A day-long look at who your attackers are, how they behave, and what you can do about them.

No matter what industry you’re in, the spectrum of cyber attackers who are targeting you is growing. Financially-motivated cybercriminals, nation-state-sponsored intelligence gatherers, politically-motivated hackers, and even your competitors are among those who might be testing your systems today, looking for a way to get in.

In this special, day-long Dark Reading virtual event, top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. You’ll learn about emerging threat actor groups, new cyber exploits, and the various methods and motivations behind today’s online attacks. Even more importantly, you’ll learn about current attacker behavior, and how you can adjust your defenses to mitigate current attacks before they affect your systems and data.


Nation State Attackers






Corporate Competitors


victimsHow cyber criminals choose their victims – what they are looking for and how they use stolen data

politicalMethods and motivations of state-sponsored and politically-motivated cyber attackers

dark_webHow the Dark Web is used to store and sell stolen information – and how you can find out if your organization’s data is there

offensiveHow your organization can (and can’t) take offensive action against attackers

hackerHow “thinking like a hacker” can help you improve your enterprise data defenses

icon1How to avoid wasting money on the wrong attackers, and point your security dollars at the biggest threats to you


11:00am Keynote

Who Are Your Cyber Adversaries and Why Do They Want to Hack You?

Whether they are cyber criminals, nation-state-sponsored attackers, hacktivists, or business competitors, your online adversaries have very different skills – and very different motivations – for going after your organization’s data. In this fascinating session, a top cybercrime expert provides insight on the many different adversaries that seek to penetrate businesses online, and how their varying motivations may influence their targets and their methods. You’ll also get advice on how to alter your defenses to best block your most likely attackers.

12:30pm Keynote

How Cyber Criminals Attack

How do online attackers choose their targets? How do they choose the best methods to penetrate your defenses, and how do they move laterally to reach your most critical data? In this revealing session, you’ll get a glimpse of the methods most commonly used to break through enterprise defenses, and how these exploits evolve to extract the specific data that the attacker is looking for. Most importantly, you’ll get some ideas on how you can use this knowledge of cyber criminal behavior to improve your defenses and protect your critical data.

1:45pm Panel

How to Know When You’re Under Cyber Attack

Traditional security tools and monitoring systems can help you identify and block malware and many online attacks. But what about more sophisticated attacks that bypass these outer defenses? How do you know when you’ve been compromised by a sophisticated, well-disguised exploit? In this panel, top experts will discuss the various processes and tools you can use to identify zero-day attacks and complex exploits that may be hidden from traditional security defenses. You’ll also hear about best practices for searching out these sophisticated attacks and detecting them before they can damage your data.

2:45pm Panel

Collecting and Analyzing Intelligence About Potential Threats

Today’s security departments have a wide range of tools and sources for collecting and analyzing known cyber threats and new exploits that may target your enterprise. Derived from a wide range of sources, this “threat intelligence” can be used to help you identify sophisticated attacks on your organization and recognize new threats before they hit your data. In this panel session, expert panelists discuss the best ways to collect and analyze threat intelligence data – including information on the Dark Web. You’ll also learn best practices for prioritizing and winnowing through threat data to identify the attackers and exploits that are most likely to hit your specific enterprise.

3:45pm Panel

How to Respond to Online Attacks and Compromises

You’ve identified what you believe is a compromise of your organization’s systems or data. Now what? In this panel discussion, top security experts discuss the key elements of incident response, including how to tell the extent of a compromise, how to determine whether your systems are still vulnerable, and when to contact law enforcement. You’ll learn about some of the best practices for responding to a breach, what steps should be taken by first responders, and how to limit the impact of a successful attack. You’ll also get some advice on how to use data about the incident to help prevent similar attacks in the future.


  • Tim Wilson
    Tim Wilson Editor in Chief, Dark Reading


  • Sara Peters
    Sara Peters Senior Editor


  • Kelly Jackson Higgins
    Kelly Jackson Higgins Executive Editor


  • Kelly Sheridan
    Kelly Sheridan Staff Editor


  • Curtis Franklin
    Curtis Franklin Executive Editor, InformationWeek


  • Joe  Diamond
    Joe Diamond Director, Cybersecurity Solutions, Okta


  • Joseph Carson
    Joseph Carson Director, Cybersecurity Solutions, Thycotic


  • Chris Goettl
    Chris Goettl Director, Product Management, Ivanti

    Commentary Desk

  • Karim Hijazi
    Karim Hijazi Founder & CEO, Prevailion, Inc.


  • Jeff Wichman
    Jeff Wichman Enterprise Incident Management Practice Director, Optiv


  • Ed Amoroso
    Ed Amoroso Chief Executive Officer, TAG Cyber LLC


  • Christopher J. Novak
    Christopher J. Novak Co-founder and Global Director, Verizon Threat Research Advisory Center


  • Alex Valdivia
    Alex Valdivia Senior Threat Intelligence Research Engineer, ThreatConnect


  • Allan Liska
    Allan Liska Solutions Architect, Recorded Future


  • Gal Shpantzer
    Gal Shpantzer Independent Security Professional


  • Dan Basile
    Dan Basile Executive Director, Security Operations Center at Texas A&M


  • Matthew Balcer
    Matthew Balcer Senior Solution Engineer, Kaspersky Lab

    Commentary Desk

  • Paul Kurtz
    Paul Kurtz Co-Founder & CEO, TruSTAR


  • Rob Ragan
    Rob Ragan Associate, Bishop Fox


  • Anthony Chadd
    Anthony Chadd EMEA Senior Director, Neustar


  • Greg Temm
    Greg Temm Chief Information Risk Officer, Financial Services Information Sharing & Analysis Center



Explore our virtual event environment. Get an insider look at these key spaces in this virtual event, prior to attending:

Lobby: Where you arrive once you register and login
Content zones: Where you can collect resources like white papers
Auditorium: Where you view webinars and panel sessions


If you want to learn how you can adjust your defenses to mitigate current attacks before they affect your systems and data, register today!



Diamond Sponsor


Platinum Sponsors

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt