Why Attend

Cybersecurity technology and practices are undergoing a sea change. While COVID-19 quarantines literally turned enterprise networks upside down overnight, a new wave of online attacks put enterprise data at risk. Today’s security operations center, once focused entirely on perimeter defenses, is now abuzz with new disciplines, including threat hunting and incident response. And yesterday’s security technologies are being remade with new capabilities, including artificial intelligence, automation, and orchestration.

Attend and you’ll learn

How your security organization can keep up with these rapid shifts in process and technology

If AI and machine learning really help your team to detect and mitigate the new wave of sophisticated attacks

More about evolving methods for automating cybersecurity processes, enabling the security team to do more work with fewer staff

Cybersecurity’s Next Wave: What Every Enterprise Should Know

Get the answers to these and many other emerging cybersecurity questions at Dark Reading’s first-quarter event: Cybersecurity’s Next Wave: What Every Enterprise Should Know.

This free, all-day online conference, produced by the editors of Dark Reading, offers an online “crash course” on some of the latest tools and best practices for fighting the next generation of security threats.

You’ll hear from top experts and practitioners on how to secure remote systems, even after the COVID-19 crisis has settled. You’ll learn about emerging technologies for orchestrating your security systems and automating repetitive processes. You’ll find out how AI and machine learning can help your organization identify sophisticated attacks more quickly. And you’ll get advice on how to prepare and deploy the new wave of cybersecurity technologies and practices in your own enterprise.

Among the topics that will be covered:

  • Strategies for improving security in remote and work-from-home systems
  • New methods for securing links to customers and suppliers working remotely
  • Emerging best practices and technologies for automating cybersecurity processes
  • Methods for linking and orchestrating existing systems to improve overall security
  • Tools and processes for collecting and filtering security data
Cybersecurity’s Next Wave: What Every Enterprise Should Know

Strategies for using AI and machine learning to improve threat detection

Cybersecurity’s Next Wave: What Every Enterprise Should Know

Advice and recommendations for penetration testing and threat hunting

Cybersecurity’s Next Wave: What Every Enterprise Should Know

Future directions of security technology – and how to prepare for them


Join us for a full-day virtual event on tools, technologies, and processes for ensuring the cybersecurity of your enterprise’s most sensitive information.

Agenda at at glance

11:00am ET - KEYNOTE: Where Cybersecurity Technology Is Going: A Look at 2021 and Beyond

The cybersecurity threat landscape changes every day. As a result, technology for cyber defense and incident response is changing almost as rapidly. In this keynote address, a top technology expert discusses some of the newest trends in the evolution of cyber technology, and offers recommendations on what technological developments your enterprise should watch for in 2021 and beyond.


12:30PM ET - KEYNOTE: Making Next-Generation Security Technology Work in the Enterprise: Lessons and War Stories

The cybersecurity market is teeming with new waves of technology, new vendors, and new categories of products that promise to revolutionize data security. As a security professional, how do you keep up with these new technologies, how do you choose which ones to implement, and how do they work in real-life, operating IT environments? In this keynote address, an experienced security practitioner discusses the process of evaluating new technology as well as the benefits and pitfalls of bringing next-generation tools into your enterprise.

2:15PM ET - PANEL DISCUSSION: Remote Access: Making Work-from-Home and Mobile Technology Safe for Your Critical Data

The COVID-19 pandemic has left most enterprises struggling to secure a plethora of remote systems and networks that were never meant to carry sensitive data. As the overnight IT infrastructure of 2020 becomes the permanent infrastructure of 2021, what technologies and processes will enterprises use to secure those remote systems? In this panel discussion, experts will offer advice and recommendations on how to build a secure remote access strategy that works for the long haul.

3:15PM ET - PANEL DISCUSSION: XDR: What Is It and How Does It Work In Real Life?

Many enterprises have seen the value of endpoint detection and response, but many are now seeing a need for detection and response capabilities on other systems, including networks, cloud services, and managed services. This concept of extended detection and response, also known as XDR, is spawning a new range of technology choices and implementation challenges. In this panel discussion, experts offer insights to help enterprises understand XDR, as well as the challenges and pitfalls of implementing these emerging technologies in an already-complex IT environment.

4:15PM ET - PANEL DISCUSSION: Orchestration and Automation: Building Next-Gen Security From Tools You Already Have

For many enterprises, the challenge of 2021 will not be which new cybersecurity technologies to implement, but how to make their old cybersecurity technologies work better together. In some cases, enterprises are seeking better ways to integrate and orchestrate their disparate security systems. In other cases, organizations seek to better automate the operation of these security tools so that they can detect new threats faster, with less human intervention. In this panel discussion, experts will offer advice on how to make orchestration work in complex IT environments, as well as recommendations on how to automate security tasks and processes.


  • Mike Gruen
    Mike Gruen CISO and VP of Engineering, Cybrary
  • Alicia Lynch
    Alicia Lynch Vice President and CISO, SAIC
  • Kurt John
    Kurt John Chief Cybersecurity Officer, Siemens USA
  • Richard Puckett
    Richard Puckett Chief Information and Security Officer and Global Head of Cyber Defense and Design, SAP
  • Noa Glumcher
    Noa Glumcher Director of Marketing, Hunters
  • J. Carlos Vega
    J. Carlos Vega Chief Information Security Officer, Devo
  • Roselle Safran
    Roselle Safran Founder & CEO, KeyCaliber
  • Tim Rohrbaugh
    Tim Rohrbaugh CISO at JetBlue
  • Ron Gula
    Ron Gula President, Gula Tech Adventures
  • Srikrupa Srivatsan
    Srikrupa Srivatsan Director, Product Marketing, Infoblox
  • Tommy Todd
    Tommy Todd Vice President of Security, Code42
  • Lynsey Wolf
    Lynsey Wolf Senior C-InT Analyst, Security and Business Intelligence, DTEX
  • Guy Peer
    Guy Peer VP R&D and Co-founder, Unbound
  • Eric Parizo
    Eric Parizo Senior Analyst, Ovum
  • Maxim Weinstein
    Maxim Weinstein Senior Director, Market Intelligence, Sophos
  • Tim Helming
    Tim Helming Security Evangelist, DomainTools
  • Tim Wilson
    Tim Wilson Editor in Chief, Dark Reading
  • Sara Peters
    Sara Peters Senior Editor, Dark Reading
  • Kelly Jackson Higgins
    Kelly Jackson Higgins Executive Editor, Dark Reading
  • Kelly Sheridan
    Kelly Sheridan Staff Editor, Dark Reading

Take A Tour

Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:

Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.


If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them — then this virtual event is for you. Register today!



Cybersecurity’s Next Wave: What Every Enterprise Should Know
Cybersecurity’s Next Wave: What Every Enterprise Should Know


Cybersecurity’s Next Wave: What Every Enterprise Should Know
Cybersecurity’s Next Wave: What Every Enterprise Should Know
Cybersecurity’s Next Wave: What Every Enterprise Should Know
Cybersecurity’s Next Wave: What Every Enterprise Should Know
Cybersecurity’s Next Wave: What Every Enterprise Should Know
Cybersecurity’s Next Wave: What Every Enterprise Should Know
Contact Us

Questions? Please contact us!

Not readable? Change text. captcha txt