Darktrace and McLaren are dynamic organizations, operating in unpredictable environments. To stay one step ahead of attackers, McLaren have deployed Cyber AI to protect their entire digital infrastructure, helping to detect, investigate, and respond to threats with precision and speed.
This executive panel will highlight how innovation can improve business productivity, and address the power of AI in improving McLaren’s cyber security posture in the face of unpredictable threats. They will also discuss the security challenges of the last 12 months, and risks associated with the return to global racing.
Joining the panel:
- Chris Hicks, Group CIO at McLaren
- Dan Keyworth, Head of Business Technology at McLaren
- Justin Fier, Director of Cyber Intelligence & Analytics at Darktrace
- Dave Palmer, Chief Product Officer at Darktrace
15:30 - 16:00 CEST (UTC +2)
11:00 - 11:30 AEST (UTC +10)
As today’s workforce norms and technical innovations are rapidly evolving, ransomware attacks are adapting to become increasingly sophisticated and widespread. The automated elements of these attacks, malware that moves faster than security teams can respond, is one of the most damaging hallmarks of these ransomware campaigns.
Join Sarah Jarman (Team Lead, Australia) as she unpacks the nuances of some of today’s most costly and advanced ransomware and shares how self-learning AI uniquely empowers organizations across industries to fight back. Including real-world case studies on Dharma, Sodinokibi and LeChiffre Ransomware.
16:00 - 16:30 CEST (UTC +2)
15:00 - 15:45 BST (UTC +1)
The Microsoft Exchange server attack carried out by Hafnium has once again highlighted the failure of signature-based tools in detecting advanced zero-day attacks. With over 250,000 servers believed to have been compromised, there are important lessons to be learnt on how organizations protect themselves.
In the aftermath of the attack, join Max Heinemeyer (Darktrace’s Director of Threat Hunting) as he uncovers how Darktrace’s AI detected and neutralized a Hafnium attack back in December 2020 – months before public attribution.
14:00 - 14:45 CEST (UTC +2)
14:30 - 15:00 BST (UTC +1)