On December 13, Cybersecurity Outlook 2023 will look at some of the new threats posed by cybercriminals and nation-states, as well as evolving products and technologies that may help mitigate those threats. You’ll hear from some of the cybersecurity industry’s leading experts, as well as researchers who have been studying the next wave of cyber vulnerabilities and exploits.
This free, all-day virtual event hosted by Black Hat, Dark Reading and Omdia will offer expert insight on the cyber-threats and technology trends enterprises will face in the coming year.
- New threats and attack trends to prepare for in the new year
- The evolution of new security operations technologies
- Next-generation approaches to current security problems, such as ransomware and zero-day exploits
- Newly discovered security vulnerabilities in key software systems
- Trends in cybersecurity research and the next wave of security flaws emerging in current enterprise technology
- An overview of trends in malware development, including the ever-persistent ransomware scourge
- Key steps your organization should take to prepare for emerging threats in 2023
- 11:00 AM – 11:45 AM EST
2023 Outlook: What Trends are on the Near Horizon in Cybersecurity?
Today’s world is digitally dependent and organizations must be resilient to enable continuous operations and leverage digital opportunities. Cyber-resilience is a core component of digital resilience, ensuring that the organization can continually operate despite security incidents or breaches. In this keynote address, Maxine Holt, head of Omdia’s cybersecurity research practice, provides insight into the cybersecurity trends on the near horizon that organizations should be preparing for, and provides advice on next steps.
- 12:15 PM – 1:00 PM EST
Risk Based Vulnerability Management (RBVM): Learning What To Prioritize And What To Ignore
The unrelenting volume of newly discovered software vulnerabilities and the increasing speed and efficiency of attackers in exploiting these weaknesses, requires security practitioners to rethink their vulnerability management strategies. Organizations need to adopt a new generation of products that provide better visibility into distributed assets, support advanced analytics to accurately predict the business risk associated with each vulnerability, and prioritize and orchestrate remediation responses. In this keynote address, Omdia Principal Analyst Andrew Braunberg offers insight on the future of RBVM technology, and recommendations on how enterprises can make the best possible use of emerging proactive technologies.
- 1:30 PM – 2:00 PM EST
Off The Beaten Path: Web3 Security
Attacks on Web3 projects are all the rage. The exposure of projects and speed at which attackers can make off with millions of dollars have made them attractive targets for attackers and nation – states alike. This trend is only increasing. The stakes for developers are high because you have to get everything right, the first time. After all, there may not be a next time. Web3 projects are experiments playing out in full public view and we haven’t discovered all of the security issues yet. There will be more hacks, more losses, and more negative impacts. How did we get here? Is it all doom and gloom? What can be done?
This keynote is a grounded look at the factors contributing to the security failures we’ve witnessed, free from the hype and hatred associated with the space. We look at the similarities and differences between the development of this new technology and more traditional applications and how some of the attacks manifested. Better testing and tools aren’t enough to solve the problem. We discuss actionable steps projects and chains can use today to address these issues and make the ecosystem safer for projects and users.
- 2:30 PM – 3:00 PM EST
eBPF ELFs JMPing Through the Windows
Keynote Speaker: Richard Johnson, Senior Principal Security Researcher, Trellix Threat Labs
eBPF tracing is a hot new technology in the EDR and infrastructure space which provides high speed instrumentation and telemetry on events, processes, and network connections. eBPF is natively supported in the Linux kernel and is used in endpoint security products such as Carbon Black and Windows Defender for Linux. Last year, Microsoft released a completely new implementation of an eBPF tracing system for Windows which is destined to become a primary telemetry provider in the near future. eBPF for Windows has a complex architecture that leverages program analysis to verify unsigned user code via abstract interpretation before running it in a kernel context — integrity of the software is paramount. This research will be the first public work to analyze and discover security vulnerabilities in the new eBPF for Windows implementation.
This keynote will discuss the capabilities and security model of eBPF for Windows, followed by details of the design and attack surface which will include the eBPF API, the trusted static verifier and JIT engine, and the kernel implementation of trace hooks and telemetry providers. During our deep dive into the implementation details, we will uncover vulnerabilities at multiple layers and discuss how they were found with demos of fuzzing Windows eBPF components and real-time bug discovery. Join us on this journey as we examine this emerging technology on Windows and the security implications of the new attack surface.
- 3:25 PM – 3:55 PM EST
Managing the New Reality of a Remote & Hybrid Workforce
It’s been nearly two years since the global pandemic forced enterprises to pivot practically overnight to digital business and work – from – home computing. While some workers have gone back to their offices, others are sticking with the remote work model, leavings security teams to support what is now the new normal: a combination of remote, hybrid, and office-based users. In this panel, experts will discuss this new reality of this hybrid workforce model in 2023, including the key endpoint and cloud security challenges and technologies security teams need to consider — as well as how it affects their own security operations teams who are now working remotely.
- 4:10 PM – 4:40 PM EST
State of Malware: 2023
Sponsored by: CardinalOps / Immersive Labs
Cybercriminals and nation – state actors are constantly evolving their malicious code and attacks to be more stealthy, efficient, and lucrative financially. What new and emerging characteristics and capabilities of the biggest malware threats should security teams prepare for in 2023? In this panel discussion, top experts will offer insight on what malware and ransomware will look like in the new year and provide recommendations on best practices for defending against this malicious code, and discuss the emerging technologies that can help thwart them.
Demo with Zscaler
Sponsored by: Zscaler
Cybercriminals and nation – state actors are constantly evolving their malicious code and attacks to be more stealthy, efficient, and lucrative financially. What new and emerging characteristics and capabilities of the biggest malware threats should security teams prepare for in 2023? In this panel discussion, top experts will offer insight on what malware and ransomware will look like in the new year and provide recommendations on best practices for defending against this malicious code, and discuss the emerging technologies that can help thwart them.
Phil Neray
VP of Cyber Defense Strategy, CardinalOps
Nathan Hamiel is Senior Director of Research at Kudelski Security where he leads the fundamental and applied research team. Part of the Innovation group working to define the future of products and services for the company, his team focuses on privacy, advanced cryptography, emerging technologies, and special projects. He is also responsible for the research function at the company, connecting the dots between the various business units and focusing on collaboration both internal and external to the company.
Richard Johnson
Senior Principal Security Researcher, Trellix Threat Labs
James Turgal is the former executive assistant director for the FBI Information and Technology Branch (CIO). He now serves as Optiv Security’s vice president of cyber risk, strategy and board relations. James has personally helped many companies respond to and recover from ransomware attacks and is an expert in cybercrime, cyber insurance, cybersecurity, ransomware and more.
James draws on his two decades of experience investigating and solving cybercrimes for the FBI.
James Turgal is the former executive assistant director for the FBI Information and Technology Branch (CIO). He now serves as Optiv Security’s vice president of cyber risk, strategy and board relations. James has personally helped many companies respond to and recover from ransomware attacks and is an expert in cybercrime, cyber insurance, cybersecurity, ransomware and more.
James draws on his two decades of experience investigating and solving cybercrimes for the FBI.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Fahmida Rashid
Features Editor, Dark Reading
Tara Seals
Managing Editor, Dark Reading
Becky Bracken
Editor, Dark Reading
Andrew Braunberg
Principal Analyst, Omdia Cybersecurity
Global Lead for Security Cloud and Infrastructure Practice, Accenture
Co-Founder & CEO, Vulcan Cyber
CISO, Gusto
Sr. Manager of Global Solution Leads, Secureworks
Senior Director, Solutions Marketing, Fortinet
CISO – Americas, Zscaler
Co-Founder & CEO, CYREBRO
Director, Security Operations, Palo Alto Networks
Sr. Director Cybersecurity Strategy, Menlo Security
Consultant with NextJen, LLC