Anatomy of a Data Breach:

And What to Do if it Happens to You

June 18, 2025
11:00am -5:00pm ET | Doors Open at 10:30am ET

In today’s rapidly evolving threat landscape, organizations fall into two categories: those aware a cyberattack has hit them and those who discover it too late.

As cyber threats advance at an unprecedented pace, understanding and addressing the most common attack vectors, vulnerabilities, and errors is crucial in mitigating potentially disastrous ransomware attacks or data breaches.

During this full-day virtual event, we’ll explore the main vulnerabilities and exploits that lead to enterprise data breaches and the latest tools and best practices for conducting incident response. Attendees will gain insight on how to find and fix the security vulnerabilities – before the attackers find them. They’ll learn state-of-the-art practices and techniques to protect data from ransomware, cyber extortion, and cloud-borne threats. Best of all, they’ll learn how to mitigate attacks and threats, so they don't result in a full-blown breach of valuable data.

Topics Include:
How to identify and remediate these weaknesses in your IT and cloud infrastructures.
Best practices for securing cloud-based accounts, identities, and stored data.
The most common vulnerabilities, missteps, and oversights that lead to cyberattacks, data compromise, and theft.
We will discuss the key steps in responding to a security incident, including a look at the role of emerging tools using AI.
And More!
Agenda
Keynote
11:00am - 11:45am ET

How and Why Data Breaches Occur

Sponsored by: Wiz

Many data breaches unfold when an attacker exploits a defender’s mistaken configuration or an unknown vulnerability in an IT or cloud infrastructure. In this keynote presentation, a top cybersecurity expert will explain the most common mistakes and holes that can lead to an attack, and how to identify and remediate these weaknesses in your IT and cloud infrastructures.

Fireside Chat
11:45am - 12:00pm ET

Networking Break
12:00PM – 12:15 PM

Keynote
12:15pm - 1:00pm ET

Real-World Data Breaches: An Inside View

Sponsored by: ExtraHop Networks

In this keynote address, a top security researcher will detail and analyze trends and takeaways from real-world data breaches investigated over the past year, pinpointing the most popular attack vectors and exploited vulnerabilities. The keynote also will cover best practices for defending against these attacks.

Fireside Chat
1:00pm - 1:15pm ET

Networking Break
1:15 PM - 1:30 PM

Spotlight Webinar
1:30pm - 2:00pm ET

Sponsored by: Wiz
Spotlight Webinar
1:30pm - 2:00pm ET

Sponsored by: ExtraHop Networks
Networking Break
2:00 PM - 2:15 PM

Panel Session
2:15pm - 3:00-pm ET

Rooting Out and Ridding Your Software of Security Vulnerabilities

Sponsored by: Backslash Security and Action1

Software vulnerabilities are at the core of most data breaches. These bugs can be in your third-party software or in your own internal applications. When software vendors regularly issue updates and patches, how do you know which ones to prioritize? How do you ensure your own development team is writing secure code? In this panel discussion, experts will discuss how to identify, assess, and prioritize the risk of an attacker exploiting the latest vulns in your systems. They will offer strategies for using DevSecOps for your internal apps as well as building a sound patching policy for your third-party software.

Networking Break
3:00 PM - 3:15PM

Panel Session
3:15pm - 4:00pm ET

Cloud Hacks Happen: How to Stop Them

Sponsored by: Delinea and Tenable

The shared security responsibility between cloud providers and their customers can cause confusion and, in some cases, breaches in the cloud environment when organizations miss or misconfigure security settings. In this panel discussion, cloud security experts will discuss how attackers can take advantage of those mistakes, as well as vulnerabilities in the cloud services themselves. They will provide guidance on how to avoid cloud misconfigurations and security missteps, as well as best practices for securing cloud-based accounts, identities, and stored data.

Networking Break
4:00PM - 4:15PM

Panel Session
4:15pm - 5:00pm ET

Incident Response: Navigating a Data Breach

That very bad, no-good data breach day hits your organization, so now what? In this panel discussion, experts in incident response will detail and discuss the key steps in responding to a security incident, including a look at the role of emerging tools using AI and automation, eXtendedDetection and Response (XDR), and other state-of-the art IR practices.

Demo
All Day

Demo
All Day

Demo
All Day

Demo
All Day

Anatomy of a Data Breach:

And What to Do if it Happens to You

June 18, 2025
11:00am -5:00pm ET | Doors Open at 10:30am ET

Speakers
Coming Soon
Sponsors
Diamond
Platinum
© 2025 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service