Don't miss the Virtual Threat Detection & Incident Response Summit where top security leaders and practitioners unite to share real-world strategies, tools, and case studies.

Reserve your free spot now to stay ahead of evolving threats.

Why Attend?

Learn from the best – Gain insights from top CISOs, CTOs, and incident responders tackling real-world threats.

Stay ahead of attackers – Discover cutting-edge tools, techniques, and frameworks for faster, smarter threat detection.

Network with peers – Connect with fellow security leaders to share strategies and build your professional network.

Actionable takeaways – Walk away with proven playbooks and response plans you can implement immediately.

Sponsors

SecurityWeek Virtual Event Sponsorships

I want to become a sponsor

SecurityWeek Virtual Events Provide

  • BRAND AWARENESS: Introduce your brand to a large audience and deepen connections with existing customers and prospects through powerful brand integration by being part of a high-profile event that is heavily marketed for months.
  • THOUGHT LEADERSHIP: Demonstrate expertise and build trust by presenting to a targeted, information-hungry audience of cybersecurity professionals.
  • LEAD GENERATION: The scale of SecurityWeek’s virtual events serve as a cost effective lead generation platform to fuel your sales teams.

Speakers

See more

Agenda

May 21, 2025 11:00

Insights from the 2025 Unit 42 Global Incident Response Report

In a world where cyberattacks are intensifying daily, AI-driven techniques and calculated disruptions from adversaries are redefining how organizations must approach cybersecurity. In 2024, the Unit 42® Incident Response team handled 500+ of the world’s largest cyberattacks — 86% of which directly impacted business operations. Leveraging insights from these incidents, the 2025 “Unit 42 Global Incident Response Report” delivers an in-depth analysis of the evolving threat landscape and attacker's tactics and techniques. In this webinar, explore: -The increasing speed of attacks: Understand how attackers leverage AI and advanced tactics to reach exfiltration within an hour, leaving minimal time to respond. -Evolving attack techniques: Discover how 70% of incidents now span three or more attack surfaces, emphasizing the need for holistic security across endpoints, networks, cloud environments and human factors. -Key emerging threat trends: Explore the rise of disruptive extortion, supply chain vulnerabilities, insider threats and AI-assisted attacks, and how they impact organizations across industries. Gain critical insights, actionable strategies and learn how Unit 42 can help you stay ahead in 2025 and beyond.
speaker headshot

Michael Sikorski
Palo Alto Networks, Chief Technology Officer and VP of Engineering

speaker headshot

Sam Rubin
Palo Alto Networks, VP Global Head of Operations

speaker headshot

David Moulton
Palo Alto Networks, Director, Content Marketing

May 21, 2025 11:30

A Security Imperative: Identity Threat Visibility and Remediation

In today’s evolving threat landscape, staying ahead of Identity-related risks is critical to maintaining business continuity. Join us for an insightful session where we will share proven strategies to detect, respond to, and mitigate identity threats—with speed and efficiency. What You’ll Learn: How to harness the power of Okta and our technology partners to detect and address threats in real-time. The role of advanced risk analytics, AI-driven tools, and automated response systems in enhancing security. Actionable steps to secure both users and devices while minimizing disruptions. This session is tailored for IT and Security professionals looking to strengthen their organization’s defenses. Attendees will learn the importance of implementing integrated solutions, like CrowdStrike, that enable real-time threat remediation and provide deeper visibility into potential Identity risks across the enterprise.
speaker headshot

Johnathan Campos
Okta, Senior Product Marketing Manager

speaker headshot

John Smith
CrowdStrike, Integration Solutions Architect,

May 21, 2025 12:00

Living Off the Cloud: How to Move Faster Than Attackers with CDR

Living off the cloud attacks are on the rise. Executing rapid, cloud-native techniques to escalate privileges, move laterally between environments, and access critical assets, attackers are targeting the cloud more effectively than ever. This session will focus on a real-world living off the cloud attack case study, analyzing a step-by-step account of the attack as it unfolded from attackers’ perspective. We will then switch gears and rewind the attack, explaining how effective detection and response methodologies could — and should — have prevented every step of the attack. Defeating these threats requires powerful centralized visibility and control of all cloud environments and resources. Our key takeaways will therefore be tailored to leveraging the best methodologies and tools to take back the initiative and stop even the most sophisticated cloud attacks.
speaker headshot

Lauren Place
Wiz, Sr. Product Marketing Manager

May 21, 2025 12:30

A CISO's Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?

With 98% of organizations experiencing vendor breaches, preparedness is critical. This webinar equips CISOs and security leaders with strategies to effectively manage third-party cyber incidents. Learn how to leverage a robust playbook to move from reactive scrambling to proactive resilience. Attend to learn how to: - Stop Scrambling: Implement rapid response frameworks. - Communicate Clearly: Develop winning crisis communication plans. - Become Proactive: Discover preventative best practices. - Ask the Right Questions: Vet vendor cybersecurity effectively. - Learn from the Pros: Gain insights from real-world scenarios. Don't let vendors be your vulnerability. Join us to streamline response, communicate effectively, and build a stronger digital ecosystem against escalating third-party threats.
speaker headshot

Steve Cobb
SecurityScorecard, CISO

May 21, 2025 13:00

Fighting Deepfakes: Transformative Approaches to Protect Your Business

Deepfake-related incidents worldwide increased over 245% in 2024, with some regions seeing alarming growth rates of over 3,000%. When it comes to identity crime, organizations are playing a brand new game with high stakes and uncertain rules. Accepting that human eyes and ears are simply not equipped to accurately discern what is and isn’t real in the digital sphere, is your organization prepared for these threats? Join us for this insightful session as we dive deep into the world of deepfakes; discuss common attack vectors across workforce, customer, and B2B identity use cases; demonstrate effective defense strategies; and recommend best practices to stay ahead of attackers and ensure your organization is protected in an increasingly AI-driven world. Key Takeaways: --The state of deepfake identity threats and the associated business impacts --Common attack vectors and points of weakness --Sample scenarios across industries and use cases --Existing and new approaches to mitigate deepfake-related fraud --What’s on the horizon as this threat vector continues to evolve
speaker headshot

Darrell Geusz
Ping Identity, Product Lead, Neo

speaker headshot

Maya Ogranovitch Scott,
Ping Identity, Senior Solution Manager, Fraud

May 21, 2025 13:30

Leveraging ISP and ASN as New Indicators of Compromise (IOC) in Cyber Threat Intelligence

Traditional threat intelligence often relies on identifying malicious IPs individually, which can be reactive and slow. This session explores different KQL Queries to show how ISPs / ASNs can serve as powerful new IOCs, enabling security teams to proactively monitor entire IP ranges associated with suspicious activity. By tagging and tracking suspicious ISPs, organizations can accelerate threat detection and mitigation, reducing reliance on waiting for specific IP-based alerts. This proposal will help to discover how this approach enhances visibility, speeds up response times, and strengthens cyber defense strategies.
speaker headshot

Sergio Albea
Cloud Security Expert/Architect addicted to Threat Hunting

May 21, 2025 14:00

Agentic AI: The Next Frontier of Adversarial Threats and Incident Response

Agentic AI-AI systems capable of autonomous decision-making-are rapidly being integrated into enterprise workflows. This session explores how agentic AI blurs the lines between traditional cyberattacks and adversarial AI, introduces new attack vectors (such as phishing via agentic systems and local model tampering), and necessitates a new breed of incident response playbooks. Attendees will learn how to proactively test agentic AI for vulnerabilities, develop tailored incident response strategies, and foster resilience against evolving threats.
speaker headshot

Sanjoy Ghosh
Head of Digital Business & Engineering, BFSI, Apexon

Register Now

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit brings together security practitioners from around the world to share war stories on breaches and the murky world of high-end cyberattacks. This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

FAQ


Yes, you’ll need to fill out our registration form to gain access to the event. Please fill in the registration form with some basic information to get started.
The information you provide upon registration will be used to establish you as a user on the platform.

SecurityWeek is committed to protecting and respecting your privacy. From time to time, we would like to contact you about our products and services, as well as other content and information from event sponsors that may be of interest to you. You may unsubscribe from these communications at any time.

By registering for this event, you consent to allow SecurityWeek to store and process the personal information submitted to provide you the content requested.
Yes, the vFairs platform is compatible with any computer or mobile device and any browser.
Yes, this event is completely free to attend. We encourage you to login and have a look around at your convenience.
Yes, the event will be available on-demand following the live broadcast.