Join us to learn new strategies that create a hostile environment for attackers and further advance the resilience of your organization

Chelsea Piers, NYC

March 11

Boarding 5:30 p.m. | Departure 6 p.m. | Concludes 9 p.m.

reserve your spot

How attackers choose their targets

Cybercriminals love to target environments where they face minimal resistance to establishing persistence, escalating privileges, moving laterally, exfiltrating data, and deploying ransomware.

Resilient organizations act with strong hostility to attackers at the fore. Placing friction, visibility, and control at every step to create an environment threat actors will avoid.

Step aboard with ThreatLocker and discover more strategies and insights to ensure you are a bad target for cybercriminals.

What you’ll learn onboard

Through concrete examples and real attack scenarios, you will learn how to:

  • Drastically reduce attack vectors by tightly controlling what is allowed to run
  • Identify how attackers weaponize trusted applications and how to safely break that trust
  • Mitigate modern MFA vulnerabilities, including examples of real-world exploits
  • Contain lateral movement to prevent single-point compromises from becoming enterprise-wide incidents

The result is an environment that is operationally efficient for defenders and a bad target for attackers. So, attackers move on.

Who should attend

This event is designed for security leaders and decision-makers responsible for risk, resilience, and operational security, including:

  • CISOs, Deputy CISOs, and Heads of Security
  • Security Architects and Engineering Leaders
  • SOC, Blue Team, and Incident Response Leaders
  • IT and Infrastructure leaders with security accountability
  • MSP and MSSP security leadership

Event details

Hop aboard to add practical and agile Zero Trust tactics that keep cybercriminals out—and looking elsewhere.

  • Chelsea Piers
  • March 11 | Boarding at 5:30 PM | Event concludes at 9:00 PM
  • Dinner and drinks provided
  • Peer networking
  • Colleagues welcome

If you are responsible for reducing organizational risk while maintaining operational continuity, this session is for you.

Reserve your spot

Photos from past events

ThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELightThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELightThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELightThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELightThreatLocker CTRL+ALT+DELight event photoThreatLocker CTRL+ALT+DELight event photo