Anatomy of a Data Breach:

And What to Do if it Happens to You

June 18, 2025
11:00am -5:00pm ET | Doors Open at 10:30am ET

In today’s rapidly evolving threat landscape, organizations fall into two categories: those aware a cyberattack has hit them and those who discover it too late.

As cyber threats advance at an unprecedented pace, understanding and addressing the most common attack vectors, vulnerabilities, and errors is crucial in mitigating potentially disastrous ransomware attacks or data breaches.

During this full-day virtual event, we’ll explore the main vulnerabilities and exploits that lead to enterprise data breaches and the latest tools and best practices for conducting incident response. Attendees will gain insight on how to find and fix the security vulnerabilities – before the attackers find them. They’ll learn state-of-the-art practices and techniques to protect data from ransomware, cyber extortion, and cloud-borne threats. Best of all, they’ll learn how to mitigate attacks and threats, so they don't result in a full-blown breach of valuable data.

Topics Include:
How to identify and remediate these weaknesses in your IT and cloud infrastructures.
Best practices for securing cloud-based accounts, identities, and stored data.
The most common vulnerabilities, missteps, and oversights that lead to cyberattacks, data compromise, and theft.
We will discuss the key steps in responding to a security incident, including a look at the role of emerging tools using AI.
And More!
Agenda
Keynote
11:00am - 11:45am ET

How and Why Data Breaches Occur

Sponsored by: Wiz
Speaker(s): Fernando Montenegro, Vice President & Practice Lead, Cybersecurity, The Futurum Group
Moderated by: Fahmida Y Rashid, Managing Editor, Dark Reading

Many data breaches unfold when an attacker exploits a defender’s mistaken configuration or an unknown vulnerability in an IT or cloud infrastructure. In this keynote presentation, a top cybersecurity expert will explain the most common mistakes and holes that can lead to an attack, and how to identify and remediate these weaknesses in your IT and cloud infrastructures.

Fireside Chat
11:45am - 12:00pm ET

Speaker(s): Snegha Ramnarayanan, Staff Product GTM Manager, Wiz
Keynote
12:15pm - 1:00pm ET

Real-World Data Breaches: An Inside View

Sponsored by: ExtraHop Networks
Speaker(s): Alex Pinto, Associate Director, Verizon
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

In this keynote address, a top security researcher will detail and analyze trends and takeaways from real-world data breaches investigated over the past year, pinpointing the most popular attack vectors and exploited vulnerabilities. The keynote also will cover best practices for defending against these attacks.

Fireside Chat
1:00pm - 1:15pm ET

Speaker(s): Heath Mullins, Chief Evangelist, ExtraHop
Spotlight Webinar
1:30pm - 2:00pm ET

Today's Top Cloud Security Threats - AI Edition

Sponsored by: Wiz
Speaker(s): Shaked Rotlevi, Senior Product Marketing Manager, Wiz

Today’s Top Cloud Security Threats Threat actors have their sights firmly trained on exploiting vulnerabilities in cloud services, applications, and configurations. This webinar will offer strategies for gaining visibility into the cloud and implementing and enforcing consistent security controls across your entire environment, both on-premises and cloud, to keep them at bay. Experts will also provide tips on protecting against top cloud cybersecurity threats including account hijacking, insecure APIs, and insider threats, and explore the tools available to help.

Spotlight Webinar
1:30pm - 2:00pm ET

Airing the Dirty Laundry: Empower the SOC in the Fight Against Malware and Ransomware

Sponsored by: ExtraHop Networks
Speaker(s): Heath Mullins, Chief Evangelist, ExtraHop

Malware and ransomware continue to evolve, exploiting blind spots and operational silos within the enterprise. In this presentation, we “air the dirty laundry” — exposing the systemic challenges and overlooked vulnerabilities that hinder Security Operations Centers (SOCs) from mounting an effective defense. Aimed at CISOs and Security Architects, this session confronts the hard truths behind insufficient east-west visibility, delayed threat detection, and overburdened analysts.

We’ll explore how to transform the SOC from a reactive, alert-driven function into a proactive, intelligence-led force by embracing architectural transparency, real-time behavioral analytics, and threat-informed defense models. Key takeaways include strategies for enabling deep network observability, integrating automated response mechanisms, and aligning security operations with broader risk management goals. Attendees will walk away with a practical framework for building a resilient SOC—one that is not only empowered to detect and respond, but also engineered to disrupt the adversary’s kill chain before damage is done.

Panel Session
2:15pm - 3:00-pm ET

Rooting Out and Ridding Your Software of Security Vulnerabilities

Sponsored by: Backslash Security and Action1
Panelists: Gene Moody, Shahar Man, Melinda Marks, Douglas McKee
Moderated by: Becky Bracken, Senior Editor, Dark Reading

Software vulnerabilities are at the core of most data breaches. These bugs can be in your third-party software or in your own internal applications. When software vendors regularly issue updates and patches, how do you know which ones to prioritize? How do you ensure your own development team is writing secure code? In this panel discussion, experts will discuss how to identify, assess, and prioritize the risk of an attacker exploiting the latest vulns in your systems. They will offer strategies for using DevSecOps for your internal apps as well as building a sound patching policy for your third-party software.

Panel Session
3:15pm - 4:00pm ET

Cloud Hacks Happen: How to Stop Them

Sponsored by: Delinea and Tenable
Panelists: Ariel Zaretsky, Paul Anderson, Geoff Cairns, Erik Johnson
Moderated by: Jai Vijayan, Contributing Writer, Dark Reading

The shared security responsibility between cloud providers and their customers can cause confusion and, in some cases, breaches in the cloud environment when organizations miss or misconfigure security settings. In this panel discussion, cloud security experts will discuss how attackers can take advantage of those mistakes, as well as vulnerabilities in the cloud services themselves. They will provide guidance on how to avoid cloud misconfigurations and security missteps, as well as best practices for securing cloud-based accounts, identities, and stored data.

Panel Session
4:15pm - 5:00pm ET

Incident Response: Navigating a Data Breach

Sponsored by: Mandiant
Panelists: Kerri Shafer-Page, Chris Hendricks, Josh Madeley
Moderated by: Rob Wright, Senior News Director, Dark Reading

That very bad, no-good data breach day hits your organization, so now what? In this panel discussion, experts in incident response will detail and discuss the key steps in responding to a security incident, including a look at the role of emerging tools using AI and automation, eXtendedDetection and Response (XDR), and other state-of-the art IR practices.

Anatomy of a Data Breach:

And What to Do if it Happens to You

June 18, 2025
11:00am -5:00pm ET | Doors Open at 10:30am ET

Speakers
Eric Krapf
Program Chair, Enterprise Connect
Eric Krapf is Program Chair for Enterprise Connect, the leading conference/exhibition and online events brand in the enterprise communications industry. Eric served as editor of No Jitter from its founding in 2007 until taking over as publisher in 2015, a role he held until 2024.
AJ Yawn
Director of GRC Engineering, Aquia
AJ Yawn is the Director of GRC Engineering at Aquia and author of GRC Engineering for AWS. With over 15 years of experience in cybersecurity, AJ is a former U.S. Army Captain, startup founder, and CPA firm Partner. He specializes in building automated, cloud-native compliance programs and teaches over 145,000 learners through his LinkedIn Learning.
 Ann Dunkin
Chief Executive Officer, Dunkin Global Advisors Inc
Experienced leader of technology teams, who delivers exceptional results for global enterprises. Develops and manages high-performing teams in both the private and public sectors within complex organizations. Solves difficult business and technical problems and implements innovative solutions within tight time frames and budget constraints.
 Bill Brazill
Senior Solutions Engineer, Netskope
As a Senior Solutions Engineer at Netskope, Bill Brazill is passionate about bridging the gap between complex technology and real-world customer needs. He excels at putting himself in the customer’s shoes, communicating effectively, and serving as a trusted, realistic advocate.
 Melody Nouri
Sr Product Marketing Manager, Netskope
Melody Nouri is a Product Marketing Manager at Netskope, specializing in Cloud and AI Security. With extensive experience in Network Security, she is passionate about leveraging cutting-edge technologies to help organizations address modern threats and security risks.
 Ally Troha
Manager, Information Security – Security Operations, Netskope
Ally Troha is the Manager of Security Operations at Netskope, where she leads global threat detection and vulnerability management efforts. With a strong focus on operational efficiency and automation, she has implemented SOAR platforms and built agile teams that rapidly respond to evolving threats.
 Josh Madeley
Josh Madeley, Incident Response Regional Lead, Mandiant, Google Cloud
Josh Madeley is a Regional Lead with Mandiant's Incident Response team and has been helping companies respond to and recover from all types of cyber attacks for the last 9 years.
 Erik Johnson
Erik Johnson, Senior Research Analyst, CSA
Innovative, service-oriented Cloud Security Specialist and Security Architect with extensive IT & IS experience, particularly in the financial and public sectors - including capital markets, central banking & international development. Lead CSA Research Analyst for Zero Trust and the Financial Services Industry.
 Geoff Cairns
Geoff Cairns, Principal Analyst, Forrester
Geoff Cairns is a principal analyst at Forrester, advising security and risk professionals on identity and access management (IAM). His research focuses on workforce IAM, including topics such as multifactor authentication (MFA), privileged identity management, identity governance and lifecycle, and workforce identity security platforms.
 Chris Hendricks
Chris Hendricks, Head of Incident Response, Coalition
Chris Hendricks is the Head of Coalition Incident Response (CIR) at Coalition, Inc., a cyber insurance and security company. Prior to joining Coalition, Chris served in the United States Air Force Reserve as the Deputy Chief of Cyber Operations. Chris Hendricks brings a wealth of experience in cybersecurity and incident response.
 Kerri Shafer-Page
Kerri Shafer-Page, Vice President of Digital Forensics Incident Response, Arctic Wolf
Demonstrated Cyber security leader for the Digital Forensics Incident Response team at Arctic Wolf. Proven leader in threat identification, IT Security and Data Privacy incident response and mitigation. Responsible for execution and leadership of a leading incident response team showcasing; threat actor communication and negotiation.
 Melinda Marks
Melinda Marks, Practice Director, Cybersecurity, ESG
Practice Director Melinda Marks leads ESG’s analyst team focused on cybersecurity. Melinda covers technologies that help organizations scale safely while adopting faster cloud-native development cycles. With more than 20 years of experience in technology marketing and strategy.
 Douglas McKee
Douglas McKee, SANS Instructor, SANS
Douglas McKee is the Executive Director of Threat Research at SonicWall where he and his team focus on identifying, analyzing, and mitigating critical vulnerabilities through daily product content. He is also the lead author and instructor for SANS SEC568: Product Security Penetration Testing - Safeguarding Supply Chains.
 Heath Mullins
Heath Mullins, Chief Evangelist, ExtraHop
Heath Mullins is the Chief Evangelist at ExtraHop, where he leads thought leadership and advocacy for cutting-edge cybersecurity solutions. With 26 years of experience, Heath is a recognized expert in Network Detection and Response (NDR), Network Analysis and Visibility (NAV), Secure Web Gateways (SWG), global networks, cybersecurity technologies.
 Shahar Man
Shahar Man, CEO & Co-Founder, Backslash Security
Shahar Man is a seasoned technology leader with deep experience in engineering, AppsSec, DevOps and product management. As the co-founder and CEO of Backslash Security, he is dedicated to transforming application security by integrating business and security context into cloud-native risk management.
 Snegha Ramnarayanan
Snegha Ramnarayanan, Staff Product GTM Manager, Wiz
Snegha Ramnarayanan is a Staff Product GTM Manager at Wiz focused on Wiz’s core capabilities including data and AI security. Previously , she worked in field and product roles in the cybersecurity space including Okta & Vmware. She graduated from the Haas school of Business (MBA) & the University of Illinois Urbana Champaign (EE).
Paul Anderson
Paul Anderson, Sr. Security Engineer, Tenable
Paul Anderson's career has focused on delivery of all sorts of IT infrastructure, from development environments to some of the world’s fastest supercomputers. Paul was an early participant in the DevOps philosophy, deploying stateless, ephemeral images on physical servers before Patrick Debois gave it a name.
 Gene Moody
Gene Moody, Field CTO, Action1
Gene Moody is the Field CTO at Action1, where he drives product strategy aligned with customer security and automation goals, helping organizations strengthen endpoint management in complex environments. With over 30 years in technology, he offers deep expertise in systems architecture, IT operations, and cybersecurity.
 Rob Wright
Rob Wright, Senior News Director, Dark Reading
Rob Wright is the senior news director at Dark Reading. He has a 25-year career as a technology journalist. He joined TechTarget in 2014 as site editor of SearchSecurity and later served as the site's executive editor. Prior to TechTarget, he worked at CRN and Tom's Hardware Guide in various editor and report roles. He is based in the Boston area.
Becky Bracken
Becky Bracken, Senior Editor, Dark Reading
Becky Bracken has built a decades-long journalism career with a focus on cybersecurity issues and serves as an editor for Dark Reading.
Ariel Zaretsky
Senior Product Manager, Delinea
A seasoned Product Manager at Delinea, specializing in ITDR (Identity Threat Detection and Response) and CIEM (Cloud Infrastructure Entitlement Management). With a career marked by military leadership and entrepreneurial success, Ariel has developed a unique expertise in B2B SaaS product development within the cybersecurity domain.
Fahmida Y Rashid headshot
Fahmida Y. Rashid
Managing Editor of Features, Dark Reading
Fahmida Y Rashid is Dark Reading’s managing editor, focusing on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers.
Jai Vijayan
Contributing Writer, Dark Reading
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism covering information security and data privacy. Over the course of his career, Jai has also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics.
Shaked Rotlevi
Shaked Rotlevi, Senior Product Marketing Manager, Wiz
Shaked Rotlevi is a Senior Product Marketing Manager at Wiz based in San Diego, California.
Fernando Montenegro
Fernando Montenegro, Vice President & Practice Lead, Cybersecurity, The Futurum Group
Fernando Montenegro serves as the Vice President & Practice Lead for Cybersecurity at The Futurum Group. In this role, he leads the development and execution of the Cybersecurity research agenda, working closely with the team to drive the practice’s growth. His research focuses on addressing critical topics in modern cybersecurity.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties.
Alex Pinto
Senior Manager of the Data Breach Investigation Report team, Verizon Threat Research Advisory Center
Alex Pinto is the senior manager of the Data Breach Investigations Report team in the Verizon Threat Research Advisory Center. His teams are responsible not only for the Verizon DBIR, but support security research and thought leadership in the organization.
Sponsors
Diamond
Platinum
© 2025 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service