There are an infinite number of ways a cybercriminal could attack your enterprise – but only a limited number that will work consistently, affordably, and with a minimum amount of work. Do you know the cyber attacks that will most likely be used against your organization? More importantly, do you know the best methods to mitigate them?
Attend and you’ll learn
Cyber Attackers’ Favorite Exploits – And How to Stop Them
Join us for a free, all-day online conference produced by the editors of Dark Reading. This virtual event offers a look at some of the newest and most prevalent types of online attacks targeted at enterprises. You’ll get a look at some of the latest exploits used by today’s cybercriminals, as well as their methods for penetrating your defenses. Top security experts and researchers will discuss commonly-used methods for cracking business data, as well as exploits that steal user credentials. Best of all, you’ll get advice and recommendations on how to detect, analyze, and mitigate these prevalent attacks, and how to frustrate cyber attackers who try to use them.
Among the topics that will be covered:
- An overview of the latest security vulnerabilities in enterprise applications, and how attackers exploit them
- A look at some of the newest phishing and social engineering exploits, and how attackers might target your employees
- Insight on how malware is typically deployed, and how it works after it’s infected your systems
A look at emerging methods to frustrate and deceive online attackers.
How to analyze information on emerging exploits.
How to develop a response plan.
Join us for a full-day virtual event on tools, technologies, and processes for ensuring the cybersecurity of your enterprise’s most sensitive information.
Agenda at at glance
One of the first rules of defense is to know your adversary. Who are the online attackers most likely to target your enterprise, and what do they want? In this keynote address, a top security expert will provide an overview of some of the most current and prevalent threat actors and their most common exploits. You’ll also get advice on how you can use your knowledge about your adversaries to improve your data defense.
It’s happened. A sophisticated attacker has chosen your enterprise as its next target, and is now developing a plan to find every possible avenue into your systems and data. What does that plan look like? How will it be executed? In this keynote session, a top penetration tester will describe the many methods used to discover and exploit vulnerabilities in an enterprise’s computing environment. You’ll get a step-by-step look at how a sophisticated attacker would research, assess, and exploit your enterprise assets, and how you can use that information to stop them.
To prepare an effective cyber defense, you need an up-to-the-minute understanding of the attackers who would most likely target an organization like yours, and the specific threats your team is likely to face. This “threat intelligence” can be collected from many sources, but it takes a special set of processes and tools to analyze the information and assess the threat to your specific enterprise. In this panel discussion, top experts on threat intelligence offer insight on how to identify, analyze, and interpret threat intelligence data to help build an effective defense for your organization.
Today’s sophisticated attackers have developed a wide range of staging an online attack, often using multi-pronged exploits that are designed to evade traditional enterprise defenses. To detect this type of attack, your organization needs processes and tools that can winnow through a wide range of security telemetry and ferret out potential indicators of compromise. How does this analysis work? How much of it can be automated? What role do artificial intelligence and machine learning play in security analysis? In this panel discussion, experts will discuss the issues and challenges facing today’s security analyst, and how your organization can improve its detection and analysis processes.
Your security team has discovered a potential cyber compromise. Now you’ll need tools and processes for assessing the incident, determining its validity, and discovering the extent of the damage. You’ll also need tools and processes for stopping the attack and mitigating its effects. In this panel session, top experts offer their insights on building an effective incident response program, including the people who need to be involved, the technology you’ll need to assess and remediate, and the processes you’ll need to initiate a quick response.
Take A Tour
Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:
Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.
If you want to know more about the tools, techniques, and practices of today’s online attackers – and get insight on how your organization can detect, analyze, and mitigate them — then this virtual event is for you. Register today!