Why Attend

There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?

Attend and you’ll learn

The simplest and most common tricks for cracking enterprise systems and networks

Methods for recognizing and mitigating frequently-used online cyber exploits

Advice on how to use threat intelligence to prevent trending attacks

Cyber Attackers’ Favorite Exploits – And How to Stop Them

Join us for a free, all-day online conference produced by the editors of Dark Reading. This virtual event offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.

Among the topics that will be covered:

  • An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
  • A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
  • Insight on how malware is typically deployed, and how it works after it’s infected your systems
Home

A look at emerging methods to frustrate and deceive online attackers.

Home

How to analyze information on emerging exploits.

Home

How to develop a response plan.

Agenda

Join us for a full-day virtual event on tools, technologies, and processes for ensuring the cybersecurity of your enterprise’s most sensitive information.

Agenda at at glance

11:00am ET - KEYNOTE: Who Are the Bad Guys? An Overview of Attacker Profiles, Motivations, and Methods

One of the first rules of defense is to know your adversary. Who are the online attackers most likely to target your enterprise, and what do they want? In this keynote address, a top security expert will provide an overview of some of the most current and prevalent threat actors and their most common exploits. You’ll also get advice on how you can use your knowledge about your adversaries to improve your data defense.

12:30PM ET - KEYNOTE: Profile of an Online Attack

It’s happened. A sophisticated attacker has chosen your enterprise as its next target, and is now developing a plan to find every possible avenue into your systems and data. What does that plan look like? How will it be executed? In this keynote session, a top penetration tester will describe the many methods used to discover and exploit vulnerabilities in an enterprise’s computing environment. You’ll get a step-by-step look at how a sophisticated attacker would research, assess, and exploit your enterprise assets, and how you can use that information to stop them.

2:15PM ET - PANEL DISCUSSION: Collecting and Using Enterprise Threat Intelligence

To prepare an effective cyber defense, you need an up-to-the-minute understanding of the attackers who would most likely target an organization like yours, and the specific threats your team is likely to face. This “threat intelligence” can be collected from many sources, but it takes a special set of processes and tools to analyze the information and assess the threat to your specific enterprise. In this panel discussion, top experts on threat intelligence offer insight on how to identify, analyze, and interpret threat intelligence data to help build an effective defense for your organization.

3:15PM ET - PANEL DISCUSSION: Detecting and Analyzing Enterprise Security Data

Today’s sophisticated attackers have developed a wide range of staging an online attack, often using multi-pronged exploits that are designed to evade traditional enterprise defenses. To detect this type of attack, your organization needs processes and tools that can winnow through a wide range of security telemetry and ferret out potential indicators of compromise. How does this analysis work? How much of it can be automated? What role do artificial intelligence and machine learning play in security analysis? In this panel discussion, experts will discuss the issues and challenges facing today’s security analyst, and how your organization can improve its detection and analysis processes.

4:15PM ET - PANEL DISCUSSION: Building and Managing an Effective Incident Response Process

Your security team has discovered a potential cyber compromise. Now you’ll need tools and processes for assessing the incident, determining its validity, and discovering the extent of the damage. You’ll also need tools and processes for stopping the attack and mitigating its effects. In this panel session, top experts offer their insights on building an effective incident response program, including the people who need to be involved, the technology you’ll need to assess and remediate, and the processes you’ll need to initiate a quick response.

Speakers

  • Ilia Sotnikov
    Ilia Sotnikov VP of Product Management, Netwrix
  • Sohail Iqbal
    Sohail Iqbal Chief Information Security Officer, Veracode
  • Tim Wilson
    Tim Wilson Editor in Chief, Dark Reading
  • Sara Peters
    Sara Peters Senior Editor, Dark Reading
  • Kelly Jackson Higgins
    Kelly Jackson Higgins Executive Editor, Dark Reading
  • Kelly Sheridan
    Kelly Sheridan Staff Editor, Dark Reading

Take A Tour

Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:

Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.

Register

If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them — then this virtual event is for you. Register today!

Sponsors

Diamond

Home
Home

Platinum

Home
Home
Home
Home
Home
Home
Contact Us

Questions? Please contact us!

Not readable? Change text. captcha txt