Think Like an Attacker:

Understanding Cybercriminals and Nation-State Threat Actors

November 16, 2023
11:00AM – 5:00PM ET | Doors open at 10:30AM ET

A full-day virtual event that provides insight on today’s cyber adversaries, their techniques, tools, and how to thwart them

Cyberattacks continue nonstop. But just who are the cyber attackers behind these campaigns and what is their endgame? What tactics and techniques do they employ and how could they be used against your organization? Which types of attacks – and attackers – are most likely to target your organization and its data?

In this Q4 2023 virtual event produced by Dark Reading, Think Like an Attacker: Understanding Cybercriminals and Nation-State Threat Actors, you’ll learn about the latest and most prolific threat actors in cybercrime and cyber espionage, and how they could target your enterprise. In this free, all-day online event, experts will provide insight, advice, and best practices for securing your enterprise – and ultimately, your valuable data – from these attackers. Among other things, you’ll learn how to gather intelligence on current threats and adversaries – and then how you can use that information to secure your network.

Topics Include:
A look at some of the most infamous threat groups and their main goals for hacking organizations like yours
Their tactics and techniques -- and how that can inform your defenses
Best practices for applying threat intelligence to your security posture
Recommendations for thinking like an attacker in order to test your defenses from their threats
Other proactive security methods such as threat hunting, vulnerability scanning, and penetration testing to identify and stop attackers before they infiltrate your IT infrastructure
Agenda
Keynote
11:00AM - 11:45AM ET

The Cybercrime Ecosystem

Sponsored by: Wiz
Speaker(s): Brandon Levene, Adjunct Professor, Johns Hopkins School of Advanced International Studies
Moderated by: Fahmida Y Rashid, Managing Editor, Dark Reading

As cybercrime pervades, some cybercriminal groups have evolved into well-organized syndicates operating as a business. The Dark Web underground is the marketplace where they make deals, share malware and stolen data, and even double-cross or hack one another. In this keynote, an expert on cybercrime will explain how this dark ecosystem operates and continues to grow and prosper — and provide tips on how to protect your organization from them.

Fireside Chat
11:45AM - 12:00PM ET

Fireside Chat with Wiz

Sponsored by: Wiz
Speaker(s): Jeff Morgan, Enterprise Solutions Engineer, Wiz
Moderated by: Fahmida Y Rashid, Managing Editor, Dark Reading
Keynote
12:15PM - 1:00PM ET

Nation-State Hacking Teams

Sponsored by: Mandiant (now part of Google Cloud)
Speaker(s): Amy Chang, Senior Fellow, Cybersecurity and Emerging Threats, R Street Institute
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

China. Russia. Iran. North Korea. These are among the most prolific and powerful nations with state-sponsored hacking teams that conduct cyber espionage of all flavors, from geopolitical and diplomatic spying to intellectual property theft, and even the most egregious data destruction attacks that cross the line into cybercrime. But many other nations are ramping up their hacking teams for their national interests as well. In this keynote, an expert on nation-state cyber operations will provide insight into the latest trends and operations of nation-state hackers and the threats to businesses and organizations big and small.

Fireside Chat
1:00PM - 1:15PM ET

Fireside Chat with Mandiant (now part of Google Cloud)

Sponsored by: Mandiant (now part of Google Cloud)
Speaker(s): Nader Zaveri, Senior Manager, Incident Response & Remediation Mandiant, Google Cloud
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading
Panel
2:15PM - 3:00PM ET

How to Get the Most out of Threat Intelligence Data

Sponsored by: Analyst1 | Mandiant (now part of Google Cloud)
Panelists: Elvia Finalle, John Bambenek, Eddie Mitchell, Nader Zaveri
Moderated by: Tara Seals

Various threat intelligence feeds are integrated into many security tools and services, and there are multiple open-source feeds as well, so how do you sift through this data to find the most applicable to your organization? What are some of the best resources for understanding threat groups and the latest attack campaigns? How do you weave threat intel data into your existing security tools and security operations? In this panel discussion, experts will provide insight and guidance on how to manage the deluge of threat intel and use it as a key strategic tool for your security posture.

Panel
3:15PM - 4:00PM ET

Proactive Security Measures for Thwarting Cyber Adversaries

Sponsored by: CardinalOps | CyberArk
Panelists: Andrew Braunberg, Shawn Duffy, Andy Thompson, Jay Lillie
Moderated by: Karen Spiegelman

Cybercrime and nation-state hacking teams continue to hone their skills and methods in order to remain under the radar. That calls for more forward-thinking, proactive security defenses with the goal of staying ahead of the attackers, such as regular vulnerability scanning and penetration testing of IT infrastructure, and threat hunting by the security team or your security service provider. Threat hunting and red-team experts will share insights on how to execute such proactive security practices, the emerging technologies that support them, and how to use the results they unearth to shore up defenses in your internally developed applications and third-party applications and systems in your network.

Panel
4:15PM - 5:00PM ET

Security Alerts: Isolating the Needle in the Haystack

Sponsored by: KnowBe4 | Palo Alto Networks
Panelists: Jessica Sica, Eric Parizo, Joanna Huisman, Greg Smith,
Moderated by: Becky Bracken

Many enterprises have dozens or more security tools, many of which aren’t well-integrated, nor even fully deployed due to a saturation of tools, events, and security team shortages and turnover. What types of processes and tools can help sift through this telemetry to ferret out the real events that point to a live attack? What can machine learning and artificial intelligence do to streamline and empower security analysis? In this panel discussion, experts will analyze the challenges security analysts face every day and how to improve the detection and analysis of events.

Demos
All Day

Panoptica - A Brief Introduction

Sponsored by: Cisco (Panoptica)
Presented by: Tim Miller, Technical Marketing Engineer, Outshift by Cisco

Lacework - Data-driven Cloud Security at Scale

Sponsored by: Lacework
Presented by: Brendan Till, Sales Manager, Lacework

Focusing on The Threats That Matter Most with Interpres Security

Sponsored by: Interpres Security
Presented by: Mike Persechini, Senior Vice President of Sales, Interpres Security

EDR Demo - Complete Protection for Businesses with Acronis Cyber Protect

Sponsored by: Acronis
Presented by: J.D. Perham, Solutions Architect, Acronis

Think Like an Attacker:

November 16, 2023
11:00AM – 5:00PM ET | Doors open at 10:30AM ET

Speakers
Brendon Anderson
Cyber Security Consultant, Interpres Security
Mike Persechini
Senior Vice President of Sales, Interpres Security
Mr. Persechini brings 25 years of Cybersecurity experience to the Interpres team specializing in developing and transforming high growth early stage companies. As a sales leader Mike has focused on building and scaling highly functional sales organizations and leading the expansion of go-to-market teams.
Brendan Till
Sales Manager, Lacework
Coming Soon
J.D. Perham
Solutions Architect at Acronis
With 5+ years of experience as a sales engineer with Acronis, John currently works with some of the company’s largest enterprise customers, helping them develop, deploy, and maintain software to ensure system uptime and business continuity. John’s expertise also includes working with smaller to medium businesses.
John Bambenek
President, Bambenek Consulting
John Bambenek is President of Bambenek Consulting and an incident handler at the SANS Internet Storm Center. He has been researching security threats and criminal organizations for over 20 years and has been coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
Jessica Sica
Senior Information Security Leader, CISO, Weave
Extensive experience in overseeing and directing cyber security programs. Experience in networking, compliance, information security, auditing, and infrastructure. Adept at developing and implementing an information security program, including procedures and policies designed to protect communications, systems and assets.
Elvia Finalle
Senior Security Operations Analyst; Analyst, Cybersecurity
Elvia is an experienced analyst in Omdia’s cybersecurity team covering various market areas with a demonstrated history of working in the management consulting industry. Her specialized coverage includes SecOps and enterprise awareness training. Elvia has been creating databases, analyzing market trends, and generating forecasts for over five years
Jeff Morgan
Enterprise Solutions Engineer, Wiz
San Francisco native who's been working in tech for 15 years. Currently a Solutions Engineer at Wiz who has also been a DevOps Engineer for most of his career working at companies such as Yelp, AppDynamics, and Sonder.
Amy Chang
Senior Fellow, Cybersecurity and Emerging Threats, R Street Institute
Amy Chang is a resident senior fellow for Cybersecurity and Emerging Threats at R Street Institute. Prior to R Street, Amy was an Executive Director for Global Cybersecurity Operations at JPMorgan Chase, where she worked to protect the firm and the financial sector against cyber attacks.
Jay Lillie
Vice President of Customer Success, CardinalOps
Jay Lillie is VP Customer Success for CardinalOps where he helps organizations around the world improve their SIEM-based detection posture. After an early career in business process management and Big Data, his more recent experience in cybersecurity ranges from machine learning behavioral analytics to identity governance.
Tim Miller
Technical Marketing Engineer, Outshift by Cisco
Tim is a Technical Marketing Engineer at Outshift by Cisco. He focuses on cloud native application security, presenting technical presentations and solutions to customers and at industry events. Previously, at Cisco, he provided technical pre-sales engineering on data center technologies.
Shawn Duffy
Managing Director, Cyber Attack Simulation, Accenture
Shawn Duffy is an information security professional with over 20 years of experience in red teaming, penetration testing, and incident response. He joined Accenture in 2015 as part of the acquisition of FusionX and now leads Accenture’s global offensive security practice.
Brandon Levene
Adjunct Professor, Johns Hopkins School of Advanced International Studies
As a seasoned cybersecurity professional, Brandon Levene has worked in threat research for over a decade, focusing primarily on financially motivated threat actors. At Dell SecureWorks, he began his career as a Security Analyst and progressed to Salesforce and Palo Alto Networks, where he specialized in malware analysis and threat hunting.
Eric Parizo
Principal Analyst, Security Operations, Omdia
Eric supports Omdia’s Cybersecurity Accelerator research practice, guiding vendor, service provider, and enterprise clients. He provides thought-leading analysis and contributes to custom research. His specializations include enterprise security operations (SecOps) and enterprise infrastructure security technology.
Greg Smith
Senior Product Marketing Manager, Cortex XSIAM, Palo Alto Networks
Greg Smith has worked in the technology sector and cyber security for over 10 years. He is a Senior Product Marketing Manager at Palo Alto Networks, an industry leader in cyber security, and is currently the Sr. PMM for Cortex XSIAM. As part of cyber security, Greg has worked in cloud workload protection, network security, and security operations.
Joanna Huisman
Senior Vice President of Strategic Insights and Research, KnowBe4
Joanna Huisman is Senior Vice President of Strategic Insights and Research at KnowBe4. She is a cybersecurity, marketing and training/communications professional with over 20 years of experience in strategic, internal and customer-facing engagements in the financial services/tech industries with added experience in sales, operations, and more.
Andy Thompson
Research Evangelist, CyberArk
Meet Andy Thompson, a seasoned cybersecurity expert with nearly 30 years of hands-on experience in IT and security. As a highly certified researcher, evangelist, and thought leader, Andy excels in simplifying complex technical concepts for diverse audiences.
Andrew Braunberg
Principal Analyst, SecOps, Omdia
Andrew supports Omdia's Cybersecurity Operations (SecOps) Intelligence Service research practice, guiding vendor, service provider, and enterprise clients. He provides thought-leading analysis on technologies, trends, and innovations in enterprise security operations centers (SOCs), and specifically on the proactive technologies.
Eddie Mitchell
VP of Sales Engineering, Analyst1
Eddie is highly motivated, dedicated and resourceful security practitioner with over 20 years of industry experience in building and leading customer success and field engineering functions for early-stage cyber startups. Over the course of Eddie's career, he has served as a security consultant, security researcher, and technical sales leader.
Karen Spiegelman
Features Editor, Dark Reading
Karen joined Dark Reading in January 2022 as features editor. She's been in tech editing since before the img tag was introduced, working for outlets such as the IEEE Computer Society, CNET Download.com, and TechTV. She lives in Los Angeles with her husband, son, and two cats. Find her on Mastodon: https://infosec.exchange/@spiegelmama
Nader Zaveri
Senior Manager, Incident Response & Remediation Mandiant, Google Cloud
Nader Zaveri has over 15 years of experience in IT security, infrastructure, and risk management. Nader has led hundreds of incident response investigations related to on-prem or cloud-based environments. He has helped investigate and understand the storyline of the attack for the most allusive threat actors such as nation-states.
Becky Bracken
Editor, Dark Reading
Becky Bracken has built a decades-long journalism career with a focus on cybersecurity issues and serves as an editor for Dark Reading.
Tara Seals
Managing Editor, News, Dark Reading
Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine.
Fahmida Y Rashid headshot
Fahmida Y Rashid
Managing Editor, Dark Reading
Fahmida Y Rashid is Dark Reading’s managing editor, focusing on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties.
Sponsors
Diamond
Platinum
Gold
© 2024 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service