Archived Events 2023

The Stakes Rise as Lateral Movement is the New Cyber Battleground

January 17, 2023
5:30pm - 8:30pm ET


The Palm
6705-B Phillips Place Court
Charlotte, NC 28210

Drake Cody
Head of Global Cybersecurity Operations

Enterprises are facing an unprecedented level of threat and complexity as they operate in today’s multi-cloud and digital world. Consequently, the stakes in security continue to rise and lateral security has become the new battleground. Join us for an engaging discussion on how to best defend against the broadening attack surface where security teams can garner an improved level of visibility across workloads, devices, users and networks to detect, protect, and respond to cyber threats. We will also explore how security teams can make more informed decisions to detect and stop lateral movement of attacks that are stymied due to the limited context of their systems.

Staying Ahead of the Curve: How Cybersecurity Executives Can Focus on Preventing Evasive HEAT Attacks

January 12, 2023
5:30pm - 8:30pm PT
The Sea by Alexander's Steakhouse
4269 El Camino Real
Palo Alto, CA 94306
Kannan Perumal

Kannan Perumal
Applied Materials

Just like any business or industry, cybercriminals are continually on the lookout for ways to innovate and remain relevant as trends and market dynamics evolve. The shift to remote and hybrid work and acceleration of cloud adoption has transformed the daily routines for most workers, with most of it revolving around the browser. It only makes sense from an attacker’s perspective to cast a line where the majority of fish are swimming because they can evade detection from traditional security tools. It then comes as no surprise that Highly Evasive Adaptive Threats (HEAT) represent an important evolution in attacker techniques to exploit key gaps in traditional security defenses. Join us for a forward-thinking discussion on how organizations can focus on three key tenets to limit their susceptibility to these types of attacks: shifting from a detection to a proactive mindset, stopping threats before they hit the endpoint, and incorporating advanced anti-phishing and isolation capabilities. We will also explore how HEAT attacks evade existing security defenses where hackers exploit the weaknesses of the existing security stack, are building sophisticated delivery mechanisms to evade detection as well as how to prevent them.