Wednesday, 27th August 2025

Threat Hunting 2025: Countering the Adversary in the AI Era

4:00 PM to 5:30 PM ET | Virtual

Event Overview

From cross-domain attacks, heightened insider threats, a rise in hybrid threats across multiple platforms – these are among the latest threat trends, and all of them now fueled
for scale and efficacy.

But have your threat-hunting practices evolved with the threats? Do you have the solutions, analysts and telemetry you need for fast, proactive and intelligence driven
hunting to at least keep pace with, if not one step ahead of, adversaries?

If you want to get current with the latest threat-hunting trends, register for this exclusive session. Gain access to results from CrowdStrike’s 2025 Threat Hunting Report, and
gain new threat-hunting insight from your peer IT decision-makers and security leaders.


Among the discussion points:

  • How have your threat-hunting practices evolved for the AI era?
  • What telemetry are you looking at, and how is it being operationalized
    proactively?
  •  How are you employing AI to detect, investigate and respond to the threats that
    matter most?

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here


Tom Field

SVP Editorial

ISMG 

 
Dennen Monks

Field Technology Strategist

CrowdStrike

 

Speakers

Join this dynamic roundtable with your peers as well as our moderator Tom Field for an insights driven discussion from Dennen Monks , Field Technology Strategist at CrowdStrike. 

This session will be:

  • Chatham house rule
  • Peer driven
  • Pitch free

Venue

The Ritz-Carlton, Bangalore

99 Residency Road, Bengaluru, Karnataka 560025

Underwritten by

CrowdStrike is a global cybersecurity leader redefining modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints, cloud workloads, identity, and data. Powered by the CrowdStrike Security Cloud and elite threat intelligence, the CrowdStrike Falcon® platform leverages real-time indicators, AI-driven analytics, and industry-leading threat hunting to deliver rapid detection, prevention, and response to threats.

Since its founding in 2011, CrowdStrike has pioneered a new approach to cybersecurity — replacing legacy solutions with an integrated platform designed for speed, scalability, and accuracy. Trusted by organizations around the world, CrowdStrike has been instrumental in preventing some of the most sophisticated cyberattacks in history.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

August 7-8, 2025

Virtual Cybersecurity Summit: Africa

August 13, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

August 14, 2025

Tackling Identity Sprawl to Improve Business Agility, Security and Compliance

August 19-20, 2025

Virtual Summit: Cybersecurity Implications of AI, Global

September 11, 2025

Cybersecurity Summit: London Financial Services

Upcoming ISMG Events

August 7-8, 2025

Virtual Cybersecurity Summit: Africa

August 13, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

August 14, 2025

Tackling Identity Sprawl to Improve Business Agility, Security and Compliance