Think Like an Attacker:

Understanding Cybercriminals and Nation-State Threat Actors

November 16, 2023
11:00AM – 5:00PM ET | Doors open at 10:30AM ET

A full-day virtual event that provides insight on today’s cyber adversaries, their techniques, tools, and how to thwart them

Cyberattacks continue nonstop. But just who are the cyber attackers behind these campaigns and what is their endgame? What tactics and techniques do they employ and how could they be used against your organization? Which types of attacks – and attackers – are most likely to target your organization and its data?

In this Q4 2023 virtual event produced by Dark Reading, Think Like an Attacker: Understanding Cybercriminals and Nation-State Threat Actors, you’ll learn about the latest and most prolific threat actors in cybercrime and cyber espionage, and how they could target your enterprise. In this free, all-day online event, experts will provide insight, advice, and best practices for securing your enterprise – and ultimately, your valuable data – from these attackers. Among other things, you’ll learn how to gather intelligence on current threats and adversaries – and then how you can use that information to secure your network.

Topics Include:
A look at some of the most infamous threat groups and their main goals for hacking organizations like yours
Their tactics and techniques -- and how that can inform your defenses
Best practices for applying threat intelligence to your security posture
Recommendations for thinking like an attacker in order to test your defenses from their threats
Other proactive security methods such as threat hunting, vulnerability scanning, and penetration testing to identify and stop attackers before they infiltrate your IT infrastructure
Agenda
Keynote
11:00AM - 11:45AM ET

The Cybercrime Ecosystem

Sponsored by: Wiz
Speaker(s): Brandon Levene, Adjunct Professor, Johns Hopkins School of Advanced International Studies
Moderated by: Fahmida Y Rashid, Managing Editor, Dark Reading

As cybercrime pervades, some cybercriminal groups have evolved into well-organized syndicates operating as a business. The Dark Web underground is the marketplace where they make deals, share malware and stolen data, and even double-cross or hack one another. In this keynote, an expert on cybercrime will explain how this dark ecosystem operates and continues to grow and prosper — and provide tips on how to protect your organization from them.

Fireside Chat
11:45AM - 12:00PM ET

Fireside Chat with Wiz

Sponsored by: Wiz
Speaker(s): Jeff Morgan, Enterprise Solutions Engineer, Wiz
Moderated by: Fahmida Y Rashid, Managing Editor, Dark Reading
Keynote
12:15PM - 1:00PM ET

Nation-State Hacking Teams

Sponsored by: Mandiant (now part of Google Cloud)
Speaker(s): Amy Chang, Senior Fellow, Cybersecurity and Emerging Threats, R Street Institute
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

China. Russia. Iran. North Korea. These are among the most prolific and powerful nations with state-sponsored hacking teams that conduct cyber espionage of all flavors, from geopolitical and diplomatic spying to intellectual property theft, and even the most egregious data destruction attacks that cross the line into cybercrime. But many other nations are ramping up their hacking teams for their national interests as well. In this keynote, an expert on nation-state cyber operations will provide insight into the latest trends and operations of nation-state hackers and the threats to businesses and organizations big and small.

Fireside Chat
1:00PM - 1:15PM ET

Fireside Chat with Mandiant (now part of Google Cloud)

Sponsored by: Mandiant (now part of Google Cloud)
Speaker(s): Nader Zaveri, Senior Manager, Incident Response & Remediation Mandiant, Google Cloud
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Panel
2:15PM - 3:00PM ET

How to Get the Most out of Threat Intelligence Data

Sponsored by: Analyst1 | Mandiant (now part of Google Cloud)
Panelists: Elvia Finalle, John Bambenek, Eddie Mitchell, Nader Zaveri
Moderated by: Tara Seals

Various threat intelligence feeds are integrated into many security tools and services, and there are multiple open-source feeds as well, so how do you sift through this data to find the most applicable to your organization? What are some of the best resources for understanding threat groups and the latest attack campaigns? How do you weave threat intel data into your existing security tools and security operations? In this panel discussion, experts will provide insight and guidance on how to manage the deluge of threat intel and use it as a key strategic tool for your security posture.

Panel
3:15PM - 4:00PM ET

Proactive Security Measures for Thwarting Cyber Adversaries

Sponsored by: CardinalOps | CyberArk
Panelists: Andrew Braunberg, Shawn Duffy, Andy Thompson, Jay Lillie
Moderated by: Karen Spiegelman

Cybercrime and nation-state hacking teams continue to hone their skills and methods in order to remain under the radar. That calls for more forward-thinking, proactive security defenses with the goal of staying ahead of the attackers, such as regular vulnerability scanning and penetration testing of IT infrastructure, and threat hunting by the security team or your security service provider. Threat hunting and red-team experts will share insights on how to execute such proactive security practices, the emerging technologies that support them, and how to use the results they unearth to shore up defenses in your internally developed applications and third-party applications and systems in your network.

Panel
4:15PM - 5:00PM ET

Security Alerts: Isolating the Needle in the Haystack

Sponsored by: KnowBe4 | Palo Alto Networks
Panelists: Jessica Sica, Eric Parizo, Joanna Huisman, Greg Smith,
Moderated by: Becky Bracken

Many enterprises have dozens or more security tools, many of which aren’t well-integrated, nor even fully deployed due to a saturation of tools, events, and security team shortages and turnover. What types of processes and tools can help sift through this telemetry to ferret out the real events that point to a live attack? What can machine learning and artificial intelligence do to streamline and empower security analysis? In this panel discussion, experts will analyze the challenges security analysts face every day and how to improve the detection and analysis of events.

Demos
All Day

Panoptica - A Brief Introduction

Sponsored by: Cisco (Panoptica)
Presented by: Tim Miller, Technical Marketing Engineer, Outshift by Cisco

Lacework - Data-driven Cloud Security at Scale

Sponsored by: Lacework
Presented by: Brendan Till, Sales Manager, Lacework

Focusing on The Threats That Matter Most with Interpres Security

Sponsored by: Interpres Security
Presented by: Mike Persechini, Senior Vice President of Sales, Interpres Security

EDR Demo - Complete Protection for Businesses with Acronis Cyber Protect

Sponsored by: Acronis
Presented by: J.D. Perham, Solutions Architect, Acronis

Think Like an Attacker:

Understanding Cybercriminals and Nation-State Threat Actors

November 16, 2023
11:00AM – 5:00PM ET | Doors open at 10:30AM ET

Speakers
Coming Soon
Sponsors
Diamond
Platinum
Gold
© 2025 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service