SecurityWeek’s 2025 Menace Detection & Incident Response (TDIR) Summit takes place right this moment (Could twenty first) from 11 AM ET to 4PM ET. Free to attend, this on-line occasion brings collectively world cybersecurity leaders, incident responders, CISOs, and front-line specialists to share hard-won insights and real-world conflict tales from right this moment’s most superior threats.
The TDIR Summit 2025 isn’t only a webinar—it’s a completely immersive digital expertise designed to duplicate the power and worth of an in-person occasion. Attendees can discover a digital expo corridor that includes the most recent instruments, applied sciences, and improvements from main cybersecurity distributors. Devoted networking areas permit contributors to attach with friends, specialists, and audio system by way of stay chat and scheduled meetups, fostering significant conversations and collaboration. Moreover, attendees acquire entry to on-demand technical assets, whitepapers, and resolution briefs, making certain they go away the occasion with sensible information and instruments they will apply instantly.
Thanks to our occasion sponsors: Palo Alto Networks, Okta, Wiz, SecurityScorecard, PingIdentity, and Trustmi.
Insights from the 2025 Unit 42 International Incident Response Report – Acquire unique insights from over 500+ high-impact investigations performed by Palo Alto Networks’ Unit 42 group in 2024. With 86% of assaults disrupting enterprise operations and adversaries utilizing AI to hit exfiltration in underneath an hour, this session dives into the accelerating pace and scale of recent assaults.
Id Menace Visibility and Remediation – Okta and CrowdStrike group as much as present methods to keep forward of identity-driven assaults with real-time risk detection and response utilizing AI and automation. This session delivers actionable steps to safe customers and gadgets whereas minimizing friction.
Residing Off the Cloud: The right way to Transfer Quicker Than Attackers with CDR – Cloud-native attackers are escalating privileges and leaping between environments quicker than ever. On this deep dive, Wiz breaks down a real-world assault, then rewinds the playbook to point out how efficient detection and response may have shut it down.
A CISO’s Information to Mastering Cyber Incident Response – With 98% of organizations hit by vendor-related breaches, learn to shift from reactive chaos to strategic response. SecurityScorecard’s CISO lays out methods to ask the correct questions, talk clearly, and implement preventative greatest practices.
Preventing Deepfakes: Transformative Approaches to Shield Your Enterprise – Deepfake-related incidents rose 245% globally in 2024, difficult what’s actual and what’s fraud. Ping Id specialists discover rising assault vectors and sensible defenses to remain forward of artificial media threats throughout sectors.Commercial. Scroll to proceed studying.
Leveraging ISP and ASN as New Indicators of Compromise (IOC) in Cyber Menace Intelligence – Transfer past IP-based risk detection with revolutionary approaches utilizing ISPs and ASNs. Be a part of this session and learn the way proactive monitoring of total IP ranges can uncover threats quicker and enhance visibility.
Agentic AI: The Subsequent Frontier of Adversarial Threats and Incident Response – Agentic AI is altering the character of cyberattacks and incident response. This forward-looking session will put together you for adversaries utilizing autonomous instruments to launch phishing, manipulate native fashions, and evade detection.
Detecting Cyber’s Costliest Drawback: AI-Fueled Social Engineering – Generative AI is supercharging social engineering assaults, making them extra scalable, focused, and tough to detect. This session explains why conventional detection strategies fall quick, and the way organizations can construct a context-aware, cross-functional protection to guard enterprise techniques, folks, and capital.
The Fog of Menace: A Ransomware Investigation – Ransomware ways are evolving quickly to maximise injury and stress. On this immersive session, Unit 42 specialists from Palo Alto Networks recount a high-stakes ransomware assault on a big producer. Attendees will stroll by way of the assault’s anatomy, the response actions taken, and the broader ransomware tendencies rising in 2025.
Closing the Gaps: Strengthen Safety Posture & Cease Assaults – Id is the brand new perimeter—and attackers understand it. This session reveals how Okta’s Id Safety Posture Administration and AI-powered Id Menace Safety can expose shadow IT, detect real-time threats like session hijacking, and unify your id technique to guard your digital ecosystem.
From Justification to Implementation: Ideas for Deciding on Provide Chain Detection and Response – As provide chain assaults develop in frequency and complexity, Provide Chain Detection and Response (SCDR) emerges as a vital resolution. This session outlines methods to construct the enterprise case for SCDR, choose the correct capabilities, examine alternate options, and plan for efficient implementation.
An Introductory Demonstration of Deepfake Mitigation with PingOne Confirm – Get a hands-on have a look at how Ping Id’s PingOne Confirm detects and mitigates deepfake threats. This demo reveals real-time protection in opposition to each presentation and injection assaults, providing a sensible glimpse into next-gen id verification expertise.
Wiz 15-Minute Platform Overview: Shield Every part You Construct and Run within the Cloud – Cloud-native safety requires pace and visibility. This session affords a tour of the Wiz platform, demonstrating the way it gives end-to-end safety from code to runtime. Find out how prime corporations are simplifying cloud safety whereas accelerating innovation.
Register Right here for the TDIR Summit