Sessions
Registered Attendees
Technical Demos
Interactive Expo Hall
TDIR Resource Center
Learn from the best – Gain insights from top CISOs, CTOs, and incident responders tackling real-world threats.
Stay ahead of attackers – Discover cutting-edge tools, techniques, and frameworks for faster, smarter threat detection.
Network with peers – Connect with fellow security leaders to share strategies and build your professional network.
Actionable takeaways – Walk away with proven playbooks and response plans you can implement immediately.
SecurityWeek Virtual Events Provide
Michael Sikorski
Palo Alto Networks, Chief Technology Officer and VP of Engineering
Sam Rubin
Palo Alto Networks, VP Global Head of Operations
David Moulton
Palo Alto Networks, Director, Content Marketing
Johnathan Campos
Okta, Senior Product Marketing Manager
John Smith
CrowdStrike, Integration Solutions Architect,
Lauren Place
Wiz, Sr. Product Marketing Manager
We're taking a short break. Please visit the Exhibit Hall to connect with our sponsors. They're standing by now to answer your questions. Resources are also available for download in their booths.
Steve Cobb
SecurityScorecard, CISO
Darrell Geusz
Ping Identity, Product Lead, Neo
Maya Ogranovitch Scott,
Ping Identity, Senior Solution Manager, Fraud
In today’s high-stakes cyber battleground, losses surpassed $15 billion in 2023 alone, according to the latest FBI IC3 Report. Generative AI is now supercharging social engineering attacks and making them more targeted, more scalable, and harder to detect. These threats don’t just exploit inboxes—they infiltrate entire business systems, from finance platforms to ERP tools to executive communications.
This session explores why traditional detection strategies are falling short—and how to build a more holistic, context-aware defense to protect your enterprise systems, people, and capital.
In This Session, You Will Learn How To:
- Understand how deepfakes, vendor compromises, and executive impersonation are elevating social engineering threats
- Detect threats earlier with context-aware, cross-functional signals
- Protect your people and capital with a holistic defense model built for today’s ecosystem
Sergio Albea
Cloud Security Expert/Architect addicted to Threat Hunting
Sanjoy Ghosh
Head of Digital Business & Engineering, BFSI, Apexon
TBD
Threat actors are constantly pivoting tactics for ransomware. They’ll do whatever it takes to improve their chances. They want to ramp up their speed, damage and pressure their victims. So, how can organizations effectively defend themselves? Step inside the shoes of Unit 42® experts for a real ransomware attack. Hear about a threat actor who gained access to the systems of a large manufacturer, demanding a multimillion-dollar ransom. See how Unit 42 responded. Join our expert to hear: -A firsthand account of the investigation. -The anatomy of the attack. -What steps Unit 42 and the client took to get back up and running. -Insights into ransomware trends and evolving techniques. -Recommendations for defending against attacks
Identity is the foundation of modern security, yet sophisticated attacks continue to evolve—exploiting misconfigurations, hijacking sessions, and leveraging Identity sprawl to bypass traditional defenses. To stay ahead, organizations need a proactive, Identity-first security strategy.
Join us for an illuminating demo where our experts showcase how Okta's Identity Security Posture Management (ISPM) and Identity Threat Protection with Okta AI (ITP) help you provide the visibility and continuous protection you need—no matter your stack or security ecosystem.
In this session, you will learn how to:
- Uncover hidden risks by identifying shadow IT, privileged accounts without MFA, and lingering access
- Detect and respond to active threats in real-time, such as session hijacking
- Implement a comprehensive identity security strategy to protect your entire digital ecosystem
Don't wait for an identity breach to reveal your blind spots. Watch now to learn how to close identity security gaps.
The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.
Supply chain detection and response (SCDR) is a new cybersecurity solution for supply chain incident responders that reduces supply chain breaches and increases remediation speed. In this webinar, we will explore what you need to know to make an informed decision when evaluating SCDR solutions. Key topics covered in this webinar include:
- Justifying SCDR investment: Learn about building the business case for investing in this new type of solution.
- Determining SCDR criteria: Discover the ways SCDR fits in your organization and the capabilities required to achieve desired outcomes.
- Evaluating SCDR alternatives: Explore the difference between SCDR and alternatives.
- Implementing SCDR: Consider the range of implementation options and how to determine which one is best for your organization. Join us to gain valuable insights and practical advice on how to navigate the organizational challenges that are needed to achieve the goal of safeguarding your digital supply chain and protecting your business from cyberattacks.
This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.
TBD
SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit brings together security practitioners from around the world to share war stories on breaches and the murky world of high-end cyberattacks. This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.