As security teams look to foundational strategies to protect corporate assets, the reduction of attack surface throughout the organization takes center stage. In this focused summit, SecurityWeek brings together expert defenders to share best practices around reducing attack surfaces in...
SecurityWeek’s inaugural Cyber AI & Automation Summit pushes the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs. Become a Sponsor Register to Attend (Free for Business Users)...
This virtual summit will examine the current state of supply chain attacks, the weakest links along the way, the biggest supply chain hacks in history, and best practices for managing this massive attack surface.
Zero Trust is more than a marketing buzzword. As defenders look to holistic approaches to securing corporate assets, the concept of ZTNA (Zero Trust Network Access) takes on added importance to help simplify and strengthen access controls for all users,...
SecurityWeek’s Threat Detection and Incident Response (TDIR) Summit brings together security practitioners from around the world to share war stories on breaches and the murky world of high-end cyberattacks. This event will dive into Threat hunting tools and frameworks, and...
The sheer volume of malware attacks, security incidents and data breaches have exposed major gaps in the way corporate assets are protected, especially as enterprises adopt cloud services to take advantage of scalability, efficiency and cost savings. As CISOs and...
As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change. Amidst this turmoil, CISOs and risk management leaders must understand clearly the role of cyber insurance in a robust security program, ongoing changes to...
SecurityWeek’s Threat Hunting Summit is a virtual conference that presents strategies and tools that security teams use to detect, contain, and eliminate attackers present in or attempting to infiltrate enterprise networks.
SecurityWeek's Security Operations Summit will help address common security operations challenges and demonstrate how efficient workflow and collaboration can lead to improved decision making throughout the threat detection, analysis and incident response processes.
SecurityWeek has developed a fully-branded, unique virtual conference center on a cutting-edge platform that provides attendees and speakers with the opportunity to network and interact with each other from anywhere in the world.
Join our e-newsletter list to follow closely all news.
You can find the popular speakers in this section
General Manager, Information Security at Microsoft
Brian is a leader in the Information Security field with a focus on high volume secure business transactions, digital transformation with cloud and modern engineering, security policy, compliance, architecture, engineering, and strategy.
Threat Intelligence Analyst at Volexity
Josh Grunzweig is a Threat Intelligence Analyst at Volexity, where he specializes in espionage threat actors in various regions of the world. With over ten years of experience in the industry, he has over eight years of experience reverse engineering malware. When he’s not pivoting on threat actor data points or analyzing a malicious sample, Josh enjoys developing scripts and other automated systems using the Python language.
Deputy CISO at MongoDB
Chris Sandulow is Deputy Chief Information Security Officer (CISO) at MongoDB.
Director of Security Engineering
Chris Cochran is the Director of Security Engineering for a financial technology company
Cyber Threat Intelligence Analyst at Recorded Future
Charity Wright is a Cyber Threat Intelligence Analyst with over 15 years of experience at the US Army and the National Security Agency
Professor of Strategic Studies at Johns Hopkins University
Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies. He is also author of the new book, Active Measures, a startling history of disinformation
In this highly-anticipated fireside chat, Dataminr CISO Chris Castaldo joins Ryan Naraine to dig into the nuts and bolts of threat intelligence and how it’s embedded into modern security programs. Castaldo will talk about the importance of properly defining the...