September 18, 2024 | Virtual Event Join us for a must-attend virtual event exclusively focused on Attack Surface Management (ASM) as corporate defenders shift tactics to continuously discover, inventory, classify, prioritize, and monitor digital assets and cloud services. SecurityWeek editors...
December 4, 2024 – Register SecurityWeek’s inaugural Cyber AI & Automation Summit pushed the boundaries of security discussions by exploring the implications and applications of predictive AI, machine learning, and automation in modern cybersecurity programs. (Watch sessions from 2023 on...
This virtual summit will examine the current state of supply chain attacks, the weakest links along the way, the biggest supply chain hacks in history, and best practices for managing this massive attack surface.
August 7, 2024 – Register SecurityWeek’s Identity & Zero Trust Strategies Summit is laser focused on helping organizations to level up their Identity and Zero Trust security strategies. This event promises a deep-dive into the world of digital identity management...
May 22, 2024 – Register In an era where “assume breach” is the status quo, organizations are working on the maturity of threat detection and incident response programs to mitigate the barrage of incoming malware and ransomware attacks. This must-attend...
July 17, 2024 – Register SecurityWeek’s annual cloud security virtual summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. Expect high-quality discussions and presentations on a variety of cloud security topics,...
As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change. Amidst this turmoil, CISOs and risk management leaders must understand clearly the role of cyber insurance in a robust security program, ongoing changes to...
SecurityWeek’s Threat Hunting Summit is a virtual conference that presents strategies and tools that security teams use to detect, contain, and eliminate attackers present in or attempting to infiltrate enterprise networks.
SecurityWeek's Cyber Solutions Summit and Expo will bring together a range of reputable buyers and sellers for a transparent discussion on the security technology procurement and decision-making process.
SecurityWeek has developed a fully-branded, unique virtual conference center on a cutting-edge platform that provides attendees and speakers with the opportunity to network and interact with each other from anywhere in the world.
Join our e-newsletter list to follow closely all news.
You can find the popular speakers in this section
General Manager, Information Security at Microsoft
Brian is a leader in the Information Security field with a focus on high volume secure business transactions, digital transformation with cloud and modern engineering, security policy, compliance, architecture, engineering, and strategy.
Threat Intelligence Analyst at Volexity
Josh Grunzweig is a Threat Intelligence Analyst at Volexity, where he specializes in espionage threat actors in various regions of the world. With over ten years of experience in the industry, he has over eight years of experience reverse engineering malware. When he’s not pivoting on threat actor data points or analyzing a malicious sample, Josh enjoys developing scripts and other automated systems using the Python language.
Deputy CISO at MongoDB
Chris Sandulow is Deputy Chief Information Security Officer (CISO) at MongoDB.
Director of Security Engineering
Chris Cochran is the Director of Security Engineering for a financial technology company
Cyber Threat Intelligence Analyst at Recorded Future
Charity Wright is a Cyber Threat Intelligence Analyst with over 15 years of experience at the US Army and the National Security Agency
Professor of Strategic Studies at Johns Hopkins University
Thomas Rid is Professor of Strategic Studies at Johns Hopkins University’s School of Advanced International Studies. He is also author of the new book, Active Measures, a startling history of disinformation
In this highly-anticipated fireside chat, Dataminr CISO Chris Castaldo joins Ryan Naraine to dig into the nuts and bolts of threat intelligence and how it’s embedded into modern security programs. Castaldo will talk about the importance of properly defining the...