity Intelligence & Strategic Services team at ExxonMobil and spent several years at companies such as Nokia and XTO Energy.

  • Kelly Sheridan
    Kelly Sheridan Associate Editor, Dark Reading

    Kelly is an associate editor for Dark Reading. She most recently reported on financial tech for Insurance & Technology, before which she was a staff writer for InformationWeek and InformationWeek Education. When she’s not catching up on the latest in tech, Kelly enjoys running and blogging for health and lifestyle websites. She earned her BA in English from Villanova University.

  • Sara Peters
    Sara Peters Contributing Editor, Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law — a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

  • Kelly Jackson Higgins
    Kelly Jackson Higgins Executive Editor, Dark Reading

    Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, CommunicationsWeek, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at The College of William & Mary.

  • Tim Wilson
    Tim Wilson Editor in Chief, Dark Reading

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech’s online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

TAKE A TOUR

Explore our virtual event environment. Get an insider look at these key spaces in this virtual event, prior to attending:

  • Lobby: Where you arrive once you register and login
  • Content zones: Where you can collect resources like white papers
  • Auditorium: Where you view webinars and panel sessions

VIEW SLIDESHOW

If you want to build an effective defense, you need to understand how your adversary operates – and where his weaknesses might be. Dark Reading’s Understanding Cyber Attackers and Cyber Threats will provide you with a deeper look into the mind, methods, and motivations of the cyber attacker. Register today!

REGISTER

SPONSORS

Diamond Sponsor

Home

Platinum Sponsors

Home
Home
Home
Home
Home
Home
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.