Know Your Enemy:

Understanding Cybercriminals and Nation-State Threat Actors

November 14, 2024
11:00am – 5:00pm ET | Doors Open at 10:30am ET

The cat-and-mouse game between cyber attackers and defenders goes on every day.

But just who are the cyber attackers behind the nonstop attack campaigns and what is their endgame? What tactics and techniques do they employ and how could they be used against your organization? Which types of cyberattacks — and attackers — are most likely to target your organization, your users, and your data? In this November 2024 virtual event Know Your Enemy: Understanding Cybercriminals and Nation-State Threat Actors, attendees will learn about the latest and most prolific threat actors in cybercrime and cyber espionage, and how they target and infiltrate their victims — which could easily be their enterprise. In this free, all-day online event, experts will provide insight, advice, and best practices for securing enterprise — and ultimately, valuable data — from these attackers both in the cloud and on your network.

Topics Include:
Insight and guidance on how to harness threat intelligence data
Explain how this dark ecosystem operates and continues to grow and prosper
How to apply the findings and discoveries to shore up your defenses
Share the latest trends and operations of nation-state hacking groups
Agenda
Keynote
11:00am – 11:45am ET

Cybercrime Ecosystem: A Lucrative, Sophisticated Business Model

Sponsored by: Wiz
Speaker(s): Dr. Max Smeets, Senior Researcher, Center for Security Studies (CSS), ETH Zurich
Moderated by: Fahmida Y Rashid, Managing Editor, Dark Reading

Cybercrime has matured dramatically, with many cybercriminal groups now operating as well-organized business syndicates. Under the cover of the Dark Web marketplace, they offer cybercrime-as-a-service options such as turnkey ransomware services with customer service benefits. They sell pilfered enterprise credentials, malware, and other hacking services, and even scam and hack one another. In this keynote, an expert on cybercrime will explain how this dark ecosystem operates and continues to grow and prosper — and provide tips on how to protect your organization from this nefarious business model.

Fireside Chat
11:45am – 12:00pm ET

Speaker(s): Yotam Meitar, Cloud Detection & Response, Wiz
Keynote
12:15pm – 1:00pm ET

Meet the Top Nation-State Hacking Teams

Sponsored by: Google Cloud Security
Speaker(s): Costin G. Raiu, Independent Security Researcher & Founder, The Art of Noh
Moderated by: Kelly Jackson Higgins, Editor-in-chief, Dark Reading

China. Russia. Iran. North Korea. These are among the four most prolific and powerful nations with state-sponsored hacking teams that conduct cyber espionage of all flavors, from geopolitical and diplomatic spying to intellectual property theft. Some now even cross the line into cybercrime with ransomware, extortion, and data destruction attacks. Other nations are ramping up their hacking teams for their national interests as well, such as India and Vietnam. In this keynote, an expert on nation-state cyber operations will share the latest trends and operations of nation-state hacking groups and the threats they pose to businesses and organizations, large and small.

Fireside Chat
1:00pm – 1:15pm ET

Speaker(s): Ben Read, Head of Cyber Espionage Collection & Analysis, Mandiant Intelligence, part of Google Cloud
Spotlight Webinar
1:30pm – 2:00pm ET

Accelerate AI Innovation Securely with AI-SPM

Sponsored by: Wiz
Speaker(s): Shaked Rotlevi, PMM, Wiz

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it imperative for cloud security strategies to advance accordingly.
Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- AI-Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.

Spotlight Webinar
1:30pm – 2:00pm ET

The Keys to the Kingdom: Security and Governance for Generative AI - A Fireside Chat

Sponsored by: Google Cloud Security
Speaker(s): Muhammad Muneer, Principal Incident Response Consultant and global lead for Threat Hunting Program Development, Google Cloud Security

Ethical AI is the new code of conduct and we’re in the midst of an industrial revolution based on synthetic intelligence.

Panel Session
2:15pm – 3:00pm ET

How to Get the Most out of MITRE's ATT&CK Framework and Threat Data

Sponsored by: Delinea | CardinalOps
Panelists: Dylan Williams, Senior Information Security Analyst, Appian | Casey Knerr, Cybersecurity Engineer at MITRE, Enterprise Lead for MITRE ATT&CK | Kish Galappatti, Senior Sales Engineer, CardinalOps | Ariel Zaretsky, Senior Product Manager, Delinea
Moderated by: Tara Seals, Managing Editor for News, Dark Reading

There are numerous threat intelligence feeds and information about the latest threat groups, campaigns, and their tactics, techniques and procedures (TTPs) coming from security vendors as well as CISA. How do you know what threat intel is most applicable to your organization? How can you apply MITRE’s popular ATT&CK framework as part of your security architecture? In this panel discussion, experts will provide insight and guidance on how to harness threat intelligence data as well as the ATT&CK framework and weave them into your existing security tools and operations.

Panel Session
3:15pm – 4:00pm ET

Proactive Security as a Weapon

Sponsored by: CyberMaxx | Blue Mantis
Panelists: Zack Hoffman, Director of Professional Security Services, CyberMaxx | Larry Larsen, Manager, Standards Compliance & Authorizations, Navy Federal Credit Union | Elvia Finalle, Research analyst, Cybersecurity, Omdia | Jay Martin, CISO, Blue Mantis
Moderated by: Jai Vijayan, Contributing Writer, Dark Reading

Cybercrime and nation-state hacking teams continue to mature, evolve, and pivot in order to evade detection by security teams. For security operations teams, that means trying to stay a step ahead of the adversaries by ensuring you have visibility into all your devices, identities, and online assets, both in the network and in the cloud. It also calls for proactive security practices such as regular vulnerability scanning and penetration testing, and threat hunting by the security team or your security service provider. In this panel discussion, red-team experts share insights on how to execute these practices, the emerging technologies that support them, and how to apply the findings and discoveries to shore up your defenses.

Panel Session
4:15pm – 5:00pm ET

Master Class in Incident Response

Sponsored by: Palo Alto Networks
Panelists: Rob Lee, Chief of Research, SANS | Ed Dubrovsky, COO & Managing Partner, CYPFER | Chris Brewer, Consulting Director, Palo Alto Networks
Moderated by: Becky Bracken, Senior Editor, Dark Reading

Security teams today juggle dozens or more security tools – many of which are not well-integrated. Often, they don’t have the resources needed to fully realize all the features of the tools. This can impede a security team’s ability to respond fully and efficiently to a security incident. What can the cloud and AI do to streamline and empower security analysis? What types of processes and tools can help sift through this telemetry to ferret out actual threats or attacks? In this panel discussion, experts will discuss these issues and how SecOps teams can improve their detection and analysis of a security event before it becomes a major incident.

On Demand Demo
All Day

Minimizing the Attack Surface with Axonius

Presented by: James Flores, Technical Evangelist, Axonius

Minimizing the Attack Surface with Axonius

In today’s digital-first world, every asset, device, application, and user represents both an essential connection and a potential vulnerability. As organizations expand across a vast and complex web of interconnected systems, security teams are faced with a nearly impossible challenge: how to track every asset, identify risks, and confidently secure their entire digital ecosystem.

Join us for an insightful session where we break down how to manage and secure the ever-expanding attack surface. Discover how Axonius can help make actionable sense of your asset data—giving you a single source of truth to find, understand, and resolve exposure from every angle.

Key Takeaways:
• Understand what constitutes your full attack surface and why each element matters
• Learn strategies to track and evaluate assets in real-time across your organization
• Gain insights on how to centralize threat detection and prioritize risk remediation

See how Axonius empowers your security team to stay ahead of threats with a comprehensive, unified approach.

Know Your Enemy:

Understanding Cybercriminals and Nation-State Threat Actors

November 14, 2024
11:00am – 5:00pm ET | Doors Open at 10:30am ET

Speakers
James Flores
Technical Evangelist, Axonius
James Flores is a seasoned product marketing professional with extensive experience in cybersecurity and technology. With a career spanning over two decades, James has a deep understanding of the cybersecurity landscape, helping organizations drive growth through innovative marketing strategies and impactful storytelling.
Ariel Zaretsky
Senior Product Manager, Delinea
A seasoned Product Manager at Delinea, specializing in ITDR (Identity Threat Detection and Response) and CIEM (Cloud Infrastructure Entitlement Management). With a career marked by military leadership and entrepreneurial success, Ariel has developed a unique expertise in B2B SaaS product development within the cybersecurity domain.
Chris Brewer
Consulting Director, Palo Alto Networks
Chris Brewer, a director at Unit 42, is an expert in digital forensics and incident response who has over two decades of experience as an IT professional, with a focus on computer security, data centers, and servers. He is also an experienced IT security instructor who has taught at the National Computer Forensics Institute.
Jay Martin
CISO, Blue Mantis
Jay Martin serves as the Chief Information Security Officer (CISO) and Cybersecurity and Risk Advisory Lead for Blue Mantis. With nearly three decades of experience in business leadership and information security, Jay is recognized as a strategic cybersecurity expert.
Larry Larsen
Manager, Standards Compliance & Authorizations, Navy Federal Credit Union
Larry Larsen is a Manager with Navy Federal Credit Union’s Security Department, with over 25 years of experience in risk and compliance, cyber security operations and leadership, technical counterintelligence, and security investigations. He has received numerous awards and commendations for his work in these areas.
Casey Knerr
Cybersecurity Engineer at MITRE, Enterprise Lead for MITRE ATT&CK
Casey Knerr provides expertise updating the ATT&CK knowledge base with novel adversary techniques. Prior to joining MITRE, she worked as a penetration tester and completed a BSFS in Science, Technology, and International Affairs at Georgetown University and an MSc in Computer Science at the University of Oxford.
Dylan Williams
Senior Information Security Analyst, Appian
Blue teamer by trade, responsible for detection engineering, threat hunting, cloud forensics. Sharing practical advice on integrating LLMs into security operations, threat hunting, detection engineering.
Ben Read
Head of Cyber Espionage Collection & Analysis, Mandiant Intelligence, part of Google Cloud
Ben Read is the Head of Cyber Espionage Collection and Analysis at Mandiant Intelligence, part of Google Cloud. His team is responsible for tracking and reporting on state backed hackers from China, Russia, North Korea, Iran and many other countries. He was an analyst on the same team at iSIGHT Partners before it was acquired by FireEye.
Yotam Meitar
Cloud Detection & Response, Wiz
Yotam has spent the last ten years managing and responding to some of the most sophisticated global cyber operations. He’s worked with technical teams and executives to defeat attacks and leverage cyber as a competitive advantage across incident response, purple teaming, posture enhancements, and executive wargames.
Zack Hoffman
Director of Professional Security Services, CyberMaxx
With over a decade of cybersecurity experience, Zack Hoffman currently serves as Director of Professional Services, overseeing advanced security solutions and leading technical consulting teams. He has held leadership roles in cybersecurity operations, specializing in threat intelligence, detection engineering, and managing global teams.
Dr. Max Smeets
Senior Researcher, Center for Security Studies (CSS), ETH Zurich
Dr. Max Smeets is a leading expert in the field of cyber conflict, cyber risk, and ransomware. His upcoming book, Ransom War: How Cyber Crime Became a Threat to National Security, examines the escalating threat of ransomware. He is also the author of No Shortcuts: Why States Struggle to Develop a Military Cyber Force.
Costin G. Raiu
Independent Security Researcher & Founder, The Art of Noh
Costin Raiu is a cyber paleontologist and researcher specializing in analyzing advanced persistent threats and high-level malware attacks. He was most recently the director of GReAT, the team that researched the inner workings of Stuxnet, Flame, Duqu, Turla, Lazarus, Moonlight Maze or the Equation Group.
Ed Dubrovsky
COO & Managing Partner, CYPFER
Over the past three decades, Ed Dubrovsky’s name has been synonymous with information security, Cyber breach response, risk management, cyber education and entrepreneurship. As a practitioner and management executive (COO and CISO), he as built and led several cyber consulting practices.
Rob Lee
Chief of Research, SANS
Rob Lee is the Chief of Research and Head of Faculty at SANS Institute and runs his own consulting business specializing in information security, incident response, threat hunting, and digital forensics. Rob has more than 20 years of experience in digital forensics, vulnerability and exploit discovery, intrusion detection/prevention, and more.
Muhammad Muneer
Principal Incident Response Consultant and global lead for Threat Hunting Program Development, Google Cloud Security
With extensive experience in incident response, compromise assessments, and threat hunting, Muhammad guides organizations through cybersecurity crises and proactively identifies emerging threats. His leadership extends to developing and transforming security programs, specializing in incident response preparedness, ransomware defense, and more.
Jai Vijayan
Contributing Writer, Dark Reading
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism covering information security and data privacy. Over the course of his career, Jai has also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics.
Shaked Rotlevi
PMM, Wiz
Shaked Rotlevi is a Technical Product Marketing Manager at Wiz based in San Diego, California.
Kish Galappatti
Senior Sales Engineer, CardinalOps
Kish Galappatti, Senior Sales Engineer at CardinalOps is a data security professional with over 20 years experience implementing cybersecurity and data privacy solutions for enterprise clients. Kish has a background in the financial services industry where he built large scale distributed systems.
Elvia Finalle
Senior Security Operations Analyst; Analyst, Cybersecurity
Elvia is an experienced analyst in Omdia’s cybersecurity team covering various market areas with a demonstrated history of working in the management consulting industry. Her specialized coverage includes SecOps and enterprise awareness training. Elvia has been creating databases, analyzing market trends, and generating forecasts for over five years
Amitai Cohen
Threat Researcher, Wiz
Amitai leads the Attack Vector Intelligence team at Wiz, where he manages investigations of threats to cloud environments and works to advance research and detection methodology. Amitai is also a maintainer of the cloudvulndb.org open-source project, and co-hosts the "Crying out Cloud" podcast.
Becky Bracken
Senior Editor, Dark Reading
Becky Bracken has built a decades-long journalism career with a focus on cybersecurity issues and serves as an editor for Dark Reading.
Tara Seals
Managing Editor, News, Dark Reading
Tara Seals has 25+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine.
Fahmida Y Rashid headshot
Fahmida Y Rashid
Managing Editor, Dark Reading
Fahmida Y Rashid is Dark Reading’s managing editor, focusing on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties.
Sponsors
Diamond
Platinum
Gold
© 2024 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service