The field of cybersecurity is always changing, and using collective intelligence to remain ahead of the curve is essential. The mWISE Conference 2024 offers you the opportunity to interact with the visionary thinkers influencing the future of cybersecurity and immerse yourself in the most recent threat intelligence and Cutting-Edge Technology
mWISE Conference 2024 is a three-year-old program that was specifically created by the security community for the security community. Attendees will share information, get insight from personal experiences, and view the most recent, tried-and-true solutions that are assisting organisations in fending off significant threats throughout the two-day event, which is vendor-neutral.
On September 18–19, at mWISE in Denver, Colorado, experts from Mandiant, Google Cloud, and the larger cybersecurity community will convene.
The keynote address: Expert perspectives
Feature the most recent information from luminaries and pioneers in security on keynote stage.
Kevin Mandia
The first day of the conference begins with statements from Google Cloud strategic security advisor Kevin Mandia. The threat environment and how organisations should secure their most valuable assets will be covered tactically.
Jen Easterly
What worries the Cybersecurity and Infrastructure Security Agency? CISA director Jen Easterly discusses the biggest cybersecurity issues on day two.
The growing cash cow of cyberspace
Groups and their affiliates are still being driven to increase operations and make additional investments in their businesses by the profitability of ransomware. Experts in cybercrime Brett Callow of FTI Consulting, Kimberly Goody of Mandiant, and Allan Liska of Recorded Future talk about the most recent data and trends surrounding ransomware, including a rise in aggressive extortion tactics, and how businesses may better protect themselves against and handle threats. Journalist Kim Zetter, an expert in cybersecurity and national security, will moderate the panel.
Defending against complex threats
Firsthand observations Mandiant Consulting’s CTO, Charles Carmakal, leads a mainstage conversation with seasoned business executives who have guided their companies through well-publicized cybersecurity incidents. Discover how cybersecurity leadership is changing in-depth, with insights that can be applied by professionals of all stripes.
John Hultquist
Leaders need to employ dynamic, frontline intelligence in the current threat scenario in order to anticipate changing enemies. John Hultquist, chief analyst at Mandiant Intelligence, examines the most recent front-line findings and solutions for the most pressing threats in a fireside chat.
What will they know when AI becomes intelligent?
Author and researcher David Eagleman analyses how artificial intelligence may surpass human intelligence and how google cloud might forecast it.
Large sessions: Dive deeply into the crucial cybersecurity problems of the day
Over 70 presentations covering nine tracks Cloud Security, Threat Intelligence, the Intersection of AI and Cybersecurity, Next Gen CISO, Security Engineering, Security Operations, Security Threats and Exploits are offered at this year’s mWISE Conference 2024. We’ve picked a few sessions to highlight here to pique your interest
How generative AI changes defense
Leaders in Google Cloud Security Steph Hay and Umesh Shankar explain macro trends at the nexus of security and AI and what they represent for your company using insights from talks with CISOs, the most recent Mandiant research, and Google DeepMind breakthroughs.
North Korean-backed threat actor goes from job interview to bitcoin heist
Clearing a job interview is the first step towards an insider bitcoin theft. Listen as Mandiant Senior Consultants Yi Han Ang and Sun Pu reveal a highly skilled cyber-espionage operation that was launched against a cryptocurrency corporation by a North Korean threat actor. They intend to talk about how crucial it is to put in place thorough security measures in the cloud in order to lessen the likelihood of assaults like this one.
Generative AI-era secure remote identity verification
In the age of generative AI, secure remote identity verification Science-based biometrics-as-a-service can prevent deepfake assaults by enabling dependable, simple-to-manage remote identification for employees and customers. The CEO and creator of iProov, Andrew Bud, discusses the difficulties in implementing remote identity throughout the company and offers customer best practices in this presentation.
The supply-chain attack summer taught us
In the summer of 2023, there were an unprecedented amount of supply chain attacks. Key issues like legal exposure, cyber reporting, and handling threats to company officials or their families will be covered by Erin Joe (Google Cloud Office of the CISO), Lyn Brown and Megan Brown (Wiley Rein), and Jennifer Burnside (Crisis Communications for Google Cloud Security). They will also share lessons learnt and talk about emerging trends.
Construct a low-cost, high-value quantitative risk management program
Tim Anderson and Matthew Harding of ID.me have provided a systematic guide to implementing quantitative risk management. Find out how to report and communicate risk from the boardroom to the security team room. The application and operation of quantitative program design using people, procedures, and technology will be covered.
The cloud security dilemma Unsecure use, safe cloud
Cloud service providers make significant investments in security, far more than what most businesses could accomplish on their own. But leaks and breaches in the cloud dominate the headlines. Why is that? In actuality, cloud security is a shared opportunity as much as a shared obligation. Google Cloud‘s Anton Chuvakin explores this somewhat perplexing conundrum in this session.
Opportunities for networking: Establishing your cybersecurity community
Building a network that can help you in your profession and interacting with peers to gain knowledge from their experiences are all important aspects of mWISE Conference 2024. Make the most of the many breakout sessions, social events, and networking opportunities to establish meaningful relationships.
Among these chances is a special Capture the Flag challenge where you may put your cybersecurity prowess to the test. This CTF game simulates a threat hunt using real-world information from ransom notes, the dark web, and CISA advisories. Using a new Google Threat Intelligence product, follow the clues, evaluate the evidence, and work through the puzzles to identify the flags.
On September 18–19 in Denver, Colorado, They look forward to building Google defender’s community and sharing their most recent security findings with you.