Threat Detection and Incident Response Summit

Threat Detection Summit 2025

May 21, 2025

Register

SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit brings together security practitioners from around the world to share war stories on breaches and the murky world of high-end cyberattacks.

This event delves into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register for Virtual Events

Platinum Sponsors

Palo Alto NetworksOktaGold Sponsors

Wiz

 

SecurityScorecard

 

Ping Identity

Sponsorship Information

In an era where “assume breach” is the status quo, organizations must address the maturity of threat detection and incident response programs to mitigate the barrage of incoming malware and ransomware attacks.

SecurityWeek's Threat Detection and Incident Response (TDIR) Summit dives into threat hunting tools and frameworks, and explore the value of threat intelligence data in the defender’s security stack.

This must-attend forum is designed to delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and explore tools and tricks needed in a modern organization.

Expect robust debate on the use of AI/LLMs in incident response tooling, the cost (and curse) of the “log-everything” movement, the value of threat intelligence, and the blending of sophisticated APTs with cybercrime activities.

Key Topics to Be Addressed:

  • The extension of Endpoint Detection and Response (EDR) systems beyond traditional parameters, advancing into the network layers to provide more robust defense mechanisms.
  • Detailed examination of various threat hunting tools and frameworks, including a look at the latest technologies and methodologies being used in modern security programs.
  • The critical role of threat intelligence data and trends around monetization of feeds and government-controlled data release.
  • Best practices in logging and monitoring to spot malware infections and sharing of IOCs (indicators of compromise) artifacts to secure the ecosystem.
  • May 21, 2025 11:00 AM ET
    Insights from the 2025 Unit 42 Global Incident Response Report

    In a world where cyberattacks are intensifying daily, AI-driven techniques and calculated disruptions from adversaries are redefining how organizations must approach cybersecurity. In 2024, the Unit 42® Incident Response team handled 500+ of the world’s largest cyberattacks — 86% of which directly impacted business operations. Leveraging insights from these incidents, the 2025 Unit 42 Global Incident Response Report delivers an in-depth analysis of the evolving threat landscape and attackers' tactics and techniques.

    In this session, we explore:

    • The increasing speed of attacks: Understand how attackers leverage AI and advanced tactics to reach exfiltration within an hour, leaving minimal time to respond.
    • Evolving attack techniques: Discover how 70% of incidents now span three or more attack surfaces, emphasizing the need for holistic security across endpoints, networks, cloud environments, and human factors.
    • Key emerging threat trends: Explore the rise of disruptive extortion, supply chain vulnerabilities, insider threats, and AI-assisted attacks, and how they impact organizations across industries.

    Speakers:

    • Michael Sikorski, Chief Technology Officer and VP of Engineering
    • Sam Rubin, VP, Global Head of Operations
    • David Moulton, Director, Content Marketing
  • May 21, 2025 11:30AM ET
    A Security Imperative: Identity Threat Visibility and Remediation

    In today’s evolving threat landscape, staying ahead of identity-related risks is critical to maintaining business continuity. Join us for an insightful session where we will share proven strategies to detect, respond to, and mitigate identity threats—with speed and efficiency.

    What You’ll Learn:

    • How to harness the power of Okta and our technology partners to detect and address threats in real-time.
    • The role of advanced risk analytics, AI-driven tools, and automated response systems in enhancing security.
    • Actionable steps to secure both users and devices while minimizing disruptions.

    This session is tailored for IT and Security professionals looking to strengthen their organization’s defenses. Attendees will learn the importance of implementing integrated solutions, like CrowdStrike, that enable real-time threat remediation and provide deeper visibility into potential identity risks across the enterprise.

    Speakers:

    • Johnathan Campos, Senior Product Marketing Manager, Okta
    • John Smith, Integration Solutions Architect, CrowdStrike
  • May 21, 2025 12:00PM ET
    Living Off the Cloud: How to Move Faster Than Attackers with CDR

    Living-off-the-cloud attacks are on the rise. Executing rapid, cloud-native techniques to escalate privileges, move laterally between environments, and access critical assets, attackers are targeting the cloud more effectively than ever.

    This session will focus on a real-world living-off-the-cloud attack case study, analyzing a step-by-step account of the attack as it unfolded from the attackers’ perspective.

    We will then switch gears and rewind the attack, explaining how effective detection and response methodologies
    could — and should — have prevented every step of the attack. Defeating these threats requires powerful centralized visibility and control of all cloud environments and resources.

    Key Takeaways:

    • Learn how to analyze cloud-native attack techniques and lateral movements.
    • Understand the methodologies and tools that can stop sophisticated cloud attacks.
    • Discover how centralized visibility and control can help reclaim the initiative against advanced threats.

    Speaker:

    • Lauren Place, Senior Product Marketing Manager, Wiz
  • May 21, 2025 12:30 PM
    Break: Please Visit Sponsor Booths

    Please visit the virtual expo hall and explore the virtual conference center to learn and compete to win prizes!

  • May 21, 2025 12:45PM ET
    A CISO's Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?

    With 98% of organizations experiencing vendor breaches, preparedness is critical. This session equips CISOs and security leaders with strategies to effectively manage third-party cyber incidents. Learn how to leverage a robust playbook to move from reactive scrambling to proactive resilience.

    Attend to Learn How To:

    • Stop Scrambling: Implement rapid response frameworks.
    • Communicate Clearly: Develop winning crisis communication plans.
    • Become Proactive: Discover preventative best practices.
    • Ask the Right Questions: Vet vendor cybersecurity effectively.
    • Learn from the Pros: Gain insights from real-world scenarios.

    Don’t let vendors be your vulnerability. Join us to streamline response, communicate effectively, and build a stronger digital ecosystem against escalating third-party threats.

    Speaker:

    • Steve Cobb, CISO at SecurityScorecard
  • May 21, 2025 1:15PM ET
    Fighting Deepfakes: Transformative Approaches to Protect Your Business

    Deepfake-related incidents worldwide increased over 245% in 2024, with some regions seeing alarming growth rates of over 3,000%.
    When it comes to identity crime, organizations are playing a brand new game with high stakes and uncertain rules.
    Accepting that human eyes and ears are simply not equipped to accurately discern what is and isn’t real in the digital sphere, is your organization prepared for these threats?

    Join us for this insightful session as we dive deep into the world of deepfakes; discuss common attack vectors across workforce, customer, and B2B identity use cases; demonstrate effective defense strategies; and recommend best practices to stay ahead of attackers and ensure your organization is protected in an increasingly AI-driven world.

    Key Takeaways:

    • The state of deepfake identity threats and the associated business impacts.
    • Common attack vectors and points of weakness.
    • Sample scenarios across industries and use cases.
    • Existing and new approaches to mitigate deepfake-related fraud.
    • What’s on the horizon as this threat vector continues to evolve.

    Speakers:

    • Darrell Geusz, Product Lead, Neo at Ping Identity
    • Maya Ogranovitch Scott, Senior Solution Manager, Fraud at Ping Identity
  • May 18, 2022 1:45PM ET
    Leveraging ISP and ASN as New Indicators of Compromise (IOC) in Cyber Threat Intelligence

    Traditional threat intelligence often relies on identifying malicious IPs individually, which can be reactive and slow. This session explores different KQL queries to show how ISPs and ASNs can serve as powerful new IOCs, enabling security teams to proactively monitor entire IP ranges associated with suspicious activity.

    By tagging and tracking suspicious ISPs, organizations can accelerate threat detection and mitigation, reducing reliance on waiting for specific IP-based alerts. This approach enhances visibility, speeds up response times, and strengthens cyber defense strategies.

    Speaker:

    • Sergio Albea, Cloud Security Expert/Architect addicted to Threat Hunting
  • May 21, 2025 2:15PM
    The Fog of threat: A Ransomware Investigation
    Threat actors are constantly pivoting tactics for ransomware. They’ll do whatever it takes to improve their chances —
    ramping up speed, causing damage, and pressuring their victims. So, how can organizations effectively defend themselves?

    Step inside the shoes of Unit 42® experts for a real ransomware attack. Hear about a threat actor who gained access
    to the systems of a large manufacturer, demanding a multimillion-dollar ransom. See how Unit 42 responded.

    Join Cuong Dinh, Unit 42 Principal Consultant, Palo Alto Networks, to hear:

    • A firsthand account of the investigation.
    • The anatomy of the attack.
    • What steps Unit 42 and the client took to get back up and running.
    • Insights into ransomware trends and evolving techniques.
    • Recommendations for defending against attacks.
  • May 21, 2025 2:35PM
    Closing the Gaps: Strengthen Security Posture & Stop Attacks
    Identity is the foundation of modern security, yet sophisticated attacks continue to evolve—exploiting misconfigurations, hijacking sessions, and leveraging identity sprawl to bypass traditional defenses. To stay ahead, organizations need a proactive, identity-first security strategy.

    Join us for an illuminating demo where our experts showcase how Okta's Identity Security Posture Management (ISPM) and Identity Threat Protection with Okta AI (ITP) provide the visibility and continuous protection you need—no matter your stack or security ecosystem.

    In This Session, You Will Learn How To:

    • Uncover hidden risks by identifying shadow IT, privileged accounts without MFA, and lingering access.
    • Detect and respond to active threats in real-time, such as session hijacking.
    • Implement a comprehensive identity security strategy to protect your entire digital ecosystem.

    Don’t wait for an identity breach to reveal your blind spots. Watch now to learn how to close identity security gaps.

  • May 21, 2025 3:35PM
    An Introductory Demonstration of Deepfake Mitigation with PingOne Verify

    This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.

  • May 18, 2022 3:35PM ET
    Expo and Networking

In this keynote at SecurityWeek's 2021 Threat Intelligence Summit, John Lambert, GM of the Microsoft Threat Intelligence Center, discusses how it’s more important than ever for defenders and organizations to come together and better share information that can help the entire ecosystem protect against emerging threats. Lambert shares specific examples of how community resources such as GitHub, MITRE’s ATT&CK Framework, Sigma rules, CodeQL queries and Jupyter notebooks have all been used in recent months to “open-source” security to better defend against sophisticated threats such as NOBELIUM and others.

Register Now

time iconMay 22, 2024 11:00

Ransomware's Favorite Back Office Products

We're all unfortunately aware of Ransomware groups using Exchange vulnerabilities to gain a foothold into organizations, but I bet you can't guess what other software they've been targeting lately! Come hear about recent Ransomware detection stories discovered by SentinelOne's threat-hunting team, Watchtower.

  • Learn about a recent trend of abuse targeting another popular back office software.
  • Understand how to prevent, detect, and respond to these threats.
speaker headshot

Jake Mowrer
SentinelOne, Office of the Field CISO - Security Specialist

time iconMay 22, 2024 11:30

Fortifying Cyber Defense: The Synergy of Threat Intel & Incident Response

In today's complex and ever-changing cybersecurity landscape, effective collaboration between threat intelligence and incident response teams is paramount. This session explores the symbiotic relationship between these two critical functions, delving into the challenges posed by emerging threats and providing insights into how SOC teams can strengthen their defenses against bad actors. Through real-world examples and best practices, attendees will gain practical strategies for integrating threat intelligence into incident response processes, leveraging automation and AI, and preparing for future trends in cybersecurity.

Key Takeaways:

  • Understand the role of threat intelligence in enhancing incident response capabilities.
  • Learn strategies for effective collaboration between threat intelligence and incident response teams.
  • Explore emerging technologies and trends shaping the future of cybersecurity defense.
speaker headshot

John Pirc
NetWitness, Director, Product Line Management

speaker headshot

Steve Baer
NetWitness, Global VP, Field Sales & Service

speaker headshot

Arthur Fontaine
NetWitness, Head, Product Marketing

time iconMay 22, 2024 12:15

BREAK

Please visit our sponsors in the Exhibit Hall and explore the resources in their booths. They're standing by to answer your questions now.

time iconMay 22, 2024 12:30

Establishing Trust in a Zero Trust world is a Continuous Process

It’s no secret that the threat landscape has continued to evolve and successful attackers are no longer hacking in, but logging in. As Zero Trust becomes the new security paradigm, what does this really mean in a digital landscape where it feels like you can’t trust anyone or anything anymore? When considering the role that identity plays within Zero Trust, it’s helpful to think of verifying Identity as a continuous process rather than a discrete event. A robust identity platform needs to provide the means to not only manage identity, verify users at every stage, but also continuously evaluate the validity of that users session.

Join us to hear more about:

  • Why Zero Trust is more than a buzzword with a look at the global trends from our annual Zero Trust report
  • What the three stages of Identity verification are, the potential threats at each stage, and how to stop them.
  • How to safeguard your ecosystem with continuous risk assessment with Identity-centric threat detection and response
speaker headshot

Eila Shargh
Okta, Director, Solutions Product Marketing-Workforce

time iconMay 22, 2024 13:00

Building Your Ransomware Preparedness Plan

In today's ever-evolving cyber landscape, incident response and network protection are paramount for organizations of all sizes. This session delves into the strategies and tactics essential for safeguarding networks from vulnerabilities and efficiently mitigating threats. From identifying potential weaknesses to implementing robust incident response plans, attendees will gain insights into practices proven effective, and practical approaches to fortify their organization's defenses. Join us to explore real-life use cases from the frontline of cyber defense and learn how to arm yourself with the knowledge needed to defend against emerging threats.

Key points to be covered:

  • Proactive approaches to identifying and addressing network vulnerabilities
  • Effective incident response strategies to contain and mitigate cyber threats
  • Collaboration techniques to enhance incident response efforts and strengthen network resilience
  • Real-life use case from a global, frontline incident response team
speaker headshot

James Sobel
NetWitness, Global Pre-Sales Lead, Incident Response

speaker headshot

Marco Faggian
NetWitness, Principal Consultant

time iconMay 22, 2024 13:30

Bringing IR into the Cloud Age

The cloud brings unprecedented opportunities - but also some challenges. Automation is essential or we won’t survive, and we need to completely change the way our organizations think about DFIR.

speaker headshot

Paul Stamp
Cado, VP of Products

time iconMay 22, 2024 13:50

BREAK

Please visit our sponsors in the Exhibit Hall and explore the resources in their booths. They're standing by to answer your questions now.

time iconMay 22, 2024 14:05

AI-Driven Binary Analysis: Next Generation Malware Detection at Speed & Scale

Today’s businesses are faced with an exponentially growing number of files that need to be effectively analyzed without slowing down operations. SOC teams must constantly worry about malicious files flowing into and around their network, be it from email, web downloads, cloud services, mobile devices, supply chain, or other sources. Not only does the sheer volume of files pose a challenge for analysts, but so does the increasing size and complexity of files. Adversaries have become adept at developing sophisticated malware hidden inside complex file structures to circumvent detection by traditional security tools, including endpoint security, email protection, and sandbox environments, which are limited in their depth and speed of analysis, as well as their inability to analyze large file sizes and certain file types. Learn how ReversingLabs’ high-speed binary analysis overcomes these challenges:

  • Inspect thousands to hundreds of thousands of files per day in real-time
  • Analyze large file sizes up to 100GB
  • Identify advanced malware missed by other tools
  • Reduce dependency on sandboxes
speaker headshot

Jason Valenti
ReversingLabs, Director of Product Management - Malware Analysis and Threat Hunting

time iconMay 22, 2024 14:25

Compromised Credentials in 2024: What to know about the world’s #1 attack vector

Credentials, made up of passwords and usernames, serve as the keys to our online existence. According to Lastpass, professionals manage up to 200 sets of credentials on average, emphasizing the need for strong, unique passwords that are regularly updated. When credentials are compromised, cyber attackers gain frictionless entry into sensitive systems and can often move laterally to find your crown jewels. Attend this webinar to understand:

  • Execution methods behind compromised credential attacks
  • What the bad actors do with stolen identities
  • Preventative best practices to implement today
speaker headshot

Tim Chase
Lacework, Field CISO

speaker headshot

James Condon
Lacework

time iconMay 22, 2024 14:55

Fireside Chat: Bennett Pursell on the OpenSSF Siren Threat Intel Project

The Open Source Security Foundation (OpenSSF) has introduced the OpenSSF Siren, a community data-sharing initiative aimed at bolstering the defenses of open source projects worldwide. In this fireside chat, OpenSSF Ecosystem Strategist Bennett Pursell discusses the origins and goals of OpenSSF Siren, exploring transparent access to data that can help small- and medium-sized businesses during active incidents. Pursell also shares insights on the value of threat intelligence, the shelf life of IOC (indicators of compromise) and how businesses with limited resources can mitigate exposure to risk.

speaker headshot

Bennett Pursell
OpenSSF, Ecosystem Strategist

speaker headshot

Ryan Naraine
SecurityWeek, Editor-at-Large

time iconMay 22, 2024 15:25

SentinelOne Demo: Combating the Threats of Today and Tomorrow with The SentinelOne Singularity™ Platform

In this demonstration, SentinelOne showcases how to fortify your environment against evolving threats using the Singularity™ Platform. Watch to see the critical importance of having visibility across endpoints, cloud, data, and identities for understanding and responding to these threats. During the demonstration, SentinelOne covers:

  • The impact of modern threats on traditional security measures
  • The significance of visibility across various aspects of an organization's IT infrastructure
  • How the SentinelOne Singularity™ Platform can protect your business from ransomware and other advanced threats.
time iconMay 22, 2024 15:40

Okta FastPass: Zero trust authentication for phishing resistant, passwordless access

Okta FastPass: Zero Trust Authentication For Phishing Resistant, Passwordless Access Sr. Technical Marketing Manager, Harish Chakravarthy demonstrates how Okta FastPass offers phishing resistance to advanced phishing attacks such as adversary-in-the middle.

time iconMay 22, 2024 15:45

Cado Security Demo

Cado Security is the first investigation & response automation platform focused on revolutionizing IR for the hybrid world. Cado reduces response times & empowers security teams to add critical context to everyday security investigations.

time iconMay 22, 2024 16:05

ReversingLabs Demo: Advanced Hunting with YARA at Scale

Import, develop, test, and deploy YARA rules at scale. Perform enterprise-wide YARA scanning with custom rule matching and targeted retro-hunts against thousands of object characteristics from any file or email source.

time iconMay 22, 2024 16:25

Lacework Demo: Polygraph Data Platform

Lacework was founded on the principle that security is a data problem, so we built our platform to ingest various cloud data sources from AWS, Azure, and GCP activity in a visual way. Lacework Polygraph automates detections at scale and enables organizations to reduce complexity and focus valuable resources more effectively by alerting only on the events that matter.

Solutions Theater (On-demand)

time icon

[On-Demand] Okta FastPass: Zero trust authentication for phishing resistant, passwordless access

Okta FastPass: Zero Trust Authentication For Phishing Resistant, Passwordless Access Sr. Technical Marketing Manager, Harish Chakravarthy demonstrates how Okta FastPass offers phishing resistance to advanced phishing attacks such as adversary-in-the middle.

time icon

[On-Demand] SentinelOne Demo: Combating the Threats of Today and Tomorrow with The SentinelOne Singularity™ Platform

In this demonstration, SentinelOne showcases how to fortify your environment against evolving threats using the Singularity™ Platform. Watch to see the critical importance of having visibility across endpoints, cloud, data, and identities for understanding and responding to these threats. During the demonstration, SentinelOne covers:

  • The impact of modern threats on traditional security measures
  • The significance of visibility across various aspects of an organization's IT infrastructure
  • How the SentinelOne Singularity™ Platform can protect your business from ransomware and other advanced threats.
time icon

[On-Demand] Cado Security Demo

Cado Security is the first investigation & response automation platform focused on revolutionizing IR for the hybrid world. Cado reduces response times & empowers security teams to add critical context to everyday security investigations.

time icon

[On-Demand] Lacework Demo: Polygraph Data Platform

Lacework was founded on the principle that security is a data problem, so we built our platform to ingest various cloud data sources from AWS, Azure, and GCP activity in a visual way. Lacework Polygraph automates detections at scale and enables organizations to reduce complexity and focus valuable resources more effectively by alerting only on the events that matter.

time icon

[On-Demand] ReversingLabs Demo: Advanced Hunting with YARA at Scale

Import, develop, test, and deploy YARA rules at scale. Perform enterprise-wide YARA scanning with custom rule matching and targeted retro-hunts against thousands of object characteristics from any file or email source.

Event Details