Darktrace Webinars
Webinars
Darktrace experts share thoughts on the current state of the cyber landscape and the latest innovation coming out of the AI Research Centre.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/661d306544cc6b084a95884e_Screenshot%202024-04-15%20at%2014.49.13.png)
/Cloud Innovations Broadcast
Join our Darktrace expert team as they unveil new innovations in cloud security. Learn about how Darktrace Cloud Security uses Self-Learning AI to provide complete cyber resilience for multi-cloud environments.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273eba99e35c117ae838921_nabil-zoldjalali.avif)
Nabil Zoldjalali
VP, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273eba99e35c117ae838921_nabil-zoldjalali.avif)
Nabil Zoldjalali
VP, Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6617cd2070e0eb08949b4bf1_Darktrace%20cloud%20innovation%20broadcast.avif)
/Cloud Product Spotlight
Join Max Heinemeyer, Chief Product Officer at Darktrace, for this Product Spotlight webinar on Darktrace/Cloud. The agenda includes a product demo, a fireside chat with our partners at AWS, and a selection of real-world customer stories.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62dab49ce465da08b2121e3b_max_heinemeyer.avif)
Max Heinemeyer
Global Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62dab49ce465da08b2121e3b_max_heinemeyer.avif)
Max Heinemeyer
Global Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66dacf3061ed7ad52b8900ee_webinars.avif)
HEAL Launch Event
Join our Darktrace expert team such as Nicole Eagan, Chief Strategy & AI Officer and Matt Bovbjerg, VP of Integrations to unveil our newest product: Darktrace HEAL. Tune in to get a first look into how HEAL allows you to recover in the event of a cyber-attack and return systems to a trusted operational state.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/63d1a2bdbcec711f0dd170da_Matt%20B.avif)
Matt Bovbjerg
VP of Integrations, Darktrace
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/63d1a2bdbcec711f0dd170da_Matt%20B.avif)
Matt Bovbjerg
VP of Integrations, Darktrace
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/677d5e36766085c79e95917b_Nicole.avif)
Nicole Eagan
Co-founder and Strategic Advisor
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/677d5e36766085c79e95917b_Nicole.avif)
Nicole Eagan
Co-founder and Strategic Advisor
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66dacf3061ed7ad52b8900ee_webinars.avif)
HEAL Product Spotlight
Join Mike Beck, CISO at Darktrace, for this Product Spotlight webinar on Darktrace HEAL. The agenda includes a product demo, customer panel, and discussion around the benefits of HEAL for a CISO.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/65ca2f5e376dfc8de6bb3e8e_Mike.jpg)
Mike Beck
Global CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/65ca2f5e376dfc8de6bb3e8e_Mike.jpg)
Mike Beck
Global CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6617cd2070e0eb08949b4bf1_Darktrace%20cloud%20innovation%20broadcast.avif)
Exploring the Evolving Email Security Landscape, with Forrester
In this ever-evolving landscape, understanding the trajectory of email security, the influence of AI, and the strategies to confront threats is pivotal. This conversation between Darktrace and Forrester explores the multifaceted realm of email security, encompassing immediate challenges, evolving threats, and the integration of AI.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66f429c7cb6b1816b3677ce9_Nicole.avif)
Nicole Carignan
SVP, Security & AI Strategy, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66f429c7cb6b1816b3677ce9_Nicole.avif)
Nicole Carignan
SVP, Security & AI Strategy, Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66dacf3061ed7ad52b8900ee_webinars.avif)
Webinar: How Does NIS2 Impact Cyber Security and AI?
In January 2023, the European Parliament introduced NIS2 as a successor to the original Network and Information Security (NIS) Directive, with a focus on further strengthening the resilience, information security, and infrastructure security of critical entities within the EU. This NIS2 Directive requires member states to adopt laws that will improve the cyber resilience of organisations within the EU. As organisations are now preparing to meet the forthcoming legislation, join John Allen, VP Cyber Risk and Compliance, to explore its most significant features, and what this means for security teams in the age of AI.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66f429eb9daa29983027b4e5_John%20Allen.avif)
John Allen
SVP, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66f429eb9daa29983027b4e5_John%20Allen.avif)
John Allen
SVP, Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66dacf3061ed7ad52b8900ee_webinars.avif)
Seminario web en español: ¿Cómo afecta la NIS2 a la ciberseguridad y la IA?
En enero de 2023, el Parlamento Europeo presentó la NIS2 como sucesora de la directiva original de seguridad de la información y las redes (NIS), con un enfoque en fortalecer aún más la resiliencia, la seguridad de la información y la seguridad de la infraestructura de entidades críticas dentro de la UE.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6346c5d2f4a16251151ec6f4_carlos.jpg)
Carlos Gray
Product Manager
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6346c5d2f4a16251151ec6f4_carlos.jpg)
Carlos Gray
Product Manager
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6304df35cdb1fc5cb2d72b7e_jose.jpg)
José Badía López
Country Manager España & Portugal
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6304df35cdb1fc5cb2d72b7e_jose.jpg)
José Badía López
Country Manager España & Portugal
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66dacf3061ed7ad52b8900ee_webinars.avif)
Webinaire en français: Quel est l'impact du NIS2 sur la cybersécurité et l'IA ?
Le Parlement européen a introduit en janvier dernier la directive NIS2, laquelle succède à la directive originale "Network and Information Security" (NIS), dans le but de renforcer la résilience, la sécurité de l'information et la sécurité de l'infrastructure des entités critiques au sein de l'UE.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/64088def788d346be79af926_2%20Lucas%20O.avif)
Lucas O’Donohue
Cyber Education Specialist
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/64088def788d346be79af926_2%20Lucas%20O.avif)
Lucas O’Donohue
Cyber Education Specialist
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66dacf3061ed7ad52b8900ee_webinars.avif)
Deutsches Webinar: Wie wirkt sich die NIS2-Richtlinie auf die Cybersicherheit und KI aus?
Im Januar 2023 führte das Europäische Parlament die NIS2-Richtlinie als Nachfolgerin der ursprünglichen Richtlinie zur Netz- und Informationssicherheit (NIS) ein, deren Schwerpunkt auf der weiteren Stärkung der Widerstandsfähigkeit, Informationssicherheit und Infrastruktursicherheit kritischer Einrichtungen innerhalb der EU liegt.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/64c1249ff26f47b4de4814df_MicrosoftTeams-image%20(27).avif)
Beverly McCann
Director of Analysis
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/64c1249ff26f47b4de4814df_MicrosoftTeams-image%20(27).avif)
Beverly McCann
Director of Analysis
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66dacf3061ed7ad52b8900ee_webinars.avif)
Webinar italiano: Come la NIS2 influenza la cyber security e l'intelligenza artificiale?
Nel gennaio 2023, il Parlamento Europeo ha introdotto la direttiva NIS2 che sostituisce e rafforza la direttiva originale Network e Information Security (NIS). Essa, richiede agli Stati membri di adottare leggi che migliorino il livello di cybersicurezza delle organizzazioni presenti nell'UE.
Francesco La Marca
Senior Cyber Technologist, Darktrace
Francesco La Marca
Senior Cyber Technologist, Darktrace
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66dacf3061ed7ad52b8900ee_webinars.avif)
Nederlands Webinar: Welke invloed heeft NIS2 op cyberbeveiliging en AI?
In januari 2023 introduceerde het Europees Parlement NIS2 als opvolger van de oorspronkelijke richtlijn voor netwerk- en informatiebeveiliging (NIS), met een focus op het verder versterken van de veerkracht, informatiebeveiliging en infrastructuurbeveiliging van kritieke entiteiten binnen de EU.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/640a0a50d7ed318f3fa5fbb3_Pieter_cutout_whiteBG.avif)
Pieter Jansen
SVP, Cyber Innovation
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/640a0a50d7ed318f3fa5fbb3_Pieter_cutout_whiteBG.avif)
Pieter Jansen
SVP, Cyber Innovation
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672b9389025aa3c652e93bdd_Cloud%20Webinar%20thumbnail.avif)
Securing Multi-Cloud Environments
As organizations increasingly adopt multi-cloud architectures, the need for advanced, real-time threat detection and response is critical to keep pace with evolving cloud threats. In this webinar, join our Cloud Security and AI experts to explore the rapidly evolving field of Cloud Detection and Response (CDR), which focuses on identifying, analyzing, and mitigating sophisticated threats within dynamic multi-cloud environments.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672b97244de5b31f70ac1c15_Kellie%20Regan.avif)
Kellie Regan
Director, Product Marketing - Cloud Security
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672b97244de5b31f70ac1c15_Kellie%20Regan.avif)
Kellie Regan
Director, Product Marketing - Cloud Security
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/67084b501dbda8b39cc5eb7a_Sam%20Profile%202024%5B2%5D.avif)
Sam Wolfshohl
Cloud Technical Specialist
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/67084b501dbda8b39cc5eb7a_Sam%20Profile%202024%5B2%5D.avif)
Sam Wolfshohl
Cloud Technical Specialist
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672b955ec4ac2b457be4efaf_06%20-%20Dark%20Background%20-%20Full%20Flow%20B%20(1).avif)
Beyond Spam Filters and Firewalls: Preventing BEC in the Modern Enterprise
Many of today's most damaging cyber-attacks begin with a phishing lure delivered over corporate email. Yet many enterprises still don't have a unified security strategy to prevent intrusions via their email and messaging systems, leaving them open to a wide range of exploits. In this webinar, top experts discuss strategies for limiting access to critical email systems, when to encrypt email attachments and transmissions, how to minimize phishing risks, and how to build a day-to-day process for protecting email against common cyber-attacks.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6346c5d2f4a16251151ec6f4_carlos.jpg)
Carlos Gray
Product Manager
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6346c5d2f4a16251151ec6f4_carlos.jpg)
Carlos Gray
Product Manager
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672b99ec97ee1b1288f23345_02%20-%20Dark%20Background%20-%20Trace%20A.avif)
Building a Ransomware Response Playbook for Network Resilience
Preparation is key to security. When there is a security incident – Do you know what to do? Do you know what to do after that? A proper incident response plan considers all the potential scenarios and outlines all the steps to take to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business running.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66e1849ed573158fb2fd9f77_Marcus%20Fowler%20Final.avif)
Marcus Fowler
CEO of Darktrace Federal and SVP of Strategic Engagements and Threats
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66e1849ed573158fb2fd9f77_Marcus%20Fowler%20Final.avif)
Marcus Fowler
CEO of Darktrace Federal and SVP of Strategic Engagements and Threats
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672b9da2642b39a7bcfd380f_01%20-%20Dark%20Background%20-%20Bottom%20Flow.avif)
The Importance of Bespoke Security
In this webinar, you will hear from our subject matter experts, Hanah Darley, Head of Threat Research and Toby Lewis, Global Head of Threat Analysis. The discussion will cover the difference between media coverage of cyber threats compared with the most realistic threats to businesses. They will also be focusing on cyber risk, defense in depth, and the importance of bespoke security to counter relevant threats to organizations.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273eba7444f1a680faa180d_toby-lewis.avif)
Toby Lewis
Head of Threat Analysis
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273eba7444f1a680faa180d_toby-lewis.avif)
Toby Lewis
Head of Threat Analysis
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/64f9aedfa22aa3f89961dd1c_Hannah.avif)
Hanah-Marie Darley
Director, Security & AI Strategy, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/64f9aedfa22aa3f89961dd1c_Hannah.avif)
Hanah-Marie Darley
Director, Security & AI Strategy, Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672b955ec4ac2b457be4efaf_06%20-%20Dark%20Background%20-%20Full%20Flow%20B%20(1).avif)
Top Cloud Security Threats Targeting Today's Enterprises
The rapid shift to the cloud, driven by cost savings and remote work, left many enterprises exposed to an array of cyberattacks. In this webinar, experts talk about the latest ways threat actors are exploiting vulnerabilities in cloud services, applications, and configurations, and provide tips on how to define and implement the right security policies and controls to keep your environment — both on-prem and cloud — secure.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672ba16bcdd0a054113b19fc_Jacob%20Williams.avif)
Jake Williams
Enterprise Risk Management Expert
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672ba16bcdd0a054113b19fc_Jacob%20Williams.avif)
Jake Williams
Enterprise Risk Management Expert
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672b9da2642b39a7bcfd380f_01%20-%20Dark%20Background%20-%20Bottom%20Flow.avif)
Unleashing AI to Assess Cybersecurity Risk
Monumental advancements in artificial intelligence (AI) technology and machine learning and deep learning algorithms can also transform enterprise risk management by giving security teams greater visibility and insights to assess the organization's cyber risk and overall security posture. In this webinar, experts will discuss ways machine learning and AI can help identify risk. Learn how to take advantage of new capabilities to properly measure and quantify cyber risk and help security teams address enterprise security challenges.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672ba3f640742ce0b9179909_Ed%20Metcalf.avif)
Ed Metcalf
Senior Director Product Marketing, AI & Innovations
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/672ba3f640742ce0b9179909_Ed%20Metcalf.avif)
Ed Metcalf
Senior Director Product Marketing, AI & Innovations
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/673268983fdc092b104f9c28_Screenshot%202024-11-11%20at%203.23.33%E2%80%AFPM.avif)
Overcoming Alert Fatigue – Strategically Using AI to Transform SOC Operations with an AI Analyst
In today’s rapidly evolving cyber landscape, Security Operations Centers (SOCs) are overwhelmed with a relentless stream of security alerts – with analysts facing the daunting task of investigating hundreds or even thousands of alerts daily. In this session, Darktrace will explore one of the most impactful use cases for AI in cyber defense: using an AI analyst to automatically triage and investigate alerts. With an AI analyst at their side, SOC teams can shorten investigation times, reduce alert fatigue, and ensure that every alert is investigated comprehensively. Transform your SOC operations and stay ahead of emerging threats by harnessing the full potential of an AI analyst.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62dab49ce465da08b2121e3b_max_heinemeyer.avif)
Max Heinemeyer
Global Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62dab49ce465da08b2121e3b_max_heinemeyer.avif)
Max Heinemeyer
Global Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/67326b98ae497503d48f9620_Screenshot%202024-11-11%20at%203.37.58%E2%80%AFPM.avif)
From Adversaries to Defenders: Navigating the New AI Reality
Nicole Carignan, VP, Strategic Cyber AI at Darktrace will discuss how the advent of AI is changing the threat landscape, evaluating how adversaries are using these tools now and what the future may hold as AI advancements continue to unfold at a rapid pace. As defenders look to stay one step ahead of the rising tide of unknown AI-powered threats, integrating defensive AI approaches in security operations has become critical in being able to proactively harden defenses, identify and respond to threats in machine speed, and uplift stretched teams. Nicole will explore different AI techniques and their unique applications in cybersecurity, emphasizing that not all AI is created equal and that the right types of AI, trained on the right data must be applied to the right security problem. Leveraging Darktrace’s learnings from over a decade of applying AI to the challenge of cybersecurity, Nicole will help to demystify the new AI reality in cyber.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66f429c7cb6b1816b3677ce9_Nicole.avif)
Nicole Carignan
SVP, Security & AI Strategy, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66f429c7cb6b1816b3677ce9_Nicole.avif)
Nicole Carignan
SVP, Security & AI Strategy, Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6732735bdfa44c73436d5acf_Screenshot%202024-11-11%20at%204.12.44%E2%80%AFPM.avif)
Transforming SOC Operations with AI: From Alert Fatigue to Proactive Defense
In today's rapidly evolving cyber landscape, Security Operations Centers (SOCs) are overwhelmed with a relentless stream of security alerts. Analysts face the daunting task of investigating hundreds or even thousands of alerts daily. The high volume of false positives further complicates the challenge, making it difficult to promptly identify and respond to genuine threats. This session will delve into how an AI Analyst can transform your SOC operations, significantly reducing alert fatigue and enabling your team to focus their efforts on high-priority security incidents. Leveraging advanced machine learning, an AI Analyst automatically triages and correlates threat alerts, transforming the process from thousands of alerts over days to a few critical incidents in minutes. This AI-driven approach can reduce investigation times by up to nine times, allowing your SOC team to eliminate the inherent risk of overlooking critical alerts. Ensuring that every alert is investigated comprehensively, an AI Analyst accelerates SOC operations with AI-led automated incident analysis and resolution.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62dab49ce465da08b2121e3b_max_heinemeyer.avif)
Max Heinemeyer
Global Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62dab49ce465da08b2121e3b_max_heinemeyer.avif)
Max Heinemeyer
Global Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6758ab82eedf441626ebc808_Webinar%20-%20AI-driven%20security%20for%20people%20thumbnail.avif)
AI-Driven Security for People: Protecting Identities Across the Attack Lifecycle
In today’s digital landscape, email remains a critical vector for cyber threats, making the protection of user identities paramount. Watch an insightful webinar where we delve into the people component of email security, focusing on how to safeguard identities throughout the entire attack lifecycle. This webinar explores how integrating signals from Darktrace / EMAIL and Darktrace / IDENTITY can help detect and respond to account compromises in real-time. Learn how AI-driven security solutions provide continuous protection by building comprehensive behavioral profiles for each user, offering contextual understanding of their activities across the digital ecosystem.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6346c5d2f4a16251151ec6f4_carlos.jpg)
Carlos Gray
Product Manager
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6346c5d2f4a16251151ec6f4_carlos.jpg)
Carlos Gray
Product Manager
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/675b1cca4f5cb096db66b84e_Predictions%20and%20Preparations%20thumbnail.avif)
Navigating the AI Cybersecurity Landscape of 2025: Predictions and Preparations
As the digital landscape evolves, so do the threats we face. Watch an insightful 30-minute webinar featuring Nicole Carignan, our VP of Strategic AI, and Nathaniel Jones, our VP of Threat Research, as they delve into how we expect the AI and cybersecurity landscape to evolve and our predictions for 2025. This session will explore the transition from the era of chatbots and generative AI to more sophisticated autonomous AI agents and agentic systems, including the implications for both threat actors and cyber defenders.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66f429c7cb6b1816b3677ce9_Nicole.avif)
Nicole Carignan
SVP, Security & AI Strategy, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66f429c7cb6b1816b3677ce9_Nicole.avif)
Nicole Carignan
SVP, Security & AI Strategy, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/64f9aeb50c385a4c545d844c_Nathaniel.avif)
Nathaniel Jones
VP, Security & AI Strategy, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/64f9aeb50c385a4c545d844c_Nathaniel.avif)
Nathaniel Jones
VP, Security & AI Strategy, Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/67630a88c2667175250b059e_Unleashing%20the%20Power%20of%20Microsoft%20and%20Darktrace%20%20thumbnail.avif)
Unleashing the Power of Microsoft and Darktrace
In an era where cybersecurity is more critical than ever, the collaboration between Darktrace and Microsoft stands out as a beacon of innovation. Join Francesca Bowen, Global Vice President of Cloud Alliances at Darktrace and Jeff Chin, Microsoft Global Blackbelt for an engaging fireside chat where we’ll explore how these two industry-leading companies take opposite approaches to the same problem. While Microsoft is the undisputed global leader of threat intelligence, receiving 78 trillion signals daily, Darktrace uses Self-Learning AI to continuously learn from day-to-day business operations to deeply understand what is normal for an enterprise. Designed from the ground up to build upon the benefits of your Microsoft investment while elevating & extending security through a diversified, attack-centric, and business-centric approach.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/667d188c1dd03b7145d48b6d_Screenshot%202024-06-27%20at%2008.45.09.avif)
Francesca Bowen
Global Vice President, Cloud GTM
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/667d188c1dd03b7145d48b6d_Screenshot%202024-06-27%20at%2008.45.09.avif)
Francesca Bowen
Global Vice President, Cloud GTM
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/63986ff91320eb651f2826dd_Crystal%20Ball.jpg)
Darktrace Predictions: What's In Store for 2023?
From the future of proactive security, to crypto-jacking and the rise of identity and MFA attacks, what does 2023 hold? Darktrace’s cyber experts draw on their experience and research to share predictions for the new year.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273eba7444f1a680faa180d_toby-lewis.avif)
Toby Lewis
Head of Threat Analysis
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273eba7444f1a680faa180d_toby-lewis.avif)
Toby Lewis
Head of Threat Analysis
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273ebb1fe34072589a67f1c_tony-jarvis.avif)
Tony Jarvis
VP, Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273ebb1fe34072589a67f1c_tony-jarvis.avif)
Tony Jarvis
VP, Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/63dabfdd5cac4f541a1fed88_webinar%20looking%20back%20on%202022.avif)
Looking back on 2022: The Cyber Landscape in Review
Dive into our analysts' biggest takeaways from a game-changing year in cybersecurity.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273ebacd74db54892c3338d_brianna-leddy.avif)
Brianna Leddy
Director of Analyst Operations
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273ebacd74db54892c3338d_brianna-leddy.avif)
Brianna Leddy
Director of Analyst Operations
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273eba4fe34072bc0a67e8c_justin-fier.avif)
Justin Fier
SVP, Red Team Operations
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273eba4fe34072bc0a67e8c_justin-fier.avif)
Justin Fier
SVP, Red Team Operations
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/63dae96863fcf4a37a16b3a2_Screen%20Shot%202023-02-01%20at%202.36.13%20PM.avif)
Getting Ahead of the Attacker: Mitigating Cyber Risk with a Cyber AI Loop
Learn how the Cyber AI Loop, an interconnected set of cyber security solutions, autonomously hardens defenses and uplifts human teams.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62dab49ce465da08b2121e3b_max_heinemeyer.avif)
Max Heinemeyer
Global Field CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62dab49ce465da08b2121e3b_max_heinemeyer.avif)
Max Heinemeyer
Global Field CISO
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/63e54999027312207673f5bb_Webinarepagebanner-Cloudsec.avif)
/Cloud Security: Taking Cover with Self-Learning AI
A new year, a new era of cloud attacks. Darktrace shares its proactive approach using self-learning AI to autonomously prevent, detect, and respond to cyber threats in your unique cloud environment.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be6780c909de63c57b55_62cc11ab6163bb192af00c23_MariaFung.jpeg)
Maria Fung
Technical Manager
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be6780c909de63c57b55_62cc11ab6163bb192af00c23_MariaFung.jpeg)
Maria Fung
Technical Manager
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62ced92042570a256c186e44_apmupdate.jpg)
Attack Path Modeling: Giving the Good Guys the Advantage
An expert panel discusses cutting-edge research in attack path modeling.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be678a8916fb530880df_62c49ef3e6341b8018ec6a57_1516944699873.jpeg)
Martin Sloan
Director of Security, Drax Group
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be678a8916fb530880df_62c49ef3e6341b8018ec6a57_1516944699873.jpeg)
Martin Sloan
Director of Security, Drax Group
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/65ca2f5e376dfc8de6bb3e8e_Mike.jpg)
Mike Beck
Global CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/65ca2f5e376dfc8de6bb3e8e_Mike.jpg)
Mike Beck
Global CISO
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/677d5e36766085c79e95917b_Nicole.avif)
Nicole Eagan
Co-founder and Strategic Advisor
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/677d5e36766085c79e95917b_Nicole.avif)
Nicole Eagan
Co-founder and Strategic Advisor
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62ced8403075ee0a9c38edc2_MITTR.jpg)
Outpacing Cybersecurity Adversaries: Hosted by MIT Technology Review
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be65a5f710510115b68c_62c30060206fc27594917620_Joe%2520Tenga.avif)
Joe Tenga
Chief Information Officer, Jacksonville Transportation Authority
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be65a5f710510115b68c_62c30060206fc27594917620_Joe%2520Tenga.avif)
Joe Tenga
Chief Information Officer, Jacksonville Transportation Authority
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be69d4973111448c7c20_62c300922dca57764e7de21c_Green.avif)
Ron Green
Chief Security Officer, Mastercard
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be69d4973111448c7c20_62c300922dca57764e7de21c_Green.avif)
Ron Green
Chief Security Officer, Mastercard
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be61d49731c0128c7b84_62c30034935f4db08486b66a_boyden.avif)
Boyden Rohner
Associate Director, Vulnerability Management, CISA
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be61d49731c0128c7b84_62c30034935f4db08486b66a_boyden.avif)
Boyden Rohner
Associate Director, Vulnerability Management, CISA
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be632d8aba4c732e33d9_62cee3d1c29cd0477847405b_LCosta.avif)
Dr. Lisa Costa
Chief Technology & Innovation Officer, U.S. Space Force
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62d5be632d8aba4c732e33d9_62cee3d1c29cd0477847405b_LCosta.avif)
Dr. Lisa Costa
Chief Technology & Innovation Officer, U.S. Space Force
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62c2ed58d7085112a2133408_62be06f39b2a473a81cb75d7_Screen%2520Shot%25202022-06-30%2520at%25204.26.21%2520PM.avif)
How Arrow McLaren SP Stays Ahead of Cyber-Threats
Hear how Darktrace's AI seamlessly scales to protect McLaren in both Formula 1 and the NTT INDYCAR series.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66e1849ed573158fb2fd9f77_Marcus%20Fowler%20Final.avif)
Marcus Fowler
CEO of Darktrace Federal and SVP of Strategic Engagements and Threats
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/66e1849ed573158fb2fd9f77_Marcus%20Fowler%20Final.avif)
Marcus Fowler
CEO of Darktrace Federal and SVP of Strategic Engagements and Threats
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273ebd2ad18988301e44a5e_taylor-kiel.avif)
Taylor Kiel
Team President, Arrow McLaren SP
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273ebd2ad18988301e44a5e_taylor-kiel.avif)
Taylor Kiel
Team President, Arrow McLaren SP
Oops! Something went wrong while submitting the form.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/62bdde38981cf54d56bad7bb_62ac01d48b450e52ae087c8f_540332.avif)
Defending Critical Infrastructure with AI
Discover the cyber-threats facing critical infrastructure and how Self-Learning AI can protect against these attacks.
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273ebae37063ead58db3c0f_jeff-cornelius.avif)
Jeff Cornelius
EVP, Cyber-Physical Security
![](https://cdn.prod.website-files.com/626ff4d25aca2edf4325ff97/6273ebae37063ead58db3c0f_jeff-cornelius.avif)
Jeff Cornelius
EVP, Cyber-Physical Security
Oops! Something went wrong while submitting the form.
Customer stories
Anywhere, everywhere & everyone
We work with organizations across all industries, including the engineering team at McLaren Racing, giving you the chance to meet incredible people who are dedicated to pushing the boundaries of what technology can achieve.