Don't miss the Virtual Threat Detection & Incident Response Summit where top security leaders and practitioners unite to share real-world strategies, tools, and case studies.

Reserve your free spot now to stay ahead of evolving threats.

Why Attend?

Learn from the best – Gain insights from top CISOs, CTOs, and incident responders tackling real-world threats.

Stay ahead of attackers – Discover cutting-edge tools, techniques, and frameworks for faster, smarter threat detection.

Network with peers – Connect with fellow security leaders to share strategies and build your professional network.

Actionable takeaways – Walk away with proven playbooks and response plans you can implement immediately.

Sponsors

SecurityWeek Virtual Event Sponsorships

I want to become a sponsor

SecurityWeek Virtual Events Provide

  • BRAND AWARENESS: Introduce your brand to a large audience and deepen connections with existing customers and prospects through powerful brand integration by being part of a high-profile event that is heavily marketed for months.
  • THOUGHT LEADERSHIP: Demonstrate expertise and build trust by presenting to a targeted, information-hungry audience of cybersecurity professionals.
  • LEAD GENERATION: The scale of SecurityWeek’s virtual events serve as a cost effective lead generation platform to fuel your sales teams.

Speakers

See more

Agenda

May 21, 2025 11:00

Insights from the 2025 Unit 42 Global Incident Response Report

In a world where cyberattacks are intensifying daily, AI-driven techniques and calculated disruptions from adversaries are redefining how organizations must approach cybersecurity. In 2024, the Unit 42® Incident Response team handled 500+ of the world’s largest cyberattacks — 86% of which directly impacted business operations. Leveraging insights from these incidents, the 2025 “Unit 42 Global Incident Response Report” delivers an in-depth analysis of the evolving threat landscape and attacker's tactics and techniques. In this webinar, explore: -The increasing speed of attacks: Understand how attackers leverage AI and advanced tactics to reach exfiltration within an hour, leaving minimal time to respond. -Evolving attack techniques: Discover how 70% of incidents now span three or more attack surfaces, emphasizing the need for holistic security across endpoints, networks, cloud environments and human factors. -Key emerging threat trends: Explore the rise of disruptive extortion, supply chain vulnerabilities, insider threats and AI-assisted attacks, and how they impact organizations across industries. Gain critical insights, actionable strategies and learn how Unit 42 can help you stay ahead in 2025 and beyond.
speaker headshot

Michael Sikorski
Palo Alto Networks, Chief Technology Officer and VP of Engineering

speaker headshot

Sam Rubin
Palo Alto Networks, VP Global Head of Operations

speaker headshot

David Moulton
Palo Alto Networks, Director, Content Marketing

May 21, 2025 11:30

A Security Imperative: Identity Threat Visibility and Remediation

In today’s evolving threat landscape, staying ahead of Identity-related risks is critical to maintaining business continuity. Join us for an insightful session where we will share proven strategies to detect, respond to, and mitigate identity threats—with speed and efficiency. What You’ll Learn: How to harness the power of Okta and our technology partners to detect and address threats in real-time. The role of advanced risk analytics, AI-driven tools, and automated response systems in enhancing security. Actionable steps to secure both users and devices while minimizing disruptions. This session is tailored for IT and Security professionals looking to strengthen their organization’s defenses. Attendees will learn the importance of implementing integrated solutions, like CrowdStrike, that enable real-time threat remediation and provide deeper visibility into potential Identity risks across the enterprise.
speaker headshot

Johnathan Campos
Okta, Senior Product Marketing Manager

speaker headshot

John Smith
CrowdStrike, Integration Solutions Architect,

May 21, 2025 12:00

Living Off the Cloud: How to Move Faster Than Attackers with CDR

Living off the cloud attacks are on the rise. Executing rapid, cloud-native techniques to escalate privileges, move laterally between environments, and access critical assets, attackers are targeting the cloud more effectively than ever. This session will focus on a real-world living off the cloud attack case study, analyzing a step-by-step account of the attack as it unfolded from attackers’ perspective. We will then switch gears and rewind the attack, explaining how effective detection and response methodologies could — and should — have prevented every step of the attack. Defeating these threats requires powerful centralized visibility and control of all cloud environments and resources. Our key takeaways will therefore be tailored to leveraging the best methodologies and tools to take back the initiative and stop even the most sophisticated cloud attacks.
speaker headshot

Lauren Place
Wiz, Sr. Product Marketing Manager

May 21, 2025 12:20

BREAK

We're taking a short break. Please visit the Exhibit Hall to connect with our sponsors. They're standing by now to answer your questions. Resources are also available for download in their booths.

May 21, 2025 12:30

A CISO's Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?

With 98% of organizations experiencing vendor breaches, preparedness is critical. This webinar equips CISOs and security leaders with strategies to effectively manage third-party cyber incidents. Learn how to leverage a robust playbook to move from reactive scrambling to proactive resilience. Attend to learn how to: - Stop Scrambling: Implement rapid response frameworks. - Communicate Clearly: Develop winning crisis communication plans. - Become Proactive: Discover preventative best practices. - Ask the Right Questions: Vet vendor cybersecurity effectively. - Learn from the Pros: Gain insights from real-world scenarios. Don't let vendors be your vulnerability. Join us to streamline response, communicate effectively, and build a stronger digital ecosystem against escalating third-party threats.
speaker headshot

Steve Cobb
SecurityScorecard, CISO

May 21, 2025 13:00

Fighting Deepfakes: Transformative Approaches to Protect Your Business

Deepfake-related incidents worldwide increased over 245% in 2024, with some regions seeing alarming growth rates of over 3,000%. When it comes to identity crime, organizations are playing a brand new game with high stakes and uncertain rules. Accepting that human eyes and ears are simply not equipped to accurately discern what is and isn’t real in the digital sphere, is your organization prepared for these threats? Join us for this insightful session as we dive deep into the world of deepfakes; discuss common attack vectors across workforce, customer, and B2B identity use cases; demonstrate effective defense strategies; and recommend best practices to stay ahead of attackers and ensure your organization is protected in an increasingly AI-driven world. Key Takeaways: --The state of deepfake identity threats and the associated business impacts --Common attack vectors and points of weakness --Sample scenarios across industries and use cases --Existing and new approaches to mitigate deepfake-related fraud --What’s on the horizon as this threat vector continues to evolve
speaker headshot

Darrell Geusz
Ping Identity, Product Lead, Neo

speaker headshot

Maya Ogranovitch Scott,
Ping Identity, Senior Solution Manager, Fraud

May 21, 2025 13:30

Detecting Cyber’s Costliest Problem: AI-Fueled Social Engineering

In today’s high-stakes cyber battleground, losses surpassed $15 billion in 2023 alone, according to the latest FBI IC3 Report. Generative AI is now supercharging social engineering attacks and making them more targeted, more scalable, and harder to detect. These threats don’t just exploit inboxes—they infiltrate entire business systems, from finance platforms to ERP tools to executive communications. 


This session explores why traditional detection strategies are falling short—and how to build a more holistic, context-aware defense to protect your enterprise systems, people, and capital.


In This Session, You Will Learn How To:

- Understand how deepfakes, vendor compromises, and executive impersonation are elevating social engineering threats

- Detect threats earlier with context-aware, cross-functional signals

- Protect your people and capital with a holistic defense model built for today’s ecosystem

May 21, 2025 14:00

Leveraging ISP and ASN as New Indicators of Compromise (IOC) in Cyber Threat Intelligence

Traditional threat intelligence often relies on identifying malicious IPs individually, which can be reactive and slow. This session explores different KQL Queries to show how ISPs / ASNs can serve as powerful new IOCs, enabling security teams to proactively monitor entire IP ranges associated with suspicious activity. By tagging and tracking suspicious ISPs, organizations can accelerate threat detection and mitigation, reducing reliance on waiting for specific IP-based alerts. This proposal will help to discover how this approach enhances visibility, speeds up response times, and strengthens cyber defense strategies.
speaker headshot

Sergio Albea
Cloud Security Expert/Architect addicted to Threat Hunting

May 21, 2025 14:30

Agentic AI: The Next Frontier of Adversarial Threats and Incident Response

Agentic AI-AI systems capable of autonomous decision-making-are rapidly being integrated into enterprise workflows. This session explores how agentic AI blurs the lines between traditional cyberattacks and adversarial AI, introduces new attack vectors (such as phishing via agentic systems and local model tampering), and necessitates a new breed of incident response playbooks. Attendees will learn how to proactively test agentic AI for vulnerabilities, develop tailored incident response strategies, and foster resilience against evolving threats.
speaker headshot

Sanjoy Ghosh
Head of Digital Business & Engineering, BFSI, Apexon

May 21, 2025 15:00

The fog of threat: A ransomware investigation

Threat actors are constantly pivoting tactics for ransomware. They’ll do whatever it takes to improve their chances. They want to ramp up their speed, damage and pressure their victims. So, how can organizations effectively defend themselves? Step inside the shoes of Unit 42® experts for a real ransomware attack. Hear about a threat actor who gained access to the systems of a large manufacturer, demanding a multimillion-dollar ransom. See how Unit 42 responded. Join our expert to hear:
- A firsthand account of the investigation. 
- The anatomy of the attack. 
- What steps Unit 42 and the client took to get back up and running. 
- Insights into ransomware trends and evolving techniques. 
- Recommendations for defending against attacks
May 21, 2025 15:00

Closing the Gaps: Strengthen Security Posture & Stop Attacks

Identity is the foundation of modern security, yet sophisticated attacks continue to evolve—exploiting misconfigurations, hijacking sessions, and leveraging Identity sprawl to bypass traditional defenses. To stay ahead, organizations need a proactive, Identity-first security strategy. Join us for an illuminating demo where our experts showcase how Okta's Identity Security Posture Management (ISPM) and Identity Threat Protection with Okta AI (ITP) help you provide the visibility and continuous protection you need—no matter your stack or security ecosystem. In this session, you will learn how to: 
- Uncover hidden risks by identifying shadow IT, privileged accounts without MFA, and lingering access 
- Detect and respond to active threats in real-time, such as session hijacking 
- Implement a comprehensive identity security strategy to protect your entire digital ecosystem 

Don't wait for an identity breach to reveal your blind spots. Watch now to learn how to close identity security gaps.
May 21, 2025 15:00

Wiz15-Minute Platform Overview: Protect Everything You Build and Run in the Cloud

The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.
May 21, 2025 15:00

From Justification to Implementation: Tips for Deciding on Supply Chain Detection and Response

Supply chain detection and response (SCDR) is a new cybersecurity solution for supply chain incident responders that reduces supply chain breaches and increases remediation speed. In this webinar, we will explore what you need to know to make an informed decision when evaluating SCDR solutions. Key topics covered in this webinar include: 
- Justifying SCDR investment: Learn about building the business case for investing in this new type of solution. 
- Determining SCDR criteria: Discover the ways SCDR fits in your organization and the capabilities required to achieve desired outcomes. 
- Evaluating SCDR alternatives: Explore the difference between SCDR and alternatives. 
- Implementing SCDR: Consider the range of implementation options and how to determine which one is best for your organization. 

Join us to gain valuable insights and practical advice on how to navigate the organizational challenges that are needed to achieve the goal of safeguarding your digital supply chain and protecting your business from cyberattacks.
May 21, 2025 15:00

An Introductory Demonstration of Deepfake Mitigation with PingOne Verify

This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.
May 21, 2025 15:00

Trustmi Demo - TBD

TBD

[On-Demand] The fog of threat: A ransomware investigation

Threat actors are constantly pivoting tactics for ransomware. They’ll do whatever it takes to improve their chances. They want to ramp up their speed, damage and pressure their victims. So, how can organizations effectively defend themselves? Step inside the shoes of Unit 42® experts for a real ransomware attack. Hear about a threat actor who gained access to the systems of a large manufacturer, demanding a multimillion-dollar ransom. See how Unit 42 responded. Join our expert to hear: -A firsthand account of the investigation. -The anatomy of the attack. -What steps Unit 42 and the client took to get back up and running. -Insights into ransomware trends and evolving techniques. -Recommendations for defending against attacks

[On-Demand] Closing the Gaps: Strengthen Security Posture & Stop Attacks

Identity is the foundation of modern security, yet sophisticated attacks continue to evolve—exploiting misconfigurations, hijacking sessions, and leveraging Identity sprawl to bypass traditional defenses. To stay ahead, organizations need a proactive, Identity-first security strategy.

Join us for an illuminating demo where our experts showcase how Okta's Identity Security Posture Management (ISPM) and Identity Threat Protection with Okta AI (ITP) help you provide the visibility and continuous protection you need—no matter your stack or security ecosystem.

In this session, you will learn how to:

- Uncover hidden risks by identifying shadow IT, privileged accounts without MFA, and lingering access

- Detect and respond to active threats in real-time, such as session hijacking

- Implement a comprehensive identity security strategy to protect your entire digital ecosystem

Don't wait for an identity breach to reveal your blind spots. Watch now to learn how to close identity security gaps.

[On-Demand] Wiz 15-Minute Platform Overview: Protect Everything You Build and Run in the Cloud

The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.

[On-Demand] From Justification to Implementation: Tips for Deciding on Supply Chain Detection and Response

Supply chain detection and response (SCDR) is a new cybersecurity solution for supply chain incident responders that reduces supply chain breaches and increases remediation speed. In this webinar, we will explore what you need to know to make an informed decision when evaluating SCDR solutions. Key topics covered in this webinar include: 

- Justifying SCDR investment: Learn about building the business case for investing in this new type of solution. 

- Determining SCDR criteria: Discover the ways SCDR fits in your organization and the capabilities required to achieve desired outcomes. 

- Evaluating SCDR alternatives: Explore the difference between SCDR and alternatives. 

- Implementing SCDR: Consider the range of implementation options and how to determine which one is best for your organization. Join us to gain valuable insights and practical advice on how to navigate the organizational challenges that are needed to achieve the goal of safeguarding your digital supply chain and protecting your business from cyberattacks.

[On-Demand] An Introductory Demonstration of Deepfake Mitigation with PingOne Verify

This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.

[On-Demand] Trustmi Demo - TBD

TBD

Register Now

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit brings together security practitioners from around the world to share war stories on breaches and the murky world of high-end cyberattacks. This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

FAQ


Yes, you’ll need to fill out our registration form to gain access to the event. Please fill in the registration form with some basic information to get started.
The information you provide upon registration will be used to establish you as a user on the platform.

SecurityWeek is committed to protecting and respecting your privacy. From time to time, we would like to contact you about our products and services, as well as other content and information from event sponsors that may be of interest to you. You may unsubscribe from these communications at any time.

By registering for this event, you consent to allow SecurityWeek to store and process the personal information submitted to provide you the content requested.
Yes, the vFairs platform is compatible with any computer or mobile device and any browser.
Yes, this event is completely free to attend. We encourage you to login and have a look around at your convenience.
Yes, the event will be available on-demand following the live broadcast.