How Data
Breaches Happen
And What to Do When They Happen to You
Every day, the headlines are filled with news of major enterprises being hacked or infected with ransomware. From supply chain attacks such as SolarWinds or Kaseya to critical infrastructure breaches such as Colonial Pipeline, it seems that no organization is safe from cyber breaches. Is your organization ready to respond when it happens to you?
On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.
If you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you.
Common Cybersecurity Missteps That Leave Your Enterprise Open to Attack
Major data breaches happen, and often they are the result of an oversight or unknown vulnerability in an IT infrastructure that attackers spot and exploit first. In this keynote presentation, a top cybersecurity expert will shine light on some of the most common security mistakes that can lead to an attack and how to find and fix these weaknesses in your IT infrastructure.
Real-World Data Breaches: A Look at the Trends
In this keynote address, a top security researcher will detail and analyze the common findings and trends in real-world data breaches of the past year – including the most popular attack vectors, exploited vulnerabilities – and the best practices for thwarting these attacks in the future.
How to Protect Your Endpoints From Getting Weaponized by Attackers
The endpoint is often the focus of the first stage in a cyberattack, as attackers attempt to gain a foothold in their targets, via phishing or other nefarious means. How can you assess and ensure your users’ devices are secured and the state of your risk posture to attacks? What can you do to understand and best decide how to best protect them from attackers looking for a foothold in your network? In this panel discussion, experts in endpoint security will provide insight into threats to the endpoint and how best to protect these devices – and your user accounts – from becoming pawns in a cyberattack.
Finding and Fixing Security Vulnerabilities That Put Your Data in Danger
Software vendors are constantly issuing patches and updates to their products. Not all vulnerabilities are critical, so how do you assess and prioritize your risk of an attacker exploiting them in your servers, endpoints, and network systems? In this panel discussion, experts will offer recommendations for pinpointing the security flaws that put your data at risk and provide insight on how to establish a sound patching policy that includes risk assessment and ensures solid security posture.
What to Do in a Cyber Incident: A Guide to Incident Response
No organization is immune to cyber threats and attack attempts, but there are some key steps, strategies, and technologies, to help ensure a security event doesn’t escalate, including proactive threat hunting, detection of even the most well-hidden threats, and mitigation methods. What actions should you take if you think your data has been compromised? In this panel discussion, experts in incident response will offer a look at how best to respond to a security incident, including a look at the role of new tools such as eXtendedDetection and Response (XDR) and state-of-the art IR practices.
Ignorance of Passwords is Bliss: How to Reduce Headaches for Your Team