Why Attend

There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable — days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.

For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.

Attend and you’ll learn

Strategies for creating and rehearsing an enterprise-wide breach response plan

Best practices and technologies for detecting potential intrusions or infections

Recommendations for building and managing an incident response plan

Preparing for, Detecting, and Managing a Critical Data Breach

Join us for a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.

Among the topics that will be covered:

  • Tools and best practices for detecting a breach, even when it’s well-obfuscated
  • Methods for limiting the scope and impact of a data breach
  • How to determine the extent of a breach, and what system/partners may be affected
Home

Explore strategies for speeding the remediation process.

Home

Discover how to limit costs and liabilities associated with cyber breaches.

Home

Lessons learned: how to monitor and collect data on future threats.

Agenda

Join us for a full-day virtual event on tools, technologies, and processes for ensuring the cybersecurity of your enterprise’s most sensitive information.

Agenda at at glance

11:00am ET - KEYNOTE: Diary of a Data Breach

There are many plans and guidelines for handling a critical data breach – but there’s no substitute for real-life experience. In this practical, real-world keynote, a top expert with firsthand knowledge of data breach incidents offers a detailed look at how an incident can be detected, how your team should respond, and how to optimize remediation while minimizing the long-term impact. You’ll get tips, advice, and recommendations from an expert who has firsthand understanding of breaches and their potential impact.

12:30PM ET - KEYNOTE: How to Prepare Your Organization for a Data Breach – Before It Happens

A data breach may affect not only your organization’s IT environment, but employees, customers, and the business itself. An effective response requires advance preparation. In this instructive keynote, a top expert will describe key elements of data breach response, including assessment of threat intelligence, analysis of security system telemetry, coordination of incident response teams, and how to communicate with top executives, users, customers, and the general public. You’ll get insight on how to prepare for the most likely attacks, as well as how to build and rehearse a breach response team.

1:30PM ET - SPOTLIGHT WEBINAR: Uncovering Zero-Day Threats: Lessons from APT41 Presented by Darktrace

Without public Indicators of Compromise (IoCs) or open-source intelligence available, targeted cyber-attacks are incredibly difficult to detect. However, in March of this year, a series of advanced attacks that targeted US and European companies were autonomously detected, and later attributed to Chinese cyber espionage group APT41.

Join Justin Fier, Darktrace’s Director for Cyber Intelligence & Analytics, as he explains how AI technology was able to identify how APT41 attempted to gain access to different companies in fast-moving attacks that exploited the Zoho ManageEngine zero-day vulnerability.

Watch this webinar to discover:

– How APT utilized the window of opportunity before IT systems were patched

– How Cyber AI Analyst autonomously investigated the attacks as part of a meaningful security narrative

– The implications of attacks within a supercharged threat landscape

1:30PM ET - SPOTLIGHT WEBINAR: Cloud IAM is the New Perimeter, Learn How to Govern It or Lose Control Presented by DivvyCloud

Strong IAM governance is the key to preventing data breaches and limiting the blast radius should a security incident occur. Join James Martin, Technical Product Manager, and Chris Hertz, VP Cloud Security Sales, of DivvyCloud by Rapid7, for a discussion on why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations are governing cloud IAM to reduce risk and the chance of a data breach.

Key takeaways include understanding how to:

  • Gain visibility to assess, prioritize and remediate improper permission combinations that grant unintended or overly permissive access.
  • Establish and maintain least privilege.
  • Limit cloud security blast radius.
2:15PM ET - PANEL: How Do You Know When You’ve Been Breached? A Closer Look at Detecting Cyber Compromises

For some unfortunate organizations, the time between a cyber intrusion and the detection of that intrusion can be days, weeks, or even months. How can enterprises build a security environment that enables them to detect potential compromises sooner? In this panel discussion, experts will discuss the various ways to detect cyber attacks and breaches, and they will offer insight on how to shorten the time it takes to identify a potential compromise.

3:15PM ET - PANEL: What Every Enterprise Should Know About Security Operations Centers and Incident Response

IT and cybersecurity teams are rapidly building out their security operations center (SOC) and incident response (IR) programs in order to identify potential security vulnerabilities or compromises and respond to them as quickly as possible. But how can you ensure that your SOC and IR programs are working effectively?  In this panel discussion, experts outline some of the key elements behind security operations and incident response, and how you can equip and prepare your teams to act effectively in the event of a major breach.

4:15PM ET - PANEL: Remediation: Solving the Problems Raised By a Cybersecurity Breach

When it comes to cyber breaches, much of the discussion is around first response and how to minimize the damage caused by an online attack. But what about fixing the issues that caused the breach in the first place? In this panel discussion, experts discuss the practical processes and tools that can be implemented after a breach is discovered and diagnosed. You’ll learn how to determine the extent of a security compromise, and how to trigger the right steps toward fixing your organization’s vulnerabilities and repairing the damage caused by a cyber attack.

Speakers

  • Adam Tice
    Adam Tice Senior Vice President of Cybersecurity, Equifax
  • Gal Shpantzer
    Gal Shpantzer Independent Security Professional
  • Sean Curran
    Sean Curran Leader, Cybersecurity Practice, West Monroe Partner
  • Kiersten E. Todt
    Kiersten E. Todt President and Managing Partner of Liberty Group Ventures, LLC (LGV)
  • Dominic Dertatevasion
    Dominic Dertatevasion Associate Director, IT Security Operations Center, Texas A&M University System
  • Yaron Levi
    Yaron Levi CISO, Blue Cross Blue Shield of Kansas City
  • Eric Parizo
    Eric Parizo Senior Analyst, Ovum
  • Justin Harvey
    Justin Harvey Managing Director, Lead, Accenture Security Global Incident Response
  • Jeremy Snyder
    Jeremy Snyder Senior Director of Business Development & Solutions Engineering, DivvyCloud
  • Justin Fier
    Justin Fier Director of Cyber Intelligence & Analytics, Darktrace
  • Chris Hertz
    Chris Hertz VP Cloud Security Sales, DivvyCloud
  • James Martin
    James Martin Technical Product Manager, DivvyCloud
  • Teju Shyamsundar
    Teju Shyamsundar Senior Product Marketing Manager, Okta
  • Cody Cornell
    Cody Cornell Co-Founder and CEO at Swimlane
  • Joseph Carson
    Joseph Carson Chief Security Scientist & Advisory CISO, Thycotic
  • James Perry
    James Perry Senior Director and Global Head of Incident Response, Crowdstrike
  • Jack Danahy
    Jack Danahy SVP, Strategy and Security Chief Evangelist, Alert Logic
  • Scott McCormick
    Scott McCormick CISO , Reciprocity
  • Tim Wilson
    Tim Wilson Editor in Chief, Dark Reading
  • Sara Peters
    Sara Peters Senior Editor, Dark Reading
  • Kelly Jackson Higgins
    Kelly Jackson Higgins Executive Editor, Dark Reading
  • Kelly Sheridan
    Kelly Sheridan Staff Editor, Dark Reading
  • Curtis Franklin
    Curtis Franklin Senior Editor for Technical Content, Dark Reading

More to Come

Take A Tour

Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:

Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.

Register

If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow – then this virtual event is for you. Register today!

Sponsors

Diamond

Home
Home

Platinum

Home
Home
Home
Home
Home
Home
Contact Us

Questions? Please contact us!

Not readable? Change text. captcha txt