Sessions
Registered Attendees
Technical Demos
Interactive Expo Hall
TDIR Resource Center
Learn from the best – Gain insights from top CISOs, CTOs, and incident responders tackling real-world threats.
Stay ahead of attackers – Discover cutting-edge tools, techniques, and frameworks for faster, smarter threat detection.
Network with peers – Connect with fellow security leaders to share strategies and build your professional network.
Actionable takeaways – Walk away with proven playbooks and response plans you can implement immediately.
SecurityWeek Virtual Events Provide
In a world where cyberattacks are intensifying daily, AI-driven techniques and calculated disruptions from adversaries are redefining how organizations must approach cybersecurity. In 2024, the Unit 42® Incident Response team handled 500+ of the world’s largest cyberattacks — 86% of which directly impacted business operations. Leveraging insights from these incidents, the 2025 “Unit 42 Global Incident Response Report” delivers an in-depth analysis of the evolving threat landscape and attacker's tactics and techniques. In this webinar, explore:
Michael Sikorski
Palo Alto Networks, Chief Technology Officer and VP of Engineering
Sam Rubin
Palo Alto Networks, VP Global Head of Operations
David Moulton
Palo Alto Networks, Director, Content Marketing
In today’s evolving threat landscape, staying ahead of Identity-related risks is critical to maintaining business continuity. Join us for an insightful session where we will share proven strategies to detect, respond to, and mitigate identity threats—with speed and efficiency. What You’ll Learn:
This session is tailored for IT and Security professionals looking to strengthen their organization’s defenses. Attendees will learn the importance of implementing integrated solutions, like CrowdStrike, that enable real-time threat remediation and provide deeper visibility into potential Identity risks across the enterprise.
Johnathan Campos
Okta, Senior Product Marketing Manager
John Smith
CrowdStrike, Integration Solutions Architect,
Lauren Place
Wiz, Sr. Product Marketing Manager
We're taking a short break. Please visit the Exhibit Hall to connect with our sponsors. They're standing by now to answer your questions. Resources are also available for download in their booths.
With 98% of organizations experiencing vendor breaches, preparedness is critical. This webinar equips CISOs and security leaders with strategies to effectively manage third-party cyber incidents. Learn how to leverage a robust playbook to move from reactive scrambling to proactive resilience. Attend to learn how to:
Don't let vendors be your vulnerability. Join us to streamline response, communicate effectively, and build a stronger digital ecosystem against escalating third-party threats.
Steve Cobb
SecurityScorecard, CISO
Deepfake-related incidents worldwide increased over 245% in 2024, with some regions seeing alarming growth rates of over 3,000%. When it comes to identity crime, organizations are playing a brand new game with high stakes and uncertain rules. Accepting that human eyes and ears are simply not equipped to accurately discern what is and isn’t real in the digital sphere, is your organization prepared for these threats? Join us for this insightful session as we dive deep into the world of deepfakes; discuss common attack vectors across workforce, customer, and B2B identity use cases; demonstrate effective defense strategies; and recommend best practices to stay ahead of attackers and ensure your organization is protected in an increasingly AI-driven world. Key Takeaways:
Darrell Geusz
Ping Identity, Product Lead, Neo
Maya Ogranovitch Scott,
Ping Identity, Senior Solution Manager, Fraud
In today’s high-stakes cyber battleground, losses surpassed $15 billion in 2023 alone, according to the latest FBI IC3 Report. Generative AI is now supercharging social engineering attacks and making them more targeted, more scalable, and harder to detect. These threats don’t just exploit inboxes—they infiltrate entire business systems, from finance platforms to ERP tools to executive communications.
This session explores why traditional detection strategies are falling short—and how to build a more holistic, context-aware defense to protect your enterprise systems, people, and capital.
In This Session, You Will Learn How To:
Michael Scott
Trustmi, Chief Strategy Officer
Sergio Albea
Cloud Security Expert/Architect addicted to Threat Hunting
Agentic AI, AI systems capable of autonomous decision-making, are rapidly being integrated into enterprise workflows. This session explores how agentic AI blurs the lines between traditional cyberattacks and adversarial AI, introduces new attack vectors (such as phishing via agentic systems and local model tampering), and necessitates a new breed of incident response playbooks. Attendees will learn how to proactively test agentic AI for vulnerabilities, develop tailored incident response strategies, and foster resilience against evolving threats.
Sanjoy Ghosh
Head of Digital Business & Engineering, BFSI, Apexon
Threat actors are constantly pivoting tactics for ransomware. They’ll do whatever it takes to improve their chances. They want to ramp up their speed, damage and pressure their victims. So, how can organizations effectively defend themselves? Step inside the shoes of Unit 42® experts for a real ransomware attack. Hear about a threat actor who gained access to the systems of a large manufacturer, demanding a multimillion-dollar ransom. See how Unit 42 responded. Join our expert to hear:
Identity is the foundation of modern security, yet sophisticated attacks continue to evolve—exploiting misconfigurations, hijacking sessions, and leveraging Identity sprawl to bypass traditional defenses. To stay ahead, organizations need a proactive, Identity-first security strategy. Join us for an illuminating demo where our experts showcase how Okta's Identity Security Posture Management (ISPM) and Identity Threat Protection with Okta AI (ITP) help you provide the visibility and continuous protection you need—no matter your stack or security ecosystem. In this session, you will learn how to:
Don't wait for an identity breach to reveal your blind spots. Watch now to learn how to close identity security gaps.
The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.
Supply chain detection and response (SCDR) is a new cybersecurity solution for supply chain incident responders that reduces supply chain breaches and increases remediation speed. In this webinar, we will explore what you need to know to make an informed decision when evaluating SCDR solutions. Key topics covered in this webinar include:
This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.
Threat actors are constantly pivoting tactics for ransomware. They’ll do whatever it takes to improve their chances. They want to ramp up their speed, damage and pressure their victims. So, how can organizations effectively defend themselves? Step inside the shoes of Unit 42® experts for a real ransomware attack. Hear about a threat actor who gained access to the systems of a large manufacturer, demanding a multimillion-dollar ransom. See how Unit 42 responded. Join our expert to hear: -A firsthand account of the investigation. -The anatomy of the attack. -What steps Unit 42 and the client took to get back up and running. -Insights into ransomware trends and evolving techniques. -Recommendations for defending against attacks
Identity is the foundation of modern security, yet sophisticated attacks continue to evolve—exploiting misconfigurations, hijacking sessions, and leveraging Identity sprawl to bypass traditional defenses. To stay ahead, organizations need a proactive, Identity-first security strategy.
Join us for an illuminating demo where our experts showcase how Okta's Identity Security Posture Management (ISPM) and Identity Threat Protection with Okta AI (ITP) help you provide the visibility and continuous protection you need—no matter your stack or security ecosystem.
In this session, you will learn how to:
- Uncover hidden risks by identifying shadow IT, privileged accounts without MFA, and lingering access
- Detect and respond to active threats in real-time, such as session hijacking
- Implement a comprehensive identity security strategy to protect your entire digital ecosystem
Don't wait for an identity breach to reveal your blind spots. Watch now to learn how to close identity security gaps.
The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.
Supply chain detection and response (SCDR) is a new cybersecurity solution for supply chain incident responders that reduces supply chain breaches and increases remediation speed. In this webinar, we will explore what you need to know to make an informed decision when evaluating SCDR solutions. Key topics covered in this webinar include:
- Justifying SCDR investment: Learn about building the business case for investing in this new type of solution.
- Determining SCDR criteria: Discover the ways SCDR fits in your organization and the capabilities required to achieve desired outcomes.
- Evaluating SCDR alternatives: Explore the difference between SCDR and alternatives.
- Implementing SCDR: Consider the range of implementation options and how to determine which one is best for your organization. Join us to gain valuable insights and practical advice on how to navigate the organizational challenges that are needed to achieve the goal of safeguarding your digital supply chain and protecting your business from cyberattacks.
This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.
SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit brings together security practitioners from around the world to share war stories on breaches and the murky world of high-end cyberattacks. This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.