Understanding Cyber
Attackers and Their Methods
Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?
These are just some of the questions that will be explored and answered at Dark Reading’s free virtual event on November 17, set to offer insight, advice, and best practices for stopping the current wave of online attackers – and the exploits they use to target enterprises.
If your organization wants to learn more about how to thwart cybercriminals from penetrating your online defenses with the right threat intelligence, security tools, and strategies to help protect your enterprise data, then this virtual event is for you.
- Overview of the most pervasive and dangerous types of threat actors and why they might target your organization
- Techniques and tactics used by today’s online attackers, and how to defend against them
- Insight on how to gather intelligence about likely adversaries, and use it to enhance your cyber defenses
- Methods for testing your defenses by thinking and behaving like your attacker
- Tools and practices for detecting and responding to known exploits and attack methods
- Insight on how to use threat hunting and other tools to identify your attackers – before they hit your organization
- 11:00am – 11:45am EST
The Cybercrime Ecosystem
- 12:15pm – 1:00pm EST
Nation-State Hacking Teams
- 1:30pm – 2:00pm EST
Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses
- 1:30pm – 2:00pm EST
No More Cookies For You! Attacking & Defending Chromium Based Browsers
The techniques, tactics and procedures (TTPs) used to bypass security controls continue to evolve at a rapid pace. Web-based applications have become essential to life and work, and our web browsers, which seemingly know everything about us, have become prime targets for credential stealing attacks. In fact, threat actors and credentials stealing malware commonly target browsers to compromise stored credentials and session cookies.
Join CyberArk Research Evangelist, Andy Thompson as he discusses how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) credential theft protection can prevent this and many other emerging techniques from being used in the wild.
- 2:15pm – 3:00pm EST
How to Get the Most out of Threat Intelligence Feeds
Sponsored by: Contrast Security / Perception Point
- 3:15pm –4:00pm EST
Getting a Step Ahead of the Attacker with Threat Hunting, Vulnerability Scanning & Penetration Testing
- 4:15pm –5:00pm EST
Cyberattack Response: How to Stop an Attack in its Tracks
Demo with Menlo Security

SVP, GM MITRE Labs, and Chief Futurist, MITRE


Roger Grimes
Data-Driven Defense Evangelist, KnowBe4


Andy Thompson
Research Evangelist, CyberArk Labs

Roy Galili Darnell
Data Science Team Lead, Perception Point



Chris Brewer
Director, Palo Alto Networks Unit 42










Editor-in-Chief, Dark Reading

Features Editor, Dark Reading


Becky Bracken
Editor, Dark Reading


Elvia Finalle
Analyst with Omdia




Becky Bracken
Editor, Dark Reading


Elvia Finalle
Analyst with Omdia

Global Lead for Security Cloud and Infrastructure Practice, Accenture

Co-Founder & CEO, Vulcan Cyber

CISO, Gusto

Sr. Manager of Global Solution Leads, Secureworks

Senior Director, Solutions Marketing, Fortinet

CISO – Americas, Zscaler

Co-Founder & CEO, CYREBRO

Director, Security Operations, Palo Alto Networks

Sr. Director Cybersecurity Strategy, Menlo Security

Consultant with NextJen, LLC