Skip to content
A Full-Day Event

Understanding Cyber
Attackers and Their Methods

November 17, 2022
11:00am – 5:00pm EST
Insight on today’s cyber adversaries, their methods and exploits, and how to stop them.

Every day, your enterprise is at risk of being hacked. But just who are the cyber attackers, and what are their motivations? What methods might they use to crack enterprise data, and how do they stage their attacks? Do you know which attacks are most likely to be used against an organization like yours, and which attackers are most likely to target you?

These are just some of the questions that will be explored and answered at Dark Reading’s free virtual event on November 17, set to offer insight, advice, and best practices for stopping the current wave of online attackers – and the exploits they use to target enterprises.

If your organization wants to learn more about how to thwart cybercriminals from penetrating your online defenses with the right threat intelligence, security tools, and strategies to help protect your enterprise data, then this virtual event is for you.

Event Topics Include:
AGENDA
Keynote 1

The Cybercrime Ecosystem

Sponsored by: KnowBe4
Many cybercrime organizations have become more sophisticated and organized, operating as a business, and the underground economy is the marketplace where they make deals, share malware and stolen data, and even sometimes commit crimes against one another. In this keynote, an expert on the cybercrime underground will explain how this dark ecosystem operates and continues to grow and prosper, and tips on how to protect your organization from them.
Keynote 2

Nation-State Hacking Teams

Sponsored by: CyberArk
China. Russia. Iran. North Korea. These are among the biggest and most powerful nations with state-sponsored hacking teams that conduct cyber espionage of all flavors, from geopolitical and diplomatic spying to intellectual property theft and even the most egregious data destruction attacks and data theft that crosses the line into cybercrime. In this keynote, an expert on nation-state cyber operations will provide insight into the latest trends and operations of nation-state hackers and the threats to businesses and organizations big and small.
Webinar 1

Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses

Sponsored by: KnowBe4
Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses. But with a strategic approach to cyber defense you can hack the hacker before they strike! In this session, we’ll share insights into their strategies and their motivations. You’ll learn how to use that understanding, along with simple strategies to make your organization a hard target. Join Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, for this new webinar as he exposes the mind of a hacker to help you see your cyber risks from the outside in.
Webinar 2

No More Cookies For You! Attacking & Defending Chromium Based Browsers

Sponsored by: CyberArk

The techniques, tactics and procedures (TTPs) used to bypass security controls continue to evolve at a rapid pace. Web-based applications have become essential to life and work, and our web browsers, which seemingly know everything about us, have become prime targets for credential stealing attacks. In fact, threat actors and credentials stealing malware commonly target browsers to compromise stored credentials and session cookies.

Join CyberArk Research Evangelist, Andy Thompson as he discusses how cookies and session IDs can be stolen with ease and how CyberArk Endpoint Privilege Manager (EPM) credential theft protection can prevent this and many other emerging techniques from being used in the wild.

Panel 1

How to Get the Most out of Threat Intelligence Feeds

Sponsored by: Contrast Security / Perception Point

There’s no shortage of threat intelligence information available today: threat intel feeds are integrated into many security tools and services, and there are multiple open-source feeds as well. How do you sift through this data to find the most applicable to your organization? How best can you weave threat intel into your existing security tools and security operations? In this panel discussions, threat intelligence experts will provide insight and guidance on how to manage the deluge of threat intel and how best to apply it to your security posture.
Panel 2

Getting a Step Ahead of the Attacker with Threat Hunting, Vulnerability Scanning & Penetration Testing

Sponsored by: Invicti / Immersive Labs
Today’s threat landscape calls for a more proactive approach to security, with regular vulnerability scanning and penetration testing of IT infrastructure as well as threat hunting by the security team or your security service provider. How do you set up a vuln scanning and pen testing regimen? What’s the best way to begin and conduct threat hunting? How do you apply the results of these practices to tighten up your defenses? Threat hunting specialists will share intel on how to practice proactive security using these processes as well as emerging technologies that support them.
Panel 3

Cyberattack Response: How to Stop an Attack in its Tracks

Sponsored by: Delinea / Palo Alto Networks, Unit 42
Today’s sophisticated attackers often employ multi-pronged exploits that are designed to evade traditional enterprise defenses. So if they do get past your defenses, how do you detect it quickly enough to prevent further escalation? How does this analysis work? How much of it can be automated? What role do artificial intelligence and machine learning play in security analysis? In this panel discussion, experts will discuss how your organization can improve its detection and analysis processes.
Demo

Demo with Menlo Security

Sponsored by: Menlo Security
Today’s sophisticated attackers often employ multi-pronged exploits that are designed to evade traditional enterprise defenses. So if they do get past your defenses, how do you detect it quickly enough to prevent further escalation? How does this analysis work? How much of it can be automated? What role do artificial intelligence and machine learning play in security analysis? In this panel discussion, experts will discuss how your organization can improve its detection and analysis processes.

Understanding Cyber Attackers and Their Methods

November 17, 2022
11:00AM – 5:00PM EST
SPEAKERS
Charles Clancy
SVP, GM MITRE Labs, and Chief Futurist, MITRE
Charles Clancy is senior vice president, general manager of MITRE Labs, and chief futurist. He is responsible for sparking innovative disruption, accelerating risk-taking and discovery, and delivering real-time technology capabilities and execution through the company’s laboratories, solution platforms, and MITRE Fellows program. He leads technical innovation to anticipate and meet the future demands of government sponsors and industry and academic partners.
Mike Lemberger Senior Vice President, Chief Risk Officer for North America at Visa
After spending four years living in London and leading Visa’s European Product and Solutions Division, Mike took over as the Chief Risk Officer for Visa’s North American Operation. Mike brings 25 years of experience in product development and database design to the continually evolving world of payments and risk. His responsibilities include compliance, operational, settlement, and brand risk, plus a keen focus on combating fraud and delivering sound risk management practices across the digital payments ecosystem.

Roger Grimes
Data-Driven Defense Evangelist, KnowBe4

Roger A. Grimes is a Data-Driven Defense Evangelist at KnowBe4. He is a 30-year computer security professional, author of 13 books and over 1,200 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. Grimes was a weekly security columnist for InfoWorld and CSO magazines from 2005 - 2019. He regularly presents at national computer security conferences, and has been interviewed by national magazines and radio shows, including Newsweek magazine and NPR’s All Things Considered. Roger is known for his often contrarian, fact-filled viewpoints.
Barak Feldman
Senior Vice President of PAM and Identity Security at CyberArk
Joining CyberArk in 2001, Barak brings a deep technical and business background with over 20 years of experience in designing and implementing security and compliance solutions at many of the Fortune 500. In his role Barak leads CyberArk’s Privileged Access Management (PAM) business and is helping the company lead the Identity Security market. His expertise includes Regulatory Compliance, Access Management and specifically the current threats surrounding privileged access to the highest risk assets within the enterprise.

Andy Thompson
Research Evangelist, CyberArk Labs

Andy Thompson is part of the Research Labs Division at CyberArk. This is the team within CyberArk that does ongoing research into offensive technology and information security trends. Before joining CyberArk 5 years ago, Andy spent his time in the trenches as a Senior Systems Admin and Security Engineer. He’s worked IT and Security with large hospitals, movie theater chains, bars and restaurants, other service industries, as well as global retail organizations. Andy is CISSP certified by ISC-squared, and a GIAC certified pen-tester. Andy is also an active member of the Dallas Hacking scene where he’s known as the “Travel-Hacker”. He and his family love to travel all over the world on a shoestring budget.

Roy Galili Darnell
Data Science Team Lead, Perception Point

Roy Darnell is a Data Science Team Lead at Perception Point, where he develops algorithms to counter cyberattacks using state-of-the-art machine learning tools. Previously, he worked at Amdocs GenZ Labs and SolarEdge. He also founded his own start up that focused on the automation of biological and medical research. He earned a B.Sc. in Computer Science & Biology from Tel Aviv University and was a captain in the Israeli Air Force, leading sensitive and complex operations.
Naomi Buckwalter Director of Information Security & IT, Contrast Security
Naomi Buckwalter, CISSP CISM is the Director of Information Security & IT at Beam Technologies. She has over 20 years’ experience in IT and Security, and has held roles in Software Engineering, Security Architecture, Security Engineering, and Security Leadership. As a cybersecurity career adviser and mentor for people around the world, her passion is helping people, particularly women, get into cybersecurity. Naomi volunteers with Philly Tech Sistas, a Philadelphia-based nonprofit helping women of color prepare for a career in IT and tech. Naomi has two Master's degrees from Villanova University and a Bachelors of Engineering from Stevens Institute of Technology. In her spare time, Naomi plays volleyball and stays active as the mother of two boys.
Dan Murphy Distinguished Architect, Invicti Security
Dan Murphy has 20+ years of experience in the cybersecurity space, specializing in web security, distributed systems, and software architecture. As a Distinguished Architect at Invicti, his focus is on ensuring that Invicti products across the entire organization work together to provide a scalable, performant, and secure dynamic analysis experience.

Chris Brewer
Director, Palo Alto Networks Unit 42

Chris Brewer, a director at Unit 42, is an expert in digital forensics and incident response who has over two decades of experience as an IT professional, with a focus on computer security, data centers, and servers. He is also an experienced IT security instructor who has taught at the National Computer Forensics Institute and has conducted training for various law enforcement and government agencies worldwide.
Santha Subramoni Head of Tata Consultancy Services’ Cybersecurity Practice
Santha Subramoni is the head of Tata Consultancy Services’ (TCS) cybersecurity practice — one of the fastest growing service lines at TCS with more than 13,000 practitioners, providing consulting and managed security services to over 500 global enterprises across industries. She is responsible for the strategy and operations of the unit, which has grown exponentially under her leadership by delivering large, transformative, and innovative cybersecurity engagements for marquee enterprises. Her specialties include cyber defense technologies, managed security services, cognitive security technologies, security platforms, automation, and business transformation. Santha has more than 25 years of a diverse technology and leadership experience and has led the development of two business units from ground up. Santha holds a Bachelor of Technology in electrical and electronics engineering from Kerala University.
Mark Guntrip
Sr Director, Cybersecurity Strategy, Menlo Security
Mark Guntrip leads cybersecurity strategy at Menlo Security.He brings over twenty years experience in the enterprise security market where, through a range of roles including engineering, product management and product marketing. He has a proven track record of building success in new markets as well as promoting growth within more established areas. Prior to Menlo Security, Guntrip held various management roles within companies including Proofpoint, SymantecandCisco.Guntrip earned his Master’s degree in Electronic Engineering from Southampton University, UK.
Kev Breen
Director, Cyber Threat Research, Immersive Labs
Kev Breen is the director of Cyber Threat Research at Immersive Labs where he researches new and emerging cyber threats. Prior to his civilian life Kev, spent 15 years in the military serving as a Radio Technician and Trunk Comms Specialist before transitioning to a Cyber Security Analyst, specializing in Malware Analysis. After leaving the military, he continued to work in Cyber Security running a CIRT team for a defense contractor before joining Immersive Labs. Outside of his work life, Kev can be found publishing or contributing to Open Source tools and projects or reading a Sci-Fi book.
Joseph Carson
Chief Security Scientist & Advisory CISO, Delinea
Joseph Carson has more than 25 years' experience in enterprise security; He has authored Privileged Account Management for Dummies and Cybersecurity for Dummies, is a cyber security professional and an ethical hacker. Carson is a cyber security advisor to several governments as well as critical infrastructure, financial and transportation companies. Carson is a seasoned speaker and has presented at conferences globally.
Samantha (Sam) Isabelle Beaumont
Principal Security Consultant, IOActive
Sam Beaumont is a Principal Security Consultant with IOActive, focused on red teaming and cyber-physical systems security – with a specialization in vehicle security. She has served security research roles in offensive, embedded and hardware, industrial control systems, telematics, and telecommunications. Additionally, Sam has served as a digital forensic analyst and vulnerability researcher, as well as being a computer security and exploitation development training fellow. Her depth of experience is the result of her passion for pursuing specialized research topics in automotive engineering, security in EV/EVSE and telematics/telecommunications. In her spare time, she is often engaged in diving as a scuba dive master.
Vidya Tambe
Senior Detection and Response Analyst, Rapid7
Vidya Tambe is an intrusion detection and response professional with expertise in digital forensics analysis and information technology. As a senior detection and response analyst at Rapid7, Vidya does Incident Response, Hunting, mentor other analysts, suggests and modifies detections, and works with customer advisors to help customers with their technical issues. Before joining Rapid7, Vidya served as a detection and response analyst at Expel. Prior to that, she was a teaching assistant and lecturer on coding and scripting languages such as Java, VB 6.0, and C++. Vidya holds a master’s degree in cyber/computer forensics and counterterrorism from George Mason University. She also holds Master of Science and Bachelor of Science degrees in information technology from University of Mumbai.
Santha Subramoni Head of Tata Consultancy Services’ Cybersecurity Practice
Santha Subramoni is the head of Tata Consultancy Services’ (TCS) cybersecurity practice — one of the fastest growing service lines at TCS with more than 13,000 practitioners, providing consulting and managed security services to over 500 global enterprises across industries. She is responsible for the strategy and operations of the unit, which has grown exponentially under her leadership by delivering large, transformative, and innovative cybersecurity engagements for marquee enterprises. Her specialties include cyber defense technologies, managed security services, cognitive security technologies, security platforms, automation, and business transformation. Santha has more than 25 years of a diverse technology and leadership experience and has led the development of two business units from ground up. Santha holds a Bachelor of Technology in electrical and electronics engineering from Kerala University.
Mark Guntrip Sr Director, Cybersecurity Strategy, Menlo Security
Mark Guntrip leads cybersecurity strategy at Menlo Security.He brings over twenty years experience in the enterprise security market where, through a range of roles including engineering, product management and product marketing. He has a proven track record of building success in new markets as well as promoting growth within more established areas. Prior to Menlo Security, Guntrip held various management roles within companies including Proofpoint, SymantecandCisco.Guntrip earned his Master’s degree in Electronic Engineering from Southampton University, UK.
Kev Breen
Director, Cyber Threat Research, Immersive Labs
Kev Breen is the director of Cyber Threat Research at Immersive Labs where he researches new and emerging cyber threats. Prior to his civilian life Kev, spent 15 years in the military serving as a Radio Technician and Trunk Comms Specialist before transitioning to a Cyber Security Analyst, specializing in Malware Analysis. After leaving the military, he continued to work in Cyber Security running a CIRT team for a defense contractor before joining Immersive Labs. Outside of his work life, Kev can be found publishing or contributing to Open Source tools and projects or reading a Sci-Fi book.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties. Jackson Higgins was recently selected as one of the Top 10 Cybersecurity Journalists in the US, and named as one of Folio's 2019 Top Women in Media. She began her career as a sports writer in the Washington, DC metropolitan area, and earned her BA at William & Mary. Follow her on Twitter @kjhiggins.
Fahmida Rashid
Features Editor, Dark Reading
As Dark Reading’s managing editor for features, Fahmida Y Rashid focuses on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers. Prior to specializing in information security, Fahmida wrote about enterprise IT, especially networking, open source, and core internet infrastructure. Before becoming a journalist, she spent over 10 years as an IT professional -- and has experience as a network administrator, software developer, management consultant, and product manager. Her work has appeared in various business and test trade publications, including VentureBeat, CSO Online, InfoWorld, eWEEK, CRN, PC Magazine, and Tom’s Guide.
Tara Seals
Managing Editor, Dark Reading
Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications, and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine. She also spent 13 years working for Informa (formerly Virgo Publishing), as executive editor and editor-in-chief at publications focused on both the service provider and the enterprise arenas. A Texas native, she holds a B.A. from Columbia University, lives in Western Massachusetts with her family and is on a never-ending quest for good Mexican food in the Northeast.

Becky Bracken
Editor, Dark Reading

Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.
Karen Spiegelman Features Editor, Dark Reading
Karen joined Dark Reading in January 2022 as features editor. She's been in tech editing since before the img tag was introduced, working for outlets such as the IEEE Computer Society, CNET Download.com, and TechTV. She lives in Los Angeles with her husband, son, and two cats.

Elvia Finalle
Analyst with Omdia

Elvia is an experienced analyst in Omdia’s cybersecurity team covering various market areas with a demonstrated history of working in the management consulting industry. Her specialized coverage includes SecOps and enterprise awareness training. Elvia has been creating databases and analyzing market trends for over three years in media and entertainment, ICT, and cybersecurity. Elvia previously served as a research analyst at Frost & Sullivan, where she researched a full range of markets in the following industries: enterprise storage, broadcasting, cinematographic cameras, VR, and 360° video. Before entering the research industry, Elvia was engaged in a variety of roles in project management, sales, and public relations.
Brian Wrozek Principal Analyst, Forrester
Brian Wrozek is a seasoned cybersecurity pro with 20+ years of experience in IT and information security and management. Prior to joining Forrester, he has led enterprise cybersecurity, physical security, and privacy teams at companies such as Texas Instruments, Alliance Data, and Optiv. Brian was responsible for strategic and operational duties including governance, risk, compliance, threats, operations, investigations, and incident response. As an adjunct professor in the Satish and Yasmin Gupta College of Business at the University of Dallas, Wrozek teaches graduate-level cybersecurity courses.
Anneka Gupta
CPO, Rubrik

Anneka brings more than a decade of product and SaaS expertise, and oversees diversity, inclusion, and belonging initiatives at Rubrik. Prior to that, she was President and Head of Product and Platforms at LiveRamp. Anneka also sits on the board of directors for Tinuiti.
Tara Seals
Managing Editor, Dark Reading
Tara Seals has 20+ years of experience as a journalist, analyst and editor in the cybersecurity, communications, and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine. She also spent 13 years working for Informa (formerly Virgo Publishing), as executive editor and editor-in-chief at publications focused on both the service provider and the enterprise arenas. A Texas native, she holds a B.A. from Columbia University, lives in Western Massachusetts with her family and is on a never-ending quest for good Mexican food in the Northeast.

Becky Bracken
Editor, Dark Reading

Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.
Karen Spiegelman Features Editor, Dark Reading
Karen joined Dark Reading in January 2022 as features editor. She's been in tech editing since before the img tag was introduced, working for outlets such as the IEEE Computer Society, CNET Download.com, and TechTV. She lives in Los Angeles with her husband, son, and two cats.

Elvia Finalle
Analyst with Omdia

Elvia is an experienced analyst in Omdia’s cybersecurity team covering various market areas with a demonstrated history of working in the management consulting industry. Her specialized coverage includes SecOps and enterprise awareness training. Elvia has been creating databases and analyzing market trends for over three years in media and entertainment, ICT, and cybersecurity. Elvia previously served as a research analyst at Frost & Sullivan, where she researched a full range of markets in the following industries: enterprise storage, broadcasting, cinematographic cameras, VR, and 360° video. Before entering the research industry, Elvia was engaged in a variety of roles in project management, sales, and public relations.
Dan Mellen
Global Lead for Security Cloud and Infrastructure Practice, Accenture
Yaniv Bar-Dayan
Co-Founder & CEO, Vulcan Cyber
Frederick “Flee” Lee
CISO, Gusto
Ryan Alban
Sr. Manager of Global Solution Leads, Secureworks
Patrick Grillo
Senior Director, Solutions Marketing, Fortinet
Brad Moldenhauer
CISO – Americas, Zscaler
Nadav Arbel
Co-Founder & CEO, CYREBRO
Matt Mellen
Director, Security Operations, Palo Alto Networks
Mark Guntrip
Sr. Director Cybersecurity Strategy, Menlo Security
Jennifer Ayers
Consultant with NextJen, LLC
(More Speakers Coming Soon)
SPONSORS
Diamond
cyberark-cards
b4-cards
Platinum
palounit-2
menlo-cards
contrast-cards
delinea-new
invicti-new
perception-cards
immersive-labs

Natalie Silvanovich
Security Researcher,
Google

Natalie Silvanovich is a security researcher on Google Project Zero. Her current focus is messaging applications and video conferencing. Previously, she worked in mobile security on the Android Security Team at Google and as a team lead of the Security Research Group at BlackBerry, where her work included finding security issues in mobile software and improving the security of mobile platforms. Outside of work, Natalie enjoys applying her hacking and reverse engineering skills to unusual targets and has spoken at several conferences on the subject of Tamagotchi hacking.