Upcoming Summits
Tuesday, August 8, 2017 | 7:45AM to 6:00PM | Hyatt Regency Chicago | 151 E Upper Wacker Dr, Chicago, IL 60601
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
The DDoS risk curve in 2017 looks very different than only five years ago. The Stakes Have Changed around the that threat capability continuum as attacks in size, frequency and complexity have evolved. Join this session for a discussion of the expectations around response strategies and approaches in the face of evolving threats.
Seating is Limited. Please RSVP to Roundtable1@CyberSummitUSA.comWith the ever-increasing rate of cyber incidents, today’s cyber security leaders are facing an equally substantial shift: Prevention is not enough, nor is it realistic – at some point, a cyber incident will occur. The organizations that have accepted this reality are morphing into a state of resiliency. Cyber Resilience is the ability to operate and recover from a cyber incident with the most minimal impact to the business. Resilience is not inherent to organizations and is attained through strategic planning, ongoing communication, collaboration and nimble tactics in order to operate fluidly in today’s cyber risk landscape.
In this session we will:Join the region’s leading executives, and cybersecurity leaders as they share current and next generation best practices, explore new proactive and predictive strategies, and policies to combat and withstand threats. Understanding that breaches will occur, security executives must work with senior leaders and boards of directors to assess value, measure costs, and identify risk to then properly architect and implement a comprehensive security program.
Some topics include:The guidelines that influence your organization’s cybersecurity policies can come from a multitude of fronts: government regulators, security frameworks, industry associations, or corporate leadership. These sometimes complimentary, sometimes contradictory forces can quickly create a complicated web of rules and regulations that can become seemingly impossible to fully comply with. When compliance issues have you pushed against the wall, your cyber security providers can help guide you through the minefield of compliance requirements that lie ahead of you and your organization. This panel will discuss the challenges of meeting competing compliance issues, how to prioritize policy requirements, and how your cyber solution provider can assist you in implementing a fully compliant cybersecurity program.
Information security organizations and leaders have seen a meteoric rise in significance and prominence as IT ecosystems change at a more rapid pace than ever before. In the past few years, there have been a spate of high-profile breaches and attacks that have cost businesses billions of dollars in revenue and inestimable injury to growth and productivity. This puts tremendous pressure on InfoSec organizations and leaders to demonstrate that they are taking concrete measures to protect the enterprise.
With its emphasis on structure, transparency, extensiveness, certainty and adaptability, Risk Management is an ideal model for cybersecurity programs. Core risk management principles of creating value, being an integral part of organizational and decision-making process, being systematic, processing accurate and extensive information, and continuously monitoring and improving are directly applicable to InfoSec programs. Risk-centric management of cybersecurity programs can transform how InfoSec organizations operate, communicate and contribute to business growth. In this session we:For decades, organizations have needed to compromise between security and business productivity. Web proxies protect organizations by blocking or allowing employees’ access to the web. Proxies leverage browsing policies, URL categorization, threats feed, SSL termination and A/V to model and identify good and bad websites but are challenged with handling risky and uncategorized sites. Today, with millions of new sites popping every day, some of which exist for less than 24 hours, the “block or allow” approach is no longer sufficient against malicious websites which prey on browser vulnerabilities to deliver malware.
In recent years, web isolation (a.k.a remote browsing) has emerged as the leading technology for eliminating threats from risky and uncategorized sites. This agentless technology executes web sessions away from endpoints, sending a safe visual stream to users’ devices while providing a seamless browsing experience. Web isolation is proving to be a game changer in web security and is bringing a generational leap for web proxies. Enterprises can maximize business productivity with secure unrestricted web access to uncategorized and risky sites, while minimizing operational overhead from related to managing web access policies, support tickets, security alerts and investigations. Join this session to learn:As 2016 drew to a close, a year in which cybercriminals seemingly remained a few steps ahead, one might have noticed an increase of cyber crime in areas ranging from national defense, politics, & global economic systems to smart homes and personal devices. With a growing reliance and utilization of consumer & commercial data, social media, autonomous cars, smart city infrastructure and an exponentially increasing market of IoT devices, how can we best prepare and defend against the next-generation of cyber attacks?
Moderated by David Cass, CISO, IBM
With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
In this session, learn about:
The most prodigious threat to the security and safety of the U.S. Enterprise is no longer the hacker attacking from beyond network walls, but the unruly employee already within them. According to recent market research, it is now estimated that “Insiders” conduct more than 50% of cyber attacks. What happens when a fast riser or even an uninspired employee decides to go to a competitor or launch his or her own endeavor? What data, clients or personal information is capable of being exfiltrated on their way out? This panel will focus on the identifiers and triggers that often go undetected and discuss ways to best defend against corporate espionage.
Sponsor / Exhibitor Technology Showcase, Business Meetings & Cocktail / Cigar Reception
* Agenda items & speakers subject to change
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |