Global Threat Intelligence Summit

The threat landscape is as resilient as ever. Tune into a wide range of topics led by global cybersecurity experts to understand emerging threats and how to combat today’s adversaries.

keynote-thumbnail-hero
Main Sessions

The State of Today’s Threats 

At this year’s Global Threat Intelligence Summit held on Oct. 3, 2024, researchers from Secureworks Counter Threat Unit™, along with leading cyber experts from the FBI and NCA, provide a global and unvarnished view of the current threat landscape.

State of the Threat Roundtable

Don Smith, Vice President, Counter Threat Unit, Secureworks
Rafe Pilling, Director of Threat Intelligence, Secureworks
Keith Jarvis, Senior Security Researcher, Secureworks
Sarah Kern, Security Researcher, Secureworks

Keynote Address: Fireside Chat: Bridging Borders in Cybersecurity

Cynthia Kaiser, Deputy Assistant Director FBI Cyber
Will Lyne, Head of Cyber Intelligence, UK National Crime Agency
Don Smith, Vice President, Counter Threat Unit, Secureworks

An A to Z of Dominance: Chinese Cyber Threat in the Age of the Xictionary

Mark Osborn, Security Researcher, Secureworks

The Winding Road to Attribution

Rafe Pilling, Director of Threat Intelligence, Secureworks

Deepfake Deep Dive: Truths and Myths in AI and Social Engineering

Chris Yule, Director of CTU Capabilities, Secureworks
Dr. Kiri Addison, Senior Manager – Product Management, Mimecast
Gregor Stewart, VP, AI and Machine Learning Engineering, SentinelOne
Aiden Sinnott, Security Researcher, Secureworks

The Shifting Sands of Ransomware

Tim Mitchell, Senior Security Researcher, Secureworks

Embedding Threat Intelligence for Super Security

Nash Borges, Head of Engineering, Secureworks
Chris Yule, Director of CTU Capabilities, Secureworks

Musings from a Dark Web Newbie: Digital Footprints and Dark Web Insights

Rebecca Taylor, Threat Intelligence Knowledge Manager, Secureworks

Defending Against Dynamic Attacker Networks: Insights from AWS and Secureworks

Keith Jarvis, Senior Security Researcher, Secureworks
Charles Roberts, Senior Security Consultant, AWS

Context Matters: Defending Your Business with Threat Intelligence

Alexandra Rose, Director of Threat Intelligence and Government Partnerships, Secureworks
Stacy Leidwinger, VP of Marketing, Secureworks

Closing Remarks from our CEO

Wendy Thomas, CEO, Secureworks

aws-tisummit24
Sponsor Panel

Defending Against Dynamic
Attacker Networks

Join experts from Secureworks and Amazon Web Services (AWS) as they explore effective strategies to protect organizations from attacker networks, focusing on the unique challenges and solutions within cloud-based environments. 

On-Demand Sessions

For Researchers

Ethical Considerations in eCrime Research

Aiden Sinnott, Security Researcher

Underground Stealer Markets: Trends and Threats

Ben Drysdale, Senior Manager

From Underground POC to Exploited CVE: The Adversarial Pathway to Successful Exploitation

Hamish Maguire, Security Researchers
Frank Hackett, Security Researchers

From Underground Chatter to Actionable Intelligence: The Lifecycle of Human Intelligence

Ben Drysdale, Senior Manager

Evolution of the Malware Landscape

Graham Austin, Senior Security Researcher

Law Enforcement Takedowns: How Effective Are They?

Tim Mitchell, Senior Security Researcher

Inside the D3Fck Loader: A Deep Dive into Malware-as-a-Service

Rob Pantazolpoulos, Malware Research Lead

Behind the Analysis: Unveiling the Workflow of Malware Research

Rob Pantazolpoulos, Malware Research Lead

Malware Intelligence at Scale: Assembling the Pieces of Large-Scale Malware Intelligence

Nick Bargnesi, Senior Security Researcher

Microsoft Entra ID Applications as a Breach Vector

Joosua Santasalo, Senior Principal Security Researcher

For Security Professionals

Underground Stealer Markets: Trends and Threats

Ben Drysdale, Senior Manager

From Underground POC to Exploited CVE: The Adversarial Pathway to Successful Exploitation

Hamish Maguire, Security Researchers
Frank Hackett, Security Researchers

From Underground Chatter to Actionable Intelligence: The Lifecycle of Human Intelligence

Ben Drysdale, Senior Manager

Evolution of the Malware Landscape

Graham Austin, Senior Security Researcher

Adversary-in-the-Middle (AiTM) Attacks: What You Need to Know

Tim Mitchell, Senior Security Researcher

Russian Tradecraft: A Year in Review

Tony Adams, Senior Security Researcher

North Korea: IT Worker Infiltration

Sarah Kern, DPRK & Emerging Threats Lead

A Freelance Job with a Side of Malware: Contagious Interview

Sarah Kern, DPRK & Emerging Threats Lead

Malware Intelligence at Scale: Assembling the Pieces of Large-Scale Malware Intelligence

Nick Bargnesi, Senior Security Researcher

Detection Lifecycle: Research and Development of Taegis Detections

Dr. Clay Moody, Senior Director

Microsoft Entra ID Applications as a Breach Vector

Joosua Santasalo, Senior Principal Security Researcher

From Infostealer to Ransomware: A Hands-On Incident Responder Perspective

Chris Ahearn, Director Incident Response
Zack Dowling, Principal Consultant - Incident Response

Integrating Policies, Risk Assessments, and Business Impact Analyses for Robust Cybersecurity

Brian Yonek, Senior Global Incident Commander

60% of the Time This Will Catch a Hacker Every Time

Eric Escobar, Principal Security Consultant - Incident Response

Business Email Compromise: What is it and how has it evolved in 2024?

Aiden Sinnott, Security Researcher

For CISOs and Executives

Adversary-in-the-Middle (AiTM) Attacks: What You Need to Know

Tim Mitchell, Senior Security Researcher

North Korea: IT Worker Infiltration

Sarah Kern, DPRK & Emerging Threats Lead

A Freelance Job with a Side of Malware: Contagious Interview

Sarah Kern, DPRK & Emerging Threats Lead

From Infostealer to Ransomware: A Hands-On Incident Responder Perspective

Chris Ahearn, Director Incident Response
Zack Dowling, Principal Consultant - Incident Response

Integrating Policies, Risk Assessments, and Business Impact Analyses for Robust Cybersecurity

Brian Yonek, Senior Global Incident Commander

Business Email Compromise: What is it and how has it evolved in 2024?

Aiden Sinnott, Security Researcher

For General Enthusiasts

Ethical Considerations in eCrime Research

Aiden Sinnott, Security Researcher

Underground Stealer Markets: Trends and Threats

Ben Drysdale, Senior Manager

Evolution of the Malware Landscape

Graham Austin, Senior Security Researcher

Law Enforcement Takedowns: How Effective Are They?

Tim Mitchell, Senior Security Researcher

Russian Tradecraft: A Year in Review

Tony Adams, Senior Security Researcher

A Freelance Job with a Side of Malware: Contagious Interview

Sarah Kern, DPRK & Emerging Threats Lead

From Infostealer to Ransomware: A Hands-On Incident Responder Perspective

Chris Ahearn, Director Incident Response
Zack Dowling, Principal Consultant - Incident Response

Business Email Compromise: What is it and how has it evolved in 2024?

Aiden Sinnott, Security Researcher

mimecast-sentinalone-tisummit24
Sponsor Panel

Deepfake Deep Dive: Truths and Myths in AI and Social Engineering

The threat of innovative social engineering tactics like deepfakes seem to loom larger every day. Learn from experts from Mimecast and SentinelOne in a panel discussion about the realities and misconceptions surrounding deepfakes, AI, business email compromise (BEC), and social engineering.

Resources

Related Resources