How Data
Breaches Happen

And What to Do When They Happen to You

June 23, 2022
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST

A full-day virtual event on the vulnerabilities that lead to security incidents - and how to respond in the event of a data breach.

Every day, the headlines are filled with news of major enterprises being hacked or infected with ransomware. From supply chain attacks such as SolarWinds or Kaseya to critical infrastructure breaches such as Colonial Pipeline, it seems that no organization is safe from cyber breaches. Is your organization ready to respond when it happens to you?

On June 23, Dark Reading will host a free, all-day virtual event will look at some of the most common vulnerabilities that lead to enterprise data breaches, as well as the latest tools and best practices for incident response.

If you are looking for the latest strategies and practices for preventing cyber breaches -- and how to respond when they happen -- then this virtual event is for you.

Topics Include:
An in-depth look at how major data breaches occur, and what vulnerabilities they exploit
Tips and recommendations for finding and fixing security vulnerabilities in your own IT environment
Methods for detecting a new incursion, even when it is well hidden or obfuscated
Critical actions to take when you suspect your data has been compromised
And much more!
Agenda
Keynote
11:00 AM – 12:00 PM ET

Common Cybersecurity Missteps That Leave Your Enterprise Open to Attack

Sponsored by: Palo Alto Networks
Presented by: Matt Gorham, Senior Managing Director, PwC’s Cyber, Risk, and Regulation Practice
Moderated by: Kelly Jackson Higgins

Major data breaches happen, and often they are the result of an oversight or unknown vulnerability in an IT infrastructure that attackers spot and exploit first. In this keynote presentation, a top cybersecurity expert will shine light on some of the most common security mistakes that can lead to an attack and how to find and fix these weaknesses in your IT infrastructure.

Keynote
12:30 PM - 1:30 PM ET

Real-World Data Breaches: A Look at the Trends

Sponsored by: KnowBe4
Presented by: Alex Pinto, Principal Author of the Verizon Data Breach Investigations Report
Moderated by: Fahmida Y Rashid

In this keynote address, a top security researcher will detail and analyze the common findings and trends in real-world data breaches of the past year – including the most popular attack vectors, exploited vulnerabilities – and the best practices for thwarting these attacks in the future.

Panel
2:15 PM – 3:00 PM ET

How to Protect Your Endpoints From Getting Weaponized by Attackers

Sponsored by: CardinalOps, CyberArk

The endpoint is often the focus of the first stage in a cyberattack, as attackers attempt to gain a foothold in their targets, via phishing or other nefarious means. How can you assess and ensure your users’ devices are secured and the state of your risk posture to attacks? What can you do to understand and best decide how to best protect them from attackers looking for a foothold in your network? In this panel discussion, experts in endpoint security will provide insight into threats to the endpoint and how best to protect these devices – and your user accounts – from becoming pawns in a cyberattack.

Panel
3:15 PM – 4:00 PM ET

Finding and Fixing Security Vulnerabilities That Put Your Data in Danger

Sponsored by: Dashlane, Bishop Fox

Software vendors are constantly issuing patches and updates to their products. Not all vulnerabilities are critical, so how do you assess and prioritize your risk of an attacker exploiting them in your servers, endpoints, and network systems? In this panel discussion, experts will offer recommendations for pinpointing the security flaws that put your data at risk and provide insight on how to establish a sound patching policy that includes risk assessment and ensures solid security posture.

Panel
4:15 PM - 5:00 PM ET

What to Do in a Cyber Incident: A Guide to Incident Response

Sponsored by: CyCognito, Mandiant

No organization is immune to cyber threats and attack attempts, but there are some key steps, strategies, and technologies, to help ensure a security event doesn’t escalate, including proactive threat hunting, detection of even the most well-hidden threats, and mitigation methods. What actions should you take if you think your data has been compromised? In this panel discussion, experts in incident response will offer a look at how best to respond to a security incident, including a look at the role of new tools such as eXtendedDetection and Response (XDR) and state-of-the art IR practices.

Demo
Available ALL DAY on Demand

Ignorance of Passwords is Bliss: How to Reduce Headaches for Your Team

Sponsored by: 1Password

How Data
Breaches Happen

June 23, 2022
11:00 AM – 5:15 PM EST | 8:00 AM – 2:15 PM PST

Speakers
Tiago Henriques
Director of Engineering for Security, Coalition
Tiago Henriques has had a rich career across the cybersecurity industry as an entrepreneur, CEO, pen tester, security analyst and auditor. In 2015 he founded BinaryEdge, a cybersecurity company specializing in enterprise infrastructure scanning and attack surface management.
Alex Hoffman
Sales Engineer, 1Password
Alex has been part of 1Password since 2013 and has held many roles in the company over that time. He previously led customer support for the Windows app, as well as playing a formative influence on 1Password's business development team.
Ori Zigindere
Ori Zigindere, Director of COSMOS Operations, Bishop Fox
Ori works with a wide range of companies in all major industries and leads a team that helps them improve their security posture against day to day threats. Ori believes in the value of privacy and security and helps both individuals and organizations to improve their understanding of these topics.
Cyril Leclerc
Head of Security, Dashlane
Cyril Leclerc has been a security expert, hacker, and auditor for more than two decades. He’s exploited or helped fix thousands of vulnerabilities across years, from little startups to big international companies or public entities (Software edition, Banking/Assurances, Oil & Gas, Telecommunications, Internet, Health, etc.).
Preston Miller
Consulting Director, Palo Alto Networks | Unit 42
Preston Miller, a Director at Unit 42, is an accomplished cybersecurity professional with deep subject matter expertise in digital forensics and incident response. He is experienced in leading dynamic teams in high-level and complex investigations.
Kevin Greene
Security Strategist, CyberRes Federal
Kevin Greene is a thought leader in the area of software security assurance with over 20+ years of experience in cybersecurity as a security expert, hacker, researcher and engineer. Kevin believes that software security is our first line of defense in mitigating cyber attacks.
Alex Zaslavsky
Senior Product Manager, CyCognito
Alex Zaslavsky, Senior Product Manager, has more than 15 years of infosec experience working on data analytics, system development, architecture and technical product management, in addition to being a veteran of the 8200 unit.
Tanisha Turner
Security Engineer, Elastic
Tanisha is an experienced cyber security professional with extensive knowledge of information security, malware analysis, penetration testing, and database systems such as Oracle.
Jessica Sica
CISO, Petco Animal Supplies
Jessica has 20 years of experience in Information Security across various sectors including banking, pet, semiconductor, entertainment and retail. She is currently CISO for Petco Animal Supplies where she is in charge of all things information security and compliance.
Becky Bracken
Editor, Dark Reading
Becky Bracken has built a decades-long journalism career with a focus on cybersecurity issues and serves as an editor for Dark Reading.
Tara Seals
Managing Editor, News, Dark Reading
Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine.
Linnie Meehan
Threat Hunter, Deepwatch
Linnie Meehan serves as a Threat Hunter at Deepwatch. Her nearly decade-long time in Cybersecurity includes previous roles as a Cybersecurity Analyst and Threat Analyst from mid-size domestic companies to world-wide organizations.
Len Noe
Technical Evangelist and White Hat Hacker, CyberArk Software
Len Noe is a Technical Evangelist and White Hat Hacker CyberArk Software. Len is an international security speaker has presented in over 29 countries and at multiple major security conferences worldwide. Prior to 2001 Len was a Black/Grey Hat Hacker and learned most of his skills by practical application.
Phil Neray
Phil Neray
VP of Cyber Defense Strategy, CardinalOps
With 20+ years of cybersecurity experience, Phil comes to CardinalOps from Microsoft Security, which he joined after the acquisition of CyberX, an early innovator in IoT/OT security monitoring. He previously held executive roles at IBM Security/Q1 Labs, Guardium (acquired by IBM), Veracode, and Symantec.
Jeremy Koppen Headshot
Jeremy Koppen
Director of Consulting for the Americas, Mandiant
Jeremy Koppen is Director in Mandiant’s Alexandria, VA, office with over ten years of experience in programming, computer hardware, cybercrime investigations, computer forensics, and information security. Mr. Koppen’s primary responsibilities include leading and delivering incident response engagements as well as performing forensic analysis.
Fahmida Y Rashid headshot
Fahmida Y Rashid
Managing Editor, Dark Reading
Fahmida Y Rashid is Dark Reading’s managing editor, focusing on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties.
Alex Pinto Headshot
Alex Pinto
Principal Author of the Verizon Data Breach Investigations Report
Alex Pinto is the senior manager of the Verizon DBIR team. His team is responsible not only for the Verizon Data Breach Investigations Report, but for security research and thought leadership for all the Verizon Business Security Products organization.
Matt Gorham, Senior Managing Director
Matt Gorham
Senior Managing Director, PwC’s Cyber, Risk, and Regulation Practice
Matt Gorham currently serves as a Senior Managing Director with PwC’s Cyber, Risk, and Regulation Practice. Prior to his current role, he had a twenty-five year career with the Federal Bureau of Investigation.
 Perry Carpenter
Chief Evangelist and Strategy Officer, KnowBe4
Perry Carpenter is the Chief Evangelist and Strategy Officer at KnowBe4. Formerly, Carpenter led security awareness, security culture management, and anti-phishing behavior management research at Gartner Research, in addition to covering areas of IAM strategy, CISO Program Management mentoring, and Technology Service Provider success strategies.
Sponsors
Diamond
Platinum
© 2024 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service