We just sent you a verification email. Please verify your account to gain access to
mWise Conference 2024. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For mWise Conference 2024
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for mWise Conference 2024.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
mWise Conference 2024. If you don’t think you received an email check your
spam folder.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to mWise Conference 2024
Please sign in with LinkedIn to continue to mWise Conference 2024. Signing in with LinkedIn ensures a professional environment.
Sr. Manager of Mandiant IR and RemediationGoogle Cloud
The interview in Denver, Colorado at mWISE with Nader focused on cybersecurity threats, particularly remote access tools (RATs) and monitoring tools. Nader emphasized the use of these tools by threat actors to maintain control within organizations. He highlighted the importance of hunting for and blocking unauthorized remote tools to prevent attacks. The discussion also touched on AI in cybersecurity, with Nader noting the advantage of the blue team but warning of catching up by threat actors. Red teaming with AI integration was discussed as a proactive appro...Read more