Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
With machines fighting machines and increasingly sophisticated human attackers, we are now entering a new era of cyber-threats. The battle is no longer at the perimeter but inside of our organizations, and no security team can keep up with its speed. Cyber-attackers are quickly becoming silent and stealthy, and cyber defense has turned into an arms race.
This new wave of cyber-threats has seen skilled attackers that may lie low for weeks or months. By the time they take definitive steps, their actions blend in with the everyday hum of network activity. These attacks call for a change in the way we protect our most critical assets.
Self-learning and self-defending systems are now being deployed to continually assess business environments. Known as ‘immune system’ defense, this approach is used to uncover threats that have already penetrated the network border, and then automatically fight back. Unlike legacy approaches, which rely on rules or signatures, these technologies work autonomously, enable the security team to focus on high-value tasks, and can counter even fast-moving, automated attackers.
In this session, learn about:
Over two years after the Snowden leak, organizations are still struggling to reconcile the need for competitive, information-sharing cultures with security requirements. Insider threat is a major challenge because our organizations are full of them – and these people do not need to have malicious intent to do lasting damage.
The reality is that you cannot trust every insider to make the right decision 100% of the time. As networks get bigger and more unpredictable, spotting the needle in a growing haystack gets harder. Genuine innovations in science and technology are changing the security paradigm however. Today, immune system technology is quickly becoming the de facto insider threat defense technology, deployed over 3,000 installations globally.Presented by Justin Fier, Director of Cyber Intelligence and Analytics, Darktrace Seating is Limited. Please RSVP to Roundtable1@CyberSummitUSA.com
DDoS attacks continue to increase in size, frequency and complexity. What’s more, the weaponization of IoT based botnets is upon us (e.g. Mirai, LizardStresser) which are being used to launch DDoS attacks against all types of organizations around the world. So, is now the time to reassess your risk of DDoS attacks? In this session, industry leader Arbor Networks will discuss the latest trends in DDoS attacks, best practices in defense and how to use FAIR – Factor Analysis of Information Risk (FAIR,; to conduct a quantitative DDoS attack risk analysis.Presented by Tom Bienkowski, Director Product Marketing, Arbor Networks Seating is Limited. Please RSVP to Roundtable2@CyberSummitUSA.com
All auditors want one thing: Compliance. And the list of requirements isn’t a short one–it can include operational/security policies, regulatory mandates, industry standards, software patches, software license agreements and more. Adding to the complexity is the push for greater compliance–especially for security and patching–at a lower run rate on a mounting population of Windows, Mac and *nix endpoints. This is particularly true given the recent and highly damaging WannaCry and Petya attacks, which preyed on unpatched or non-compliant endpoints. This panel will discuss the challenges of meeting security compliance issues and key imperatives of keeping enterprises and their endpoints continuously patched, secure and compliant in today’s volatile world. We’ll also share tips on how to identify threats that are most relevant to your organization, and how to remediate them faster.Moderated by Dave Mahon, VP & CSO, CenturyLink
Presented By Dave Mahon, VP & CSO, CenturyLinkSeating is Limited. Please RSVP to Roundtable3@CyberSummitUSA.com
Artificial Intelligence is one of the most talked about technologies of today. With threats evolving faster than humans can prevent it, the time for a more advanced solution has arrived. Artificial Intelligence has taken the cyber security industry by storm and due to its ambiguous nature, it’s utilization has skewed from the simplest applications to extremely complex approaches.
Join Rich Heimann, Cybraics Chief Data Scientist, as we explore what role artificial intelligence plays in cybersecurity and how to truly measure A.I. within your security platform.
In this session you will learn about how if used properly, A.I. can:
As 2016 drew to a close, a year in which cybercriminals seemingly remained a few steps ahead, one might have noticed an increase of cyber crime in areas ranging from national defense, politics, & global economic systems to smart homes and personal devices. With a growing reliance and utilization of consumer & commercial data, social media, autonomous cars, smart city infrastructure and an exponentially increasing market of IoT devices, how can we best prepare and defend against the next-generation of cyber attacks?Moderated by David Cass, CISO, IBM
The most prodigious threat to the security and safety of the U.S. Enterprise is no longer the hacker attacking from beyond network walls, but the unruly employee already within them. According to recent market research, it is now estimated that “Insiders” conduct more than 50% of cyber attacks. What happens when a fast riser or even an uninspired employee decides to go to a competitor or launch his or her own endeavor? What data, clients or personal information is capable of being exfiltrated on their way out? This panel will focus on the identifiers and triggers that often go undetected and discuss ways to best defend against corporate espionage.Moderated by Lieutenant Colonel Ernest Y. Wong, Chief of Staff at the Army Cyber Institute, U.S. Army
Technology Showcase, Business Meetings & Cocktail / Cigar Reception
* Agenda items & speakers subject to change
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|