Cyber Defense Con 2024
The Ritz-Carlton Orlando, Grande Lakes 4012 Central Florida Pkwy, Orlando, FL, United StatesWhere the Top Global CISOs and the Top InfoSec Innovators Gather Each Year.
Where the Top Global CISOs and the Top InfoSec Innovators Gather Each Year.
Pacific Hacker Conference is an information security and hacking conference gathers the brightest minds in cybersecurity and hacking from Silicon Valley and beyond. Focusing on cutting-edge techniques, research, and developments, we aim to create an environment where knowledge is shared and connections are made. Our audience ranges from security professionals, researchers, and ethical hackers to industry decision-makers. We keep the conference small, allowing us to provide what other Cons leave out.
Offensive security is a critical component of cybersecurity, as it involves identifying and exploiting system vulnerabilities from a threat actor's perspective. This approach to security assessments can reveal vulnerabilities that may not be detected through vulnerability scanning alone. However, offensive security can be complex and is often misunderstood, which can hinder organizations from achieving their security assessment objectives. Additionally, current offensive security assessment practices often contain gaps that reduce the effectiveness of these assessments. In an upcoming presentation, experienced offensive security professional and educator Phillip Wylie will explore the various types of assessments that constitute offensive security, examine common gaps encountered during pentests, and offer strategies to enhance offensive security efforts. This session aims to provide attendees with a better understanding of offensive security, insight into different offensive security assessment types, guidance on addressing common gaps associated with offensive security, and information on how it integrates with vulnerability management programs.
Offensive security is essential for identifying and exploiting system vulnerabilities, but current practices often have gaps that reduce their effectiveness. This presentation will explore these deficiencies and offer practical strategies to enhance the accuracy and impact of offensive security assessments, ultimately improving the overall effectiveness of security programs.
Connecting Sr. Level Executives with Renowned Information Security Experts, and Cutting-Edge Solution Providers to Protect Today's Enterprise
The Boston Forum is designed for information security practitioners across all industries to dive deep on specific topics, share insights, and network with peers. This one-day event incorporates breakouts with IANS Faculty, spotlight sessions on emerging technologies, and opportunities to network with your peers.
The Ninth Annual Los Angeles Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Join us for an in-depth look at NodeZero Insights, Horizon3.ai’s newest feature, empowering security leaders with a dynamic view of organizational security over time.
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Step into an engaging discussion with Kubernetes security experts as we explore how this container orchestration tool’s superpower in enabling scalable and available assets for organizations can be used against itself to pave a critical attack path into the underlying infrastructure.
Cyber-attacks have increased dramatically over the last few years. The 2024 California Cybersecurity Education Summit provides an opportunity for government technology professionals to learn about the latest efforts to defend, respond and recover from cyber criminals who wish to do harm. The Summit will include cybersecurity leaders from state and local government throughout California. Speaking Session: 1PM PST Go Hack Yourself: More War Stories from ~80k Pentests Join Snehal Antani, CEO of Horizon3.ai, for an eye-opening session where he’ll discuss real-world examples of what continuous pentesting is able to reveal within networks. You’ll hear about how fast and easy it is to compromise some of the largest networks in the world – with full domain takeover – often in minutes, and sometimes, without even exploiting a vulnerability. During this session, you’ll learn how attackers: Use OSINT and password spraying to takeover systems without ever targeting CVEs. Land and expand with legitimate credentials, then poison assets to take over domains. Find cloud credentials and use them to compromise cloud services. Join us to gain actionable insights into how attackers exploit common vulnerabilities and discover practical strategies to identify and mitigate these risks within their own networks.
The narrow, point-in-time scope of annual penetration tests don’t give CIOs and CISOs what they need to show how investments in cybersecurity are really performing. Yet, failing to do so gives stakeholders doubt and puts program budgets at risk. With the NodeZero platform, security teams continuously find, fix, and verify exploitable vulnerabilities to keep pace with ever-changing attack surfaces. While powerful, our customers found it difficult to get a big-picture view of these organization-wide efforts. Announcing NodeZero Insights: streamlined dashboards of aggregate and trend data from all of your NodeZero tests. Security leaders get a complete view to better guide teams, plus built-in reporting to earn the confidence of executive partners. Join us to see how NodeZero Insights equips leaders to: Understand trends in your security operations with key metrics like mean-time-to-remediation (MTTR) and patterns in vulnerability types and severity. See coverage across all potential entry points and validate which defenses are—and aren’t—effective. Identify systemic issues like outdated protocols, weak configurations, or credential re-use and address them with organization-wide policy updates. Streamline executive reporting with turn-key summaries to keep leadership informed and aligned on security priorities.