Know Your Enemy:
Understanding Cybercriminals and Nation-State Threat Actors
But just who are the cyber attackers behind the nonstop attack campaigns and what is their endgame? What tactics and techniques do they employ and how could they be used against your organization? Which types of cyberattacks — and attackers — are most likely to target your organization, your users, and your data? In this November 2024 virtual event Know Your Enemy: Understanding Cybercriminals and Nation-State Threat Actors, attendees will learn about the latest and most prolific threat actors in cybercrime and cyber espionage, and how they target and infiltrate their victims — which could easily be their enterprise. In this free, all-day online event, experts will provide insight, advice, and best practices for securing enterprise — and ultimately, valuable data — from these attackers both in the cloud and on your network.
Cybercrime Ecosystem: A Lucrative, Sophisticated Business Model
Cybercrime has matured dramatically, with many cybercriminal groups now operating as well-organized business syndicates. Under the cover of the Dark Web marketplace, they offer cybercrime-as-a-service options such as turnkey ransomware services with customer service benefits. They sell pilfered enterprise credentials, malware, and other hacking services, and even scam and hack one another. In this keynote, an expert on cybercrime will explain how this dark ecosystem operates and continues to grow and prosper — and provide tips on how to protect your organization from this nefarious business model.
Meet the Top Nation-State Hacking Teams
China. Russia. Iran. North Korea. These are among the four most prolific and powerful nations with state-sponsored hacking teams that conduct cyber espionage of all flavors, from geopolitical and diplomatic spying to intellectual property theft. Some now even cross the line into cybercrime with ransomware, extortion, and data destruction attacks. Other nations are ramping up their hacking teams for their national interests as well, such as India and Vietnam. In this keynote, an expert on nation-state cyber operations will share the latest trends and operations of nation-state hacking groups and the threats they pose to businesses and organizations, large and small.
Accelerate AI Innovation Securely with AI-SPM
As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly.
Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- AI-Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.
The Keys to the Kingdom: Security and Governance for Generative AI - A Fireside Chat
Ethical AI is the new code of conduct and we’re in the midst of an industrial revolution based on synthetic intelligence.
How to Get the Most out of MITRE's ATT&CK Framework and Threat Data
There are numerous threat intelligence feeds and information about the latest threat groups, campaigns, and their tactics, techniques and procedures (TTPs) coming from security vendors as well as CISA. How do you know what threat intel is most applicable to your organization? How can you apply MITRE’s popular ATT&CK framework as part of your security architecture? In this panel discussion, experts will provide insight and guidance on how to harness threat intelligence data as well as the ATT&CK framework and weave them into your existing security tools and operations.
Proactive Security as a Weapon
Cybercrime and nation-state hacking teams continue to mature, evolve, and pivot in order to evade detection by security teams. For security operations teams, that means trying to stay a step ahead of the adversaries by ensuring you have visibility into all your devices, identities, and online assets, both in the network and in the cloud. It also calls for proactive security practices such as regular vulnerability scanning and penetration testing, and threat hunting by the security team or your security service provider. In this panel discussion, red-team experts share insights on how to execute these practices, the emerging technologies that support them, and how to apply the findings and discoveries to shore up your defenses.
Master Class in Incident Response
Security teams today juggle dozens or more security tools – many of which are not well-integrated. Often, they don’t have the resources needed to fully realize all the features of the tools. This can impede a security team’s ability to respond fully and efficiently to a security incident. What can the cloud and AI do to streamline and empower security analysis? What types of processes and tools can help sift through this telemetry to ferret out actual threats or attacks? In this panel discussion, experts will discuss these issues and how SecOps teams can improve their detection and analysis of a security event before it becomes a major incident.
Minimizing the Attack Surface with Axonius
Minimizing the Attack Surface with Axonius
In today’s digital-first world, every asset, device, application, and user represents both an essential connection and a potential vulnerability. As organizations expand across a vast and complex web of interconnected systems, security teams are faced with a nearly impossible challenge: how to track every asset, identify risks, and confidently secure their entire digital ecosystem.
Join us for an insightful session where we break down how to manage and secure the ever-expanding attack surface. Discover how Axonius can help make actionable sense of your asset data—giving you a single source of truth to find, understand, and resolve exposure from every angle.
Key Takeaways:
• Understand what constitutes your full attack surface and why each element matters
• Learn strategies to track and evaluate assets in real-time across your organization
• Gain insights on how to centralize threat detection and prioritize risk remediation
See how Axonius empowers your security team to stay ahead of threats with a comprehensive, unified approach.
Know Your Enemy:
Understanding Cybercriminals and Nation-State Threat Actors