Anatomy of a Data Breach:

And What to Do if it Happens to You

June 20, 2024
11:00am - 5:00pm ET | Doors Open at 10:30am ET

As the saying goes, it's not a matter of “if” an organization will suffer a cyberattack: It's a matter of “when.”

That adage amid today’s active and increasingly aggressive threat landscape may seem overwhelming and disheartening, but knowing and addressing the most common attack vectors, vulnerabilities, and mistakes that threat actors exploit most in real-world attacks can make all the difference in mitigating a potentially disastrous ransomware attack or data breach. How do you ensure your organization is in the know about how most data breaches unfold, and is schooled on the best practices for responding to a security incident? Learn the most common causes and effects of a data breach and the keys to conducting an effective incident response in a new virtual event: Anatomy of a Data Breach: And What to Do if it Happens to You. This free, one-day online Dark Reading conference in June 2024 offers a look at some of the main vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.

Topics Include:
Pinpoint and remediate weaknesses in your IT and Cloud Infrastructures
Best practices for defending against data breaches
Strategies for using DevSecOps for internal apps
Guidance on how to avoid cloud misconfigurations and security missteps
A look at the role of emerging tools like AI and Automation, eXtendedDetection and Response (XDR) orchestration
Agenda
Keynote
11:00am - 11:45am ET

Missteps and Oversights That Leave Your Enterprise at Risk of a Cyberattack

Sponsored by: Wiz
Speaker(s): Brad Arkin, Chief Trust Officer, Salesforce
Moderated by: Fahmida Y Rashid, Managing Editor, Dark Reading

Many breaches occur when an attacker exploits a defender’s oversight or mistaken configuration, or an unknown vulnerability in an IT or cloud infrastructure. In this keynote presentation, a top cybersecurity expert will shine light on some of the most common mistakes and flaws that can lead to an attack, and how to pinpoint and remediate these weaknesses in your IT and cloud infrastructures.

Fireside Chat
11:45am - 12:00pm ET

Keynote
12:15pm - 1:00pm ET

Up Close: Real-World Data Breaches

Sponsored by: Palo Alto Networks
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

In this keynote address, a top security researcher will detail and analyze trends and takeaways from real-world data breaches investigated over the past year, pinpointing the most popular attack vectors and exploited vulnerabilities. The keynote also will cover best practices for defending against these attacks.

Fireside Chat
1:00pm - 1:15pm ET

Spotlight Webinar
1:30pm - 2:00pm ET

Spotlight Webinar
1:30pm - 2:00pm ET

Panel Session
2:15pm - 3:00-pm ET

Finding and Fixing Software Vulnerabilities That Endanger Your Data

Sponsored by: Mend.io | Security Innovation
Speaker(s): Ed Adams, Security Innovation, CEO

Software vulnerabilities are at the heart of a data breach. Those bugs can be in your third-party software or your own internal applications. When software vendors regularly issue updates and patches, how do you know which ones to prioritize? How do you ensure your own development team is writing secure code? In this panel discussion, experts will discuss how to identify, assess, and prioritize the risk of an attacker exploiting the latest vulns in your systems. They will offer strategies for using DevSecOps for your internal apps as well as building a sound patching policy for your third-party software.

Panel Session
3:15pm - 4:00pm ET

How Attackers Target the Cloud

Sponsored by: CardinalOps | Cisco

The acceleration to the cloud that began during the pandemic resulted in some misconfiguration mistakes in cloud services and accounts — as well as misunderstandings on just what security controls cloud customers were responsible for versus what their cloud provider handled. In this panel discussion, cloud security experts will outline how attackers can take advantage of those mistakes, as well as vulnerabilities in the cloud services themselves. They will provide guidance on how to avoid cloud misconfigurations and security missteps, as well as best practices for securing cloud-based accounts, identities, and stored data.

Panel Session
4:15pm - 5:00pm ET

Cyber Incident Response Guide: A How-To

Sponsored by: Delinea | Snowflake

Just because attackers are going to attack doesn’t mean defenders can’t fight back with a solid defense. There are powerful steps you can take to help ensure a security event doesn’t escalate, including proactive probing and detection of even the most well-hidden threats, and by employing mitigation methods. In this panel discussion, experts in incident response will offer a look at how best to respond to a security incident, including a look at the role of emerging tools such as AI and automation, eXtendedDetection and Response (XDR), orchestration, and state-of-the art IR practices.

Demo
All Day

On Demand Demo

Sponsored by: Rubrik
Demo
All Day

On Demand Demo

Sponsored by: NetWitness
Demo
All Day

Cyber Risk Management Product Tour

Sponsored by: LogicGate
Presented by: Sean McGovern, Senior Solutions Engineer, LogicGate
Demo
All Day

On Demand Demo

Sponsored by: CyberMaxx

Anatomy of a Data Breach:

June 20, 2024
11:00am - 5:00pm ET | Doors Open at 10:30am ET

Speakers
Sean McGovern
Senior Solutions Engineer, LogicGate
Sean McGovern is a Senior Solutions Engineer with over 5 years of GRC technology and consulting experience. After graduating from Syracuse University, he began his career with Ernst & Young’s Risk Transformation group and later worked for Deloitte’s Cyber Risk and Strategy practice.
Ed Adams
Security Innovation, CEO
Mr. Adams is a software quality and security expert with 20+ years of industry experience. He has been CEO of Security Innovation since 2003. A Ponemon Institute Research Fellow, Adams was named a Privacy by Design Ambassador by the Information & Privacy Commissioner of Canada and has received multiple SC Magazine Reboot Leadership Awards.
Brad Arkin
Chief Trust Officer, Salesforce
Brad is Chief Trust Officer at Salesforce. He oversees the company’s security strategy, building trust with stakeholders, and protecting customer data in an AI-first world. Previously, he was Chief Security and Trust Officer at Cisco, and served as the security chief at Adobe for 12 years.
Fahmida Y Rashid headshot
Fahmida Y Rashid
Managing Editor, Dark Reading
Fahmida Y Rashid is Dark Reading’s managing editor, focusing on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties.
Sponsors
Diamond
Platinum
Gold
© 2024 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service