Black Hat 2023

GovWare Singapore

Trellix Booth K12: Collaterals Information

October 15 -17, 2024
Sands Expo and Convention Centre, Singapore

Events

Visit us regularly to view our global events and learn more about Trellix’s presence at each of the following events.

Webinars

Register for live and on-demand webinars. Keep up with the latest innovations and announcements from Trellix.

Tech Talk Series

Join Trellix technical experts in a weekly 30-minute tech talk webinar series.

Product Tours

The Trellix XDR ecosystem contains a suite of products that provide world-class cybersecurity.

Portrait of Trellix Chief Executive Officer, Bryan Palma

Bryan Palma

Chief Executive Officer, Trellix

Read Biography

Shadow Syndicates and Cyber Titans: A New Security Paradigm

16 October, 9.00am - 9.30am
GovWare Main Conference Room
Room GW1, Level 4, Sands Expo & Convention Centre

The cybersecurity industry is confronted by escalating threats from relentless adversaries. As hacktivist, criminal, and nation-state actors merge into shadow syndicates, the need to strengthen a unified cybersecurity community has never been greater. Thankfully, Chief Information Security Officers (CISOs) are at the helm, balancing technical expertise with strategic leadership and building the next generation of cyber titans.

Join this session to learn what’s top of mind for the best CISOs in the world, discover how GenAI benefits attackers and defenders, and explore the most critical cyber security trends over the next decade.

Portrait of Trellix Chief Executive Officer, Harold Rivas

John Fokker

Head of Cyber Investigations, Trellix Threat Labs

Read Biography

The Dark Side of Innovation: Generative AI in Cybercrime

16 October, 2.00pm - 2.30pm
Track Title: Governance and Assurance in AI

Room GW3 Level 4, Sands Expo & Convention Centre

The landscape of cyber threats is undergoing a transformative shift with the integration of Generative AI (GenAI) technologies by cybercriminals. This presentation delves into how GenAI tools are increasingly being adopted in the cybercrime arena, highlighting specific cases where these technologies have been utilized for malicious purposes. We will explore a range of examples including phishing attacks crafted with AI-generated content, the use of deepfakes for identity fraud, and AI-driven network intrusion techniques.

Join us for an insightful examination of these urgent issues, framed within the broader context of AI’s impact on the future of digital security and criminal activities.

Demo Stations and Collateral Information


Demo Stations Collateral Links

Gen AI-Powered XDR

Minutes matter — Shut down threat actors and mobilize your response using our open, AI-powered XDR Platform.

  • Integrate hundreds of tools to establish context
  • Prioritize & rapidly stop multi-vector attacks
  • Upskill teams with AI, orchestration, and automation

Endpoint Security

Get comprehensive visibility and control endpoints across your organization for more resilience before, during, and after attacks.

  • Optimize endpoints to prevent modern attacks
  • Disrupt attacks faster with AI-guided investigations
  • Fortify security posture with endpoint forensics

Email Security

Trellix Email and Collaboration Security protects organization and partner ecosystems by stopping threats targeting users of email communications, collaboration platforms, and SaaS applications

  • Enhance Microsoft Office 365 defense
  • Block advanced Business Email Compromise and phishing attacks
  • Reduce risk of compromise in collaboration platforms

Better with Trellix logo

Trellix’s unmatched integrations across our broad partner ecosystem work within your existing architecture, speeding up time to value without replacing your current investments.

  • 400+ open and native integrations
  • Customize solutions to fit your unique environment
  • Advancing security with our Partner Security Innovation Alliance

Network Security

Trellix Network Detection and Response eliminates blind spots, disrupts attackers, and speeds-up investigation and response across the cyber kill chain.

  • Eliminate security blindspots
  • Disrupt attackers at every stage
  • Accelerate investigation and response

Data Security

Protect your organization’s data with exceptional visibility and comprehensive controls from Trellix Data Security.

  • Protect against insider threats
  • Speed up and simplify compliance activities
  • Manage your expanding information footprint