Why Attend

Every enterprise today knows that cyber attacks pose a significant threat to their business. But do you know exactly how much risk you face? Do you know where your greatest vulnerabilities are? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?

Attend and you’ll learn

How your security organization can keep up with these rapid shifts in process and technology

If AI and machine learning really help your team to detect and mitigate the new wave of sophisticated attacks

More about evolving methods for automating cybersecurity processes, enabling the security team to do more work with fewer staff

Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface

These are just some of the questions that will be explored and answered at Dark Reading’s next virtual event, Cyber Threats, Cyber Vulnerabilities: Assessing Your Attack Surface. This new virtual event — a free, all-day online conference produced by the editors of Dark Reading — offers insight, advice, and best practices on how to assess your organization’s “attack surface” – the parts that are most vulnerable to cybercriminals – and the risk you face in todays’ cyber threat environment. You’ll get a look at the various methods for finding and fixing cyber vulnerabilities in your organization, as well as an overview of some of the latest exploits and methods used by today’s cybercriminals. Top security experts and researchers will discuss the various ways that current threat actors might use to penetrate your defenses, and how you can identify IT conditions that might make your data vulnerable to those attacks. Best of all, you’ll get advice and recommendations on how to assess your organization’s overall cyber risk, and what you can do to reduce it.

Topics that will be covered:

  • An overview of the most common security vulnerabilities in enterprise systems, and how attackers exploit them
  • Key methods for finding and fixing cyber vulnerabilities, including vulnerability scanning, penetration testing, and red teaming
  • Details on the latest attack trends and the threat actors who launch them
  • Methods for collecting threat intelligence and using it to customize your cyber defense
  • Best practices for assessing your organization’s “attack surface” and the likelihood of a crippling exploit
  • Tools and practices for measuring cyber risk and reporting it to upper management
  • Steps your organization can take today to reduce cyber risk tomorrow

Key steps to mitigate a compromise and limit its impact.

Building blocks of an effective incident response plan.

How to staff and train your cybersecurity analysts and first responders.


Join us for a full-day virtual event on the latest tools and practices for detecting cyber attacks – and limit their impact.

Agenda at at glance

KEYNOTE 1: How Data Breaches Happen

The first step in assessing your organization’s security posture is to understand how attackers most frequently penetrate enterprise defenses. In this fascinating keynote address, a top data breach investigator outlines the latest trends in online compromises and the security vulnerabilities that are most commonly exploited in enterprise attacks. Attendees will also get advice on how to recognize these attacks, and how to shorten the time between the initiation of an attack and detection/discovery.

KEYNOTE 2: Assessing Your Attack Surface: Gauging Your Vulnerability to Common Attack Methods

To understand your organization’s cyber vulnerabilities, you need to understand how attackers might target you – from common phishing and social engineering tactics to advanced hacks of systems and applications. In this keynote address, an expert on cyber attacks will discuss the process of finding flaws in cyber defenses by using the same methods that a cyber criminal would use. You’ll learn how to assess your attack surface, from assessing your potential vulnerability to social engineering attacks to identifying the flaws in your networks, systems, and applications. You’ll also get advice and recommendations on how to shore up your defenses against the most common exploits.

PANEL DISCUSSION: Assessing, Measuring, and Mitigating Cyber Risk in Your Enterprise

Whether you’re evaluating your own cyber defenses or threats that might come from cloud services or suppliers, you need a methodology for assessing and measuring cyber risk. In this panel discussion, top security experts discuss the tools and processes enterprises can use to assess their cybersecurity posture and report it to upper management. You’ll get insight on metrics you can use to measure your exposure to online threats, as well as methods for assessing threats posed by cloud services or external suppliers.

PANEL DISCUSSION: Using Threat Intelligence to Assess Your Security Posture

Today’s cybersecurity environment features a wide range of available threat intelligence, ranging from simple vulnerability alerts to commercial services that monitor threat actor behavior. But how can you use that data to assess the security posture of your own organization? How can you harness threat intel to measure cyber risk? In this panel, threat intelligence experts offer advice and recommendations on how threat intelligence can be used as a means to measure your attack surface.

PANEL DISCUSSION: Detecting and Remediating Application Security Vulnerabilities

One of the most common ways that cyber criminals attack enterprises is by taking advantage of vulnerabilities in applications. In this panel discussion, experts will discuss some of the most popular methods that attackers use to find vulnerabilities, such as fuzzing, as well as tools and practices that security teams can use to detect and repair vulnerabilities in their own applications.

PANEL DISCUSSION: Assessing Your Enterprise’s Ability to Stop the Sophisticated Attacker

Most enterprises understand the threat they face from widely-distributed malware or commonly-seen cyber attacks. But are you identifying all the warning signs of a sophisticated attack? Do you know who your attackers are, and what types of methods they might use against you? Have you considered the ways they might move laterally through your organization, using compromised credentials? In this panel, top security experts discuss the tools and methods you can use to assess the threats posed by advanced attackers, and the risks posed by savvy threat actors.


  • Tim Wilson
    Tim Wilson Editor in Chief, Dark Reading
  • Kelly Jackson Higgins
    Kelly Jackson Higgins Executive Editor, Dark Reading
  • Kelly Sheridan
    Kelly Sheridan Staff Editor, Dark Reading
  • Fahmida Y Rashid
    Fahmida Y Rashid Features Editor, Dark Reading
  • Tim Helming
    Tim Helming Security Evangelist, DomainTools
  • Tony Goulding, Sr.
    Tony Goulding, Sr. Cyber Security Evangelist, ThycoticCentrify
  • Justin Fier
    Justin Fier Director of Cyber Intelligence & Analytics, Darktrace
  • Roger Grimes
    Roger Grimes Data-Driven Defense Evangelist, KnowBe4
  • Curtis Franklin
    Curtis Franklin Senior Editor for Technical Content, Dark Reading
  • Dave Lewis
    Dave Lewis Global Advisory CISO, Duo Security
  • Brandon Hoffman
    Brandon Hoffman Chief Strategy Officer, Intel 471
  • Greg Gaylor
    Greg Gaylor Success Engineer, Censys
  • David Brumley
    David Brumley CEO of ForAllSecure, Inc.
  • Pete Chestna
    Pete Chestna CISO, Checkmarx
  • Kayne McGladrey
    Kayne McGladrey IEEE Senior Member, Ascent Solutions
  • Wade Baker
    Wade Baker PhD, Partner, Cyentia Institute
  • Shannon Lietz
    Shannon Lietz Vice President of Vulnerability Labs, Adobe
  • Anubhav Arora
    Anubhav Arora CTO, Fidelis Cybersecurity
  • Tresa Stephens
    Tresa Stephens Regional Product Leader, Deputy Head of Cyber North America, Allianz Global Corporate & Specialty
  • Rob LaMagna-Reiter
    Rob LaMagna-Reiter CISO, Hudl
  • Chris Bush
    Chris Bush Managing Security Consultant, Bishop Fox
  • Erik Gomez
    Erik Gomez Associate CTO, SADA
  • Allie Mellen
    Allie Mellen Analyst, Forrester
  • Shawn Duffy
    Shawn Duffy Global Lead for Advanced Attack and Readiness Operations, Accenture Security

Take A Tour

Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:

Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.


If you want to know more about the ways that cybercriminals might penetrate your online defenses – and how to measure the specific risks faced by your organization — then this virtual event is for you. Register today!



Assessing Your Attack Surface
Assessing Your Attack Surface


Assessing Your Attack Surface
Assessing Your Attack Surface
Assessing Your Attack Surface
Assessing Your Attack Surface
Assessing Your Attack Surface
Assessing Your Attack Surface
Assessing Your Attack Surface
Assessing Your Attack Surface
Contact Us

Questions? Please contact us!

Not readable? Change text. captcha txt