Tuesday, september 24th, 2024

Assessing Critical Applications' Cyber Defenses

4pm — 5:30pm PT | Virtual

Event Overview

In this session, executives will realize the mismatch between the types of security assessments organizations request versus the evaluations they actually need. With the majority of web-based vulnerabilities being discovered within an application’s complex inner-workings including its access control barriers, data control models, and tiered architecture, having the capability to effectively identify them is critical to an organization’s cyber defense. Understanding why, and how, attackers are successfully bypassing your applications’ defenses will help leadership teams take proper action to improve their security approach to application defense and in turn mitigate this growing cyber risk.

DISCUSSION POINTS

  • AI-Powered MFA Breaches: Learn the techniques and solutions to protect authentication.
  • AI for Red/Purple Teams: See how AI is boosting offensive and defensive cybersecurity.
  • Crucial Incident Response Metrics: Uncover dwell times, detection methods, common attack vectors, and more.
  • Zero-Day Attacks: Understand attacker motivations and operational trend

Join this session to learn more about Mandiant’s findings and to gain new insights from event thought leaders and your peers where we’ll dissect the most dangerous cyber threats facing businesses today.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

Tom Field

SVP, Editorial

ISMG

Christian Elston

Senior Security Consultant

Mandiant

Speakers

Join Christian Elston, Senior Security Consultant from sponsor Mandiant, and ISMG SVP of Editorial, Tom Field to speak about  ‘An in depth look at the evolving cyber threat landscape’

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Christian Elston

Senior Security Consultant

Mandiant

Elston is a senior red team consultant in Mandiant’s Central Region. As part of the red team, Elston leads the in-region web application specialists. He comprehensively assesses web, mobile, API, and thick client applications for security vulnerabilities and consults with clients directly to manage their information security risk. He routinely led multi-component, complex assessments and mentors junior team members. Previously, Elston also worked for the Central Intelligence Agency. In his role, he managed clandestine intelligence operations leveraging subject matter expertise on wide-ranging country, region, and transnational topics of national security interest. He evaluated foreign intelligence to ensure U.S foreign policy and national security decision-makers were provided with timely, accurate, clear, and concise reporting in a manner while safeguarding sensitive intelligence sources and methods.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Del Frisco's Double Eagle Steakhouse

9150 International Drive, Orlando, FL 32819

Underwritten by

Mandiant are on a relentless mission to make every organization secure from cyber threats and confident in their readiness. We deliver dynamic cyber defense solutions by combining services and products powered by industry-leading expertise, intelligence and innovative technology.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East

October 1, 2024

Proactive Cyber Third-Party Risk Management: Gaining Control

October 17, 2024

Government Cybersecurity Summit: DC Hosted by GovInfoSecurity

Upcoming ISMG Events

September 17, 2024

Cybersecurity Summit: London

September 24, 2024

The Elastic and Google Cloud GenAI Roadshow San Francisco: Explore the Next Generation of AI-Driven Search and Insight

September 26, 2024

Cybersecurity Summit: Canada East