Cybersecurity’s Hottest New Technologies:

What You Need to Know

March 21, 2024
11:00am - 5:00pm ET | Doors Open at 10:30am ET

ChatGPT opened the AI floodgates for both threat actors and defenders to up their game. At the same time, cloud-based applications and services are gradually becoming the norm for many organizations.

These seismic shifts in cybersecurity will shape the face of zero-day attacks, ransomware, and supply chain compromises, leaving security teams wondering if their existing defenses can hold up against a new wave of threats powered by AI and new cloud-borne and cloud-targeted attacks.

Join us March 21, 2024, as we discuss some of the most promising emerging cybersecurity technologies and how you can adopt them into your organizations.

Topics Include:
Tips and Recommendations for determining the best technologies for your enterprise
Integrating emerging technologies with existing IT security environments
Handling the new landscapes created by Generative AI
Managing the threat of identity compromise in the cloud
The changing ways of analyzing threat data and events
Agenda
Keynote
11:00am – 11:45am

Game-Changing Cybersecurity Technologies

Sponsored by: Wiz
Speaker(s): Alberto Yepez, Managing Director, Forgepoint Capital | Nicolas Ehrman, Product Marketing, Wiz
Moderated by: Fahmida Y Rashid, Managing Editor, Dark Reading

Some 3,500 cybersecurity vendors and service providers are regularly rolling out new products and services. In this keynote address, a top security technology expert goes beyond the hype and highlights some of the newest technologies and trends and offers tips and recommendations on how to determine which security technologies can best help you secure your enterprise in 2024.​

Keynote
12:15pm – 1:00pm

A CISO’s Guide to Next-Generation Cyber Defenses​

Sponsored by: Palo Alto Networks
Speaker(s): Rinki Sethi, CISO, Bill.com | Yoni Allon, Vice President of Research, Cortex at Palo Alto Networks
Moderated by: Kelly Jackson-Higgins, Editor-in-Chief, Dark Reading

Fresh new cybersecurity technologies can be exciting and promising, but the reality is that organizations still face challenges blending new tools and approaches with existing security technologies that can’t simply be ripped out and replaced. In this keynote address, an experienced security practitioner offers insights for chief information security officers (CISOs) into how to integrate some of the hottest emerging technologies and disciplines into an existing IT security environment to ensure a smooth shift to a stronger defense.​

Spotlight Webinar
1:30pm – 2:00pm

The AI Security Series: The State of AI in the Cloud 2024

Sponsored by: Wiz

Over the past year and a half, generative AI has seen explosive growth among both end-users and businesses. But at what rate?

In this webinar, Wiz Threat Researcher, Amitai Cohen, will delve into the data and analysis of over 150,000+ cloud accounts to share what they’ve learned, including:

  • The breakdown of generative AI’s impact on the cloud landscape
  • Statistics on the surge of AI services across major cloud providers
  • What this means to you: Rising costs and new security concerns

No fluff, just practical insights for a successful and secure AI integration in your cloud strategy.

Spotlight Webinar
1:30pm – 2:00pm

A Leader's Guide to Security Operations: Improve Productivity With Threat Intelligence and Automation

Sponsored by: Palo Alto Networks

In The 2021 State of Enterprise Breaches, Forrester found that enterprises spend a median of 37 days and a mean of $2.4 million to find and recover from a breach.

Ensure your team is prepared for advanced threat actors. Join this fireside chat with Niall Browne, CISO at Palo Alto Networks, and guest speaker Allie Mellen, senior analyst at Forrester.

They’ll candidly discuss digital transformation, SOC automation and tactical security operations. Forrester recommends that security leaders advocate investment in digital transformation. This will help organizations be more adaptable while focusing on data and metrics to uncover prevalent attack vectors.

Tune in to hear their unique perspectives on:

  • The critical issues they see today in the SOC.
  • How security leaders can successfully incorporate threat intelligence.
  • Strategic technology upgrades to prioritize for digital and SOC transformation.
  • What they predict to be the biggest shifts in SecOps.
Panel
2:15pm - 3:00pm

The Promise and Perils of AI​

Sponsored by: KnowBe4 | Snyk
Panelists: Jutta Williams, Senior Director of Security, Privacy and Compliance Engineering, Reddit | Dane Sherrets, Senior Solutions Architect, HackerOne | James McQuiggan, Security Awareness Advocate, KnowBe4 | Sonya Moisset, Senior Security Advocate
Moderated by: Tara Seals, Managing Editor, News, Dark Reading

Generative AI – starting with the arrival of ChatGPT early last year — hit the security sector like no other technology, putting powerful artificial intelligence tools in the hands of everyone nearly overnight. Suddenly organizations were faced with employees inadvertently exposing and leaking sensitive company data, as well as concerns over threat actors advancing and automating their attacks using AI. In this panel discussion, experts will explain how to protect your organization from internal mishandling of the technology, and from a new generation of AI-powered cyberattacks. You will learn how to harness AI for good as a security tool, for both your secure application development (DevSecOps) and SecOps teams.​

Panel
3:15pm - 4:00pm

Managing & Securing Identities in the Cloud​

Sponsored by: Gem | Reveal
Panelists: Zack Glick, CTO, Zatik Security | Teresa Wu, Chair of the Steering Committee, Identity and Access Forum | Ron Konigsberg, CTO & Co-Founder, Gem Security | Adam Koblentz, Field CTO, Reveal Security
Moderated by: Fahmida Y Rashid

A core element of a cloud security strategy is effectively managing and tracking user and machine identities—and activity—in the cloud. That includes human, machine, vendor, and service provider identities in cloud infrastructure and platform services, and entails managing and protecting identities. In this panel discussion, experts will discuss the threat of identity compromise in the cloud, as well as best practices, tools, and technologies that can help enterprises keep them secure. ​

Panel
4:15pm - 5:00pm

Next-Gen SecOps

Sponsored by: CardinalOps | Torq
Panelists: John Hubbard, SANS Senior Instructor, SOC Consultant, and Speaker | Allie Mellen, Principal Analyst, Forrester | Jay Lillie, Vice President for Customer Success, CardinalOps | Leonid Belkind, Co-Founder & CTO, Torq
Moderated by: Becky Bracken, Editor, Dark Reading

The security operations center (SOC) is evolving, driven by cloud-based managed services and tools that automate — and decentralize — the team tasked with defending a far-flung enterprise infrastructure. How do you build out a modern SecOps team and which technologies should you adopt to drive it? In this panel discussion, experts explain how orchestration, eXtended Detection and Response (XDR), and AI are changing the way security teams collect and analyze threat data and events. In addition you will learn how to streamline your security tools with new technologies that advance the security of your enterprise. ​

Demo
All Day

On Demand Demo

Sponsored by: Hive Pro
Presented by: Zaira Pirzada, Vice President of Product Marketing, Hive Pro
Demo
All Day

The Future of Cyber Defense: Continuous Threat Exposure Management (CTEM)

Sponsored by: Hive Pro
Presented by: Zaira Pirzada, Vice President of Product Marketing, Hive Pro

Cyber adversaries are intensifying their attacks, employing greater volumes and sophistication. In response, cyber defenders need a forward-looking strategy that empowers them to outmaneuver these threats and enhance cyber resilience. The traditional approach of playing catch-up in this cat-and-mouse game results in diagnostic fatigue, escalated costs, and inefficient risk management. Continuous Threat Exposure Management (CTEM) offers a solution, providing a proactive and comprehensive framework to effectively manage and mitigate cyber risks. This session will explore the inception of CTEM, highlighting how it advances beyond conventional attack surface and vulnerability management by integrating threat intelligence, risk prioritization algorithms, breach and attack simulation, and improved exposure visibility. CTEM is poised to revolutionize cybersecurity strategies, shifting the focus from reactive measures to proactive, strategic defense against evolving cyber challenges.

Demo
All Day

Orca AI Security

Sponsored by: Orca
Presented by: Neil Carpenter, Field CTO, Orca Security

Securing AI Models from Development to Production.

Demo
All Day

Orca Security: Cloud to Dev

Sponsored by: Orca
Presented by: Shai Alon, Director of AI Innovation, Orca Security

Cybersecurity’s Hottest New Technologies:

What You Need to Know

March 21, 2024
11:00am - 5:00pm ET | Doors Open at 10:30am ET

Speakers
Coming Soon
Sponsors
Diamond
Platinum
Gold
© 2025 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service