Thursday, June 29, 2017 | 7:45AM to 6:00PM | The Ritz-Carlton, Tysons Corner | 1700 Tysons Blvd, McLean, VA 22102This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
Data is the lifeblood of security operations. Logs, flows and telemetry data are used to identify attacks, detect threats, and for forensic investigation. But the exponential growth of this data has left security teams struggling to manage it. Traditional tools can’t handle the volume, rules and signatures can’t detect advanced threat patterns, and there is simply too much for humans to process manually. We will explore how big data analytics can help you put this data to work in order to proactively identify threats and protect your network.Keynote Presented by
The guidelines that influence your organization’s cybersecurity policies can come from a multitude of fronts: government regulators, security frameworks, industry associations, or corporate leadership. These sometimes complimentary, sometimes contradictory forces can quickly create a complicated web of rules and regulations that can become seemingly impossible to fully comply with. When compliance issues have you pushed against the wall, your cyber security providers can help guide you through the minefield of compliance requirements that lie ahead of you and your organization. This panel will discuss the challenges of meeting competing compliance issues, how to prioritize policy requirements, and how your cyber solution provider can assist you in implementing a fully compliant cybersecurity program.Moderated by Dave Mahon, VP & CSO, CenturyLink
Presented By Dave Mahon, VP & CSO, CenturyLink
Seating is Limited. Please RSVP to Roundtable2@CyberSummitUSA.com
As 2016 drew to a close, a year in which cybercriminals seemingly remained a few steps ahead, one might have noticed an increase of cyber crime in areas ranging from national defense, politics, & global economic systems to smart homes and personal devices. With a growing reliance and utilization of consumer & commercial data, social media, autonomous cars, smart city infrastructure and an exponentially increasing market of IoT devices, how can we best prepare and defend against the next-generation of cyber attacks?
Moderated by Chuck Brooks, Vice President for Government Relations & Marketing, Sutherland Global Services
The most prodigious threat to the security and safety of the U.S. Enterprise is no longer the hacker attacking from beyond network walls, but the unruly employee already within them. According to recent market research, it is now estimated that “Insiders” conduct more than 50% of cyber attacks. What happens when a fast riser or even an uninspired employee decides to go to a competitor or launch his or her own endeavor? What data, clients or personal information is capable of being exfiltrated on their way out? This panel will focus on the identifiers and triggers that often go undetected and discuss ways to best defend against corporate espionage.
Moderated by Dean Hall, Chief Risk Officer of Cybraics, Former Deputy Chief Information Officer of the FBI
Sponsor / Exhibitor Technology Showcase, Business Meetings & Cocktail / Cigar Reception
* Agenda items & speakers subject to change
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.
An error has occured.
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|