Virtual Conference

Advanced Incident Detection: Protecting your business from state-sponsored actors

Live Broadcast Tuesday, August 10, 2021 - 10:45 AM EDT

Earn up to 6.5 CPE credits by attending this virtual conference.

It doesn’t take much for a hacker to wreak havoc on an organization. Even unsophisticated cybercriminals can readily acquire hacking tools and exploits on the dark web. But the stakes change when threat actors are backed by a government’s resources.
Businesses are increasingly a favorite target for state-sponsored threat actors that understand — and aim to exploit — the resource challenges their targets face. To protect your organization from these advanced adversaries, it’s essential to understand how they operate and to adjust your security posture accordingly.

Join SC Media from August 10 as we host a virtual event that convenes leaders and specialists in combatting state-sponsored attackers. Discussions and presentations will provide insight on how to detect and prevent such threats, including:

• How to integrate security culture into your organization
• Proven methods to clean up tech supply chain
• Tales from the front lines of targeted intrusions

Our Advanced Incident Detection curriculum will give you the perspective you need to position your defenses. Register now.

KEYNOTE | Cyber-espionage threat landscape
John Grim, Head of Research, Development, and Innovation, Verizon Threat Research Advisory Center

Cyber-espionage breaches pose a unique challenge. Through advanced techniques and a specific focus, cyber-espionage threat actors seek to gain access to heavily defended environments, laterally move with stealth, efficiently obtain targeted data and move out smartly (or even stay back and maintain covert persistence).  

To shed some light on the state of cyber espionage, Verizon released its 2020-2021 Cyber-Espionage Report. This keynote features insights from the report to identify:  

  • Targeted victims and the attributes, assets and data that are targeted 
  • Who the threat actors are and the tactics, techniques and procedures they use  
  • What can be done to prevent, mitigate, detect and respond to their attacks

KEYNOTE | Tales from the SOC: Lessons any cyber team can learn
Keatron Evans, Principle Security Researcher, InfoSec

While the security threatscape evolves every day, attacker tactics and techniques are often more predictable than creative. Join veteran incident responder and cybersecurity instructor Keatron Evans for first-hand accounts of the most challenging responses of his career — and what he and his clients learned along the way. You’ll leave this session with practical steps your SOC team can take now to prepare for the next attack, including how to:  

  • Assess your team’s skills 
  • Patch knowledge gaps to build defenses for tomorrow’s threats


Blue HexagonRapid7Recorded Future