Source: www.securityweek.com – Author: SecurityWeek News
SecurityWeek’s 2025 Threat Detection & Incident Response (TDIR) Summit will take place as a virtual summit on Wednesday, May 21st from 11 AM ET to 4PM ET. Free to attend, this online gathering brings together global cybersecurity leaders, incident responders, CISOs, and front-line experts to share hard-won insights and real-world war stories from today’s most advanced threats.
The TDIR Summit 2025 isn’t just a webinar—it’s a fully immersive virtual experience designed to replicate the energy and value of an in-person event. Attendees can explore a virtual expo hall featuring the latest tools, technologies, and innovations from leading cybersecurity vendors. Dedicated networking areas allow participants to connect with peers, experts, and speakers through live chat and scheduled meetups, fostering meaningful conversations and collaboration. Additionally, attendees gain access to on-demand technical resources, whitepapers, and solution briefs, ensuring they leave the event with practical knowledge and tools they can apply immediately.
Whether you’re in the trenches or steering the ship from the C-suite, this is your chance to arm yourself with actionable intelligence, learn from leading practitioners, and strengthen your playbook for detecting, responding to, and recovering from sophisticated attacks.
Thank you to our event sponsors: Palo Alto Networks, Okta, Wiz, SecurityScorecard, PingIdentity, and Trustmi.
Agenda Overview
Insights from the 2025 Unit 42 Global Incident Response Report – Gain exclusive insights from over 500+ high-impact investigations conducted by Palo Alto Networks’ Unit 42 team in 2024. With 86% of attacks disrupting business operations and adversaries using AI to hit exfiltration in under an hour, this session dives into the accelerating speed and scale of modern attacks.
Identity Threat Visibility and Remediation – Okta and CrowdStrike team up to show how to stay ahead of identity-driven attacks with real-time threat detection and response using AI and automation. This session delivers actionable steps to secure users and devices while minimizing friction.
Living Off the Cloud: How to Move Faster Than Attackers with CDR – Cloud-native attackers are escalating privileges and jumping between environments faster than ever. In this deep dive, Wiz breaks down a real-world attack, then rewinds the playbook to show how effective detection and response could have shut it down.
A CISO’s Guide to Mastering Cyber Incident Response – With 98% of organizations hit by vendor-related breaches, learn how to shift from reactive chaos to strategic response. SecurityScorecard’s CISO lays out how to ask the right questions, communicate clearly, and implement preventative best practices.
Advertisement. Scroll to continue reading.
Fighting Deepfakes: Transformative Approaches to Protect Your Business – Deepfake-related incidents rose 245% globally in 2024, challenging what’s real and what’s fraud. Ping Identity experts explore emerging attack vectors and practical defenses to stay ahead of synthetic media threats across sectors.
Leveraging ISP and ASN as New Indicators of Compromise (IOC) in Cyber Threat Intelligence – Move beyond IP-based threat detection with innovative approaches using ISPs and ASNs. Join this session and learn how proactive monitoring of entire IP ranges can uncover threats faster and improve visibility.
Agentic AI: The Next Frontier of Adversarial Threats and Incident Response – Agentic AI is changing the nature of cyberattacks and incident response. This forward-looking session will prepare you for adversaries using autonomous tools to launch phishing, manipulate local models, and evade detection.
Detecting Cyber’s Costliest Problem: AI-Fueled Social Engineering – Generative AI is supercharging social engineering attacks, making them more scalable, targeted, and difficult to detect. This session explains why traditional detection methods fall short, and how organizations can build a context-aware, cross-functional defense to protect enterprise systems, people, and capital.
The Fog of Threat: A Ransomware Investigation – Ransomware tactics are evolving rapidly to maximize damage and pressure. In this immersive session, Unit 42 experts from Palo Alto Networks recount a high-stakes ransomware attack on a large manufacturer. Attendees will walk through the attack’s anatomy, the response actions taken, and the broader ransomware trends emerging in 2025.
Closing the Gaps: Strengthen Security Posture & Stop Attacks – Identity is the new perimeter—and attackers know it. This session shows how Okta’s Identity Security Posture Management and AI-powered Identity Threat Protection can expose shadow IT, detect real-time threats like session hijacking, and unify your identity strategy to protect your digital ecosystem.
From Justification to Implementation: Tips for Deciding on Supply Chain Detection and Response – As supply chain attacks grow in frequency and complexity, Supply Chain Detection and Response (SCDR) emerges as a critical solution. This session outlines how to build the business case for SCDR, select the right capabilities, compare alternatives, and plan for effective implementation.
An Introductory Demonstration of Deepfake Mitigation with PingOne Verify – Get a hands-on look at how Ping Identity’s PingOne Verify detects and mitigates deepfake threats. This demo shows real-time defense against both presentation and injection attacks, offering a practical glimpse into next-gen identity verification technology.
Wiz 15-Minute Platform Overview: Protect Everything You Build and Run in the Cloud – Cloud-native security requires speed and visibility. This session offers a tour of the Wiz platform, demonstrating how it provides end-to-end protection from code to runtime. Learn how top companies are simplifying cloud security while accelerating innovation.
Original Post URL: https://www.securityweek.com/event-preview-2025-threat-detection-incident-response-virtual-summit/
Category & Tags: Threat Intelligence,Event,threat detection,threat intelligence – Threat Intelligence,Event,threat detection,threat intelligence
Views: 2