Live Webcast|1 hour

Breaking the Chain: How to Disrupt Cybercrime’s Use of Stolen Data

Attendees will learn:

  • How infostealers and credential theft have become foundational to modern attack chains
  • The role of underground marketplaces in accelerating ransomware and fraud
  • Practical strategies for identifying, prioritizing, and acting on emerging threat signals
June 30, 2025
2:00 PM ET
Sponsored by:

Reserve Your Spot for Our Upcoming Webcast

By clicking the Register button below, you agree to SC Media Terms of Use and Privacy Policy.

The modern cybercrime economy runs on stolen data. As detailed in Flashpoint's 2025 Global Threat Intelligence Report (GTIR), infostealers harvested over 2.1 billion credentials in a single year — fueling everything from account takeovers to ransomware operations. These credentials are quickly monetized across underground forums, forming the backbone of today’s most damaging cyber campaigns.

To disrupt this cycle, organizations need more than visibility into their own environment — they need intelligence that connects adversary behaviors, marketplace trends, and malware ecosystems. This webcast will explore how security teams can act on GTIR insights to proactively identify and neutralize real-world threats before they escalate.

Event Speakers

Ian Gray
VP of Intelligence at Flashpoint

Ian Gray is a VP of Intelligence at Flashpoint, where he focuses on cybercrime intelligence. Ian actively researches cybercriminal fraud venues and misuse of new and emerging technologies. He holds a Master’s degree from Columbia University’s School of International and Public Affairs, where he studied cyber policy. Ian is also an adjunct professor at Fordham University’s Cybersecurity Program, where he teaches a course on technology and policy.

Paul Asadoorian
Principal Security Researcher at Eclypsium

Paul Asadoorian is currently the Principal Security Researcher for Eclypsium, focused on firmware and supply chain security awareness. Paul’s passion for firmware security extends back many years to the WRT54G hacking days and reverse engineering firmware on IoT devices for fun. Paul and his long-time podcast co-host Larry Pesce co-authored the book “WRTG54G Ultimate Hacking” in 2007, which fueled the firmware hacking fire even more. Paul has worked in technology and information security for over 20 years, holding various security and engineering roles in a lottery company, university, ISP, independent penetration tester, and security product companies such as Tenable. In 2005 Paul founded Security Weekly, a weekly podcast dedicated to hacking and information security. In 2020 Security Weekly was acquired by the Cyberrisk Alliance. Paul is still the host of one of the longest-running security podcasts, Paul’s Security Weekly, he enjoys coding in Python & telling everyone he uses Linux.