Cybersecurity's Most Promising New and Emerging Technologies
The rapid-fire emergence of generative AI, along with widespread cloud adoption, has reshaped the network landscape for security operations teams. Cyber threat actors have shifted their attacks accordingly, leaving security teams scrambling to ensure their existing defenses can hold up against new waves of threats powered by AI and attacks targeting cloud assets.
This full-day virtual event is designed to update cybersecurity teams on some of the most promising emerging cybersecurity technologies and provide advice on adopting them in their organization. Attendees will hear about state-of-the-art techniques and technologies for securing their cloud-based assets and accounts, and hybrid network infrastructure. They’ll learn how to secure critical data and systems from persistent cybercriminals and nation-states. Additionally, they will gain insights into next-gen tools that can help augment and integrate with existing tools and processes. These tools can also automate many manual tasks that burden SecOps teams.
Cutting-Edge Cybersecurity Technologies
Thousands of cybersecurity vendors and service providers are regularly launching new products and products and services. In this keynote address, a top cyber technology expert goes beyond the hype and sheds light on some of the newest technologies and trends and offers tips and recommendations on how to determine which security technologies can best help you secure your enterprise in 2025.
A CISO’s Guide to Next-Gen Cyber Defenses
Fresh cybersecurity technologies can be exciting and promising, but organizations still face challenges in blending these new tools and approaches with their existing security technologies.
In this keynote address, an experienced security practitioner offers insights for chief information security officers (CISOs) on integrating some of the hottest emerging technologies and disciplines into an existing IT security environment to ensure a smooth shift to a stronger defense.
The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
A new wave of machine learning, deep learning, and artificial intelligence technology promises to help IT security operations teams detect cyber threats sooner and respond to them more quickly. But machine learning is used in a wide variety of ways, and not all machine learning-based products work in the same fashion. In this webinar, experts will discuss the ways that machine learning can help in security operations, how it can speed threat analysis, and how to evaluate and choose technologies that will work in your organization.
During this webinar you will:
Cloud Detection & Response: A Living off the Cloud Attack
Living off the cloud attacks are on the rise. Executing rapid, cloud-native techniques to escalate privileges, move laterally between environments, and access critical assets, attackers are targeting the cloud more effectively than ever. This session will focus on a real-world living off the cloud attack case study, analyzing a step-by-step account of the attack as it unfolded from attackers’ perspective.
We will then switch gears and rewind the attack, explaining how effective detection and response methodologies could — and should — have prevented every step of the attack. Defeating these threats requires powerful centralized visibility and control of all cloud environments and resources. Our key takeaways will therefore be tailored to leveraging the best methodologies and tools to take back the initiative and stop even the most sophisticated cloud attacks.
SecOps Transformation – Cybersecurity at Scale
Today’s security operations centers are facing a barrage of “more”. More attacks. More threat vectors. More devices and data. More security tools. More regulations. More specialized focus areas. More silos. With the modern security landscape changing fast, the SOC must evolve to meet current threats, demands and pressures.
Join this Special Section discussion to learn:
The Promise and Perils of AI
Generative AI has placed powerful artificial intelligence tools in the hands of everyone, including the bad guys. In this panel discussion, experts will explain how to protect your organization from a new generation of cyberattacks that leverage AI. You will learn how to harness AI for good as a security tool, for both your secure application development (DevSecOps) and SecOps teams.
Securing Your Cloud(s)
Much of the challenge for protecting cloud assets is obtaining a clear and comprehensive picture of those assets and their dependencies. That includes devices, accounts, and human, machine, vendor, and service provider identities in cloud infrastructure and platform services. In this panel discussion, experts will discuss the latest threats to the cloud environment as well as best practices, tools, and technologies that can help enterprises manage and secure their cloud infrastructure — and understand how their cloud and SaaS providers protect their data (or not).
Next-Gen SecOps
The security operations center (SOC) as we know it is evolving, with cloud-based managed services and tools that automate — and decentralize — security teams tasked with defending a far-flung enterprise infrastructure. How do you build out a modern SecOps team and which technologies should you adopt to drive it? How do ensure you have sufficient visibility into your cloud and other assets? In this panel discussion, experts explain how the latest tools and technologies are changing the way security teams gather and analyze threat data. You will learn how to streamline security tools with new technologies to better shore up your defenses and what that means for how you build out your team in this new world.
HID PKI-as-a-Service
The art of zero trust Identity: a Unified Approach Towards Secure Access Management
The art of zero trust Identity: a Unified Approach Towards Secure Access Management: In this session, you’ll hear Yazan Albikawi, Solutions Engineer at Okta, share how organizations can solve for complex business requirements, while navigating the threat landscape, using a unified platform for Identity.
Tune in to hear:
How to Think Like an Attacker
Cybersecurity's Most Promising New and Emerging Technologies