We can’t wait to see you at SecTor.

Helping you manage your cyber risk across an ever-expanding digital attack surface is our mission and passion.

We’ve assembled the tools you need, including market-leading XDR, powerful attack surface risk management, advanced threat defense techniques, and global threat research, to take on the many challenges facing cybersecurity experts like you.

We’re so excited to meet you at SecTor and share more about how our unified cybersecurity platform is fundamentally changing the game.


We’re so excited to meet you at Black Hat USA and share more about how our unified cybersecurity platform is fundamentally changing the game—both virtually and in-person.

Section 0 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Speaking Sessions

Calculating Risk in the Era of Obscurity:
Reading Between the Lines of Security Advisories

Wednesday, Oct. 5 | 11:30 a.m.-12:00 p.m. EST

Headshot_Dustin   

Dustin C. Childs, Head of Threat Awareness, Zero Day Initiative/Trend Micro

Complying with industry standards and government regulations requires an understanding of the risk to your resources from poor servicing. While standards exist to help assess risk, vendors can manipulate them, leading to errors.

Join this session to uncover examples of systemic problems with security patches and how those problems negatively impact enterprise security, based on our conclusions from disclosing more than 9,500 vulnerabilities over 17 years.


GitHub Actions: Vulnerabilities, Attacks, and Counter-measures

Thursday, Oct. 6 | 1:30 p.m.-2:30 p.m. EST
Tech1 - 2022

Magno Logan

Magno Logan, Information Security Specialist, Trend Micro

More organizations are applying a DevOps methodology to optimize software development. One of the main tools used in this process is a continuous integration (CI) tool that automates code changes from multiple developers working on the same project. In 2019, GitHub released its own CI tool called GitHub Actions to help you automate tasks within your software development life cycle, and it has been gaining a lot of adoption from developers.

This talk demonstrates how GitHub Actions work and show security measures to protect your Actions from misuse by attackers. It results from detailed research published earlier this year on the topic where the author investigated abuse case scenarios such as how attackers were leveraging this free service to mine cryptocurrencies on their behalf and behalf of other users, among other attack vectors.

Full research article: https://research.trendmicro.com/GitHubActions


Leverage the Zero Trust Model to Secure your Hybrid Cloud

On-Demand Zone | Swapcard App

Peter Cresswell

Peter Cresswell, Security Architect and Sr. SE, Trend Micro

Join Trend Micro to discover how embracing the principles of Zero Trust Security can allow you to securely adopt the Cloud solutions you want. We'll look at the architecture of Zero Trust and show how Trend's solutions can help you secure your connection to SaaS and Cloud resources.


Registered guests can join us at booth #1732 or meet with our experts virtually. 

Section 4 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 4 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Let's Connect

Our passionate cybersecurity experts look forward to connecting with you during the event for meetings and one-one-one demos—in-person or otherwise.

Registered guests can join us at booth #G512 or meet with our experts virtually. 

Meet our SOC experts

Connect with our senior technical leadership to strategically navigate topics such as SOC/SecOps, MDR, EDR, XDR, SIEM, Vulnerability Management, and Cloud Security to make your security postures more robust.


Section 5 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 5 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Want to Get Started Now?

Sign up for a free, 60-day trial of Trend Micro Vision One™ to modernize
your security operations with industry-leading XDR, attack surface management,
risk scoring, and Zero Trust capabilities.


Section 6 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 6 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 6 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.