TechStrong: Cloud Security (Sept. 25th)
IT - CxO Security Events

Join industry experts in AI and cybersecurity as they examine how ChatGPT and other generative AI tools are currently being used to improve the efficacy of ransomware attacks, how that will affect the cyber risk posture of most businesses, and what you can do to improve your own organization's cyber resilience in the face of these new AI-supercharged threats.

Just when it looked like the ransomware epidemic might be peaking, ChatGPT and similar generative AI tools took a big leap forward. Opportunistic cybercriminals quickly jumped on these tools to make their ransomware attacks more frequent, more devious and more effective. As usual, that leaves cybersecurity and IT operations leaders scrambling to find a response, lest they become the next victim of a massive service outage, data breach and extortion demand. And as ever, knowing your enemy is a useful starting point in crafting your plan to fight back.

Attendees will leave this event with:

  • An up-to-the-minute refresh on the 2023 cyberthreat landscape
  • An understanding of how generative AI tools improve the effectiveness of ransomware attacks
  • Practical advice on modifying both your cyber defenses and response/recovery capabilities for AI-enhanced cyberthreats
  • Presented live by featured speaker James Slaby and Mark Bermingham. Moderated by Michael Krieger

Hosted by DARKReading

In this webinar, experts discuss methods for recognizing anomalous and unauthorized behavior among trusted users, and how to prevent those 'users' from gaining access to critical information.

Cyber attackers are increasingly stealing user credentials and waltzing right into enterprise networks. Once in, they can move laterally to other internal systems and gain access to a wide variety of applications and privileged systems. In this webinar, experts discuss methods for recognizing anomalous and unauthorized behavior among trusted users, and how to prevent those 'users' from gaining access to critical information. You'll also learn how to limit trusted users from accessing systems or gaining privileges that their roles don't require them to have.

During this webinar you will:

  • Learn the risk associated with credential compromise and how to minimize it
  • Find out how to spot suspicious network behavior before it gets to critical data
  • Get advice for protecting user accounts within the organization with the most privileged access

Presented live by featured speakers Jake Williams and Joseph Carson.

Moderated by Becky Bracken.

Hosted by DARKReading

In this webinar, experts offer a broad look at your options for multifactor authentication, the challenges and pitfalls of these options, and how to develop an authentication strategy that works best for your enterprise.

Cyber experts agree: end-user authentication needs more than the simple password. But what are the right tools and strategies for authentication in your organization? What does the world of passwordless look like for your organization?

During this webinar you will:

  • Learn the limitations of the password for user authentication in today's cybersecurity climate
  • Look at how the modern enterprise can operate more securely without traditional passwords
  • Explore options to help decide the best multi-factor authentication strategy for your environment

Presented live by featured speakers Roselle Safran and Ieva Soblickaite.

Moderated by Becky Bracken.

Hosted by DARKReading

Blackhat: Stories from the Front Line: New L7 DDoS Attacks (Sept. 21st)
Thursday, September 21st, 2023: 2:00 PM to 3:00 PM
Join Omdia's Senior Analyst for cybersecurity, Fernando Montenegro, together with Radware's Eyal Arazi, to discuss the new generation of L7 web DDoS attacks, how they bypass traditional defenses, and what security professionals can do about them.

DDoS attacks are making a comeback! Only that now they are motivated by politics, not money, and use sophisticated L7 attack vectors to bypass traditional network DDoS defenses.

In this talk we will discuss:

  • How the conflict between Russia and Ukraine led to a realignment of the DDoS threat landscape
  • Examples of some recent DDoS attacks, and how they illustrate the new risks
  • Why DDoS attacks are increasingly shifting to the application layer, and what makes them so difficult to stop
  • What measures security professionals can take to protect their organizations against web DDoS attacks

Presented live by featured speakers Eyal Arazi and Fernando Montenegro.

Moderated by Terry Sweeney.

Hosted by blackhat

TechStrong: Cloud Security (Sept. 25th)
Monday, September 25th, 2023: 1:00 PM to 2:00 PM
It's been more than 10 years since workloads initially began to be deployed on cloud computing platforms and organizations are still struggling to come to terms with cloud security.

IT organizations are now trying to apply guardrails that enable applications to be deployed securely without slowing down the pace at which they are deployed and updated. The challenge and the opportunity now is to determine what tools and platforms will enable organizations to achieve that goal in a way that both cybersecurity professionals and application developers can both easily accept.


  • TSVI KORREN Field CTO - Aqua Security
  • MIKE VIZARD - Chief Content Officer - Techstrong Group

Hosted by Techstrong

DARKReading: Cyber Risk Assessment Secrets From the Pros (Sept. 26th)
Tuesday, September 26th, 2023: 1:00 PM to 2:00 PM
In this webinar, experts talk about assessing the attack surface, evaluating the organization's risk and security posture, and calculating the costs associated with today's threats and data breaches. Get advice on how to implement the tools and processes to prioritize costs and defense strategies specifically for your environment.

Executives want to know whether they should worry about an attack that hit another organization. They worry how safe they are from a breach. But it can be difficult for security teams to quantitatively measure risk, or even say with certainty exactly how an attack or breach would affect the business.

During this webinar you will:

  • Learn why it's crucial to develop an organization-wide definition of 'risk'
  • Get practical advice about how to quantify and explain cybersecurity in terms of business risk for a management-level audience
  • Explore the role of artificial intelligence (AI) in assessing and protecting the enterprise attack surface

Presented live by featured speakers Immanuel Chavoya and Matt Kunkel. Moderated by Becky Bracken.

Hosted by DARKReading

blackhat: A CISO's Perspective On Improving SecOps Effectiveness (Sept. 28th)
Thursday, September 28th, 2023: 11:00 AM to 12:00 PM
Digital transformation plays a fundamental role in meeting Repsol's goal of being a net-zero emissions company by 2050. But this increased reliance on technology also brings additional risk due to a significant increase in the attack surface, both in the cloud and in physical facilities.

In this webinar, Javier Garcia Quintela, Global CISO of Repsol, a Global 2000 multi-energy company with 24,000 employees, will discuss how his organization is:

  • Using automation, analytics, and threat intelligence to reduce the risk of ransomware, data breaches, and insider threats.

  • Implementing both on-premises and cloud-native SIEMs, combined with multiple data lakes to collect and analyze telemetry from diverse sources including endpoint, network, email, identity, cloud, and OT security monitoring solutions.

  • Leveraging CardinalOps' detection posture management platform to continuously assess its MITRE ATT&CK coverage and eliminate gaps caused by missing or misconfigured detections for the latest threats and APT groups most relevant to the organization.

Hosted by blackhat

DARKReading: Securing Identities In The Cloud (Oct. 3rd)
Tuesday, October 3rd, 2023: 1:00 PM to 2:00 PM
In this webinar, experts provide insight and advice on managing and securing identities in your organization as it evolves from on-premise to the cloud or a combination thereof.

With enterprises increasingly shifting workloads to the cloud, they face different challenges including managing and securing user identities, as well as a web of machine identities. How do you map all of the identities that now reside in the cloud - some crisscrossing multi-cloud environments? How can you prevent permissions 'sprawl' in the cloud? How do you manage identities in a hybrid cloud environment?

During this webinar you will:

  • Get a an overview of the modern cloud attack surface
  • Find out how organizations are implementing identity access management (IAM) for users and devices
  • Learn how cyber attackers are exploiting cloud vulnerabilities to breach on-prem environments

Presented live by featured speakers Jonathan Care and Wade Ellery. Moderated by Becky Bracken.

Hosted by DARKReading

DARKReading: Tips for A Streamlined Transition to Zero Trust (Oct. 5th)
Thursday, October 5th, 2023: 1:00 PM to 2:00 PM
In this webinar, learn from experts how to get started on the zero-trust journey. Get insights into tools and processes that will make the transition easier to manage without compromising security.

From identifying the potential attack surface to determining policy, there is a clear path to zero trust and best practices to make the transition as smooth as possible - both for your organization and your customers. Zero trust is more than a technology upgrade, it's a rethink of the old way of conducting cybersecurity operations.

During this webinar you will:

  • Drill down to a clear definition of what a zero trust is - and isn't.
  • Determine benchmarks to assess where your organization is on its own zero trust journey
  • Get insights into the role of policy controls within a zero trust environment

Presented live by featured speakers Jonathan Care and James Whewell. Moderated by Becky Bracken.

Hosted by DARKReading

Operating with least privilege access is hard, doing it in a multi-cloud context is even harder. We will discuss the challenges of ensuring proper identity-based access across public clouds and what approaches security teams can consider to reduce the complexity of multi-cloud IAM governance.

Additionally, we will review cloud-native features across cloud vendors to build a strategy focused on intelligence and automation without impacting innovation.


  • Jason Bisson, Cloud Security Architect, Google Cloud
  • Hector Diaz, Cloud Security Architect, Google Cloud
  • Terry Sweeney, Moderator, Black Hat

Hosted by blackhat

In this webinar, we'll deconstruct two distinct and growing categories - Cyber Asset Attack Surface Management (CAASM) and SaaS Security Posture Management (SSPM) - to understand what problems they actually solve. In doing so, we'll reveal how IT and security teams can use these solutions to get real value, and why combining data from devices, users, software, SaaS apps, and other data sources is better than relying on isolated tools for separate teams.

It seems like a new IT or cybersecurity acronym is born every two days, but no one wakes up saying, 'I need to solve my XMPFSCLR problem.' Instead, IT and security teams have to translate acute, urgent challenges into industry category-speak just to understand what tools can solve their problems.

Attendees will learn:

  • What CAASM and SSPM solutions do and the problems they intend to solve
  • How a comprehensive view of all assets and the controls that manage and secure them gives both IT and security teams the ability to better evaluate and prioritize attack surface risk
  • How Axonius customers approach the problem

Hosted by blackhat

See all Archived IT - CxO Security Events articles See all articles from this issue