Innovative cyber attacks are on the rise—threatening corporate and government infrastructure, supply chains, brand reputations, and revenues. One of the best ways to prepare for the evolving threats of tomorrow is to revisit the details of recent major cybersecurity incidents. The benefit of hindsight can help us spot warning signs and avoid poor security practices in our organizations.
In this session, we walk through three recent use cases where a new threat caught organizations off-guard. We’ll discuss:
- How to recognize the tactics, techniques, and procedures (or TTPs) that attackers used in each threat instance
- Best practice tips that organizations can use to improve both their resilience to new threats and their response times to incidents
- Threat landscape predictions for 2023

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- Russia Blames US Intelligence for iOS Zero-Click Attacks
- Toyota Discloses New Data Breach Involving Vehicle, Customer Information
- Cisco Acquiring Armorblox for Predictive and Generative AI Technology
- Moxa Patches MXsecurity Vulnerabilities That Could Be Exploited in OT Attacks
- Amazon Settles Ring Customer Spying Complaint
- Organizations Warned of Salesforce ‘Ghost Sites’ Exposing Sensitive Information
- Adobe Inviting Researchers to Private Bug Bounty Program
- Critical Vulnerabilities Found in Faronics Education Software
