Growth Technologies Evangelist,
Check Point Software Technologies
Upcoming Summits
For Executives in the DC Metro
Wednesday,
July 21, 2021
8:00AM - 6:00PM EDT
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
If you run into any issues registering, please try using a different browser.
The Eighth Annual DC Metro Cyber Security Summit goes virtual as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is just $95 giving you access to all Keynote Discussions, Interactive Panels and Product Demonstrations.
With full day attendance, you will earn 8 CPE/CEU Credits!
Insider Threats
Identifying & avoiding breaches and how remote work has impacted Insider Threats in today’s remote workforce age
The Future of Cloud Security
Best practices to mitigate cloud security threats and ways to minimize common misconfiguration errors
Ransomware on the Rise
Utilizing zero trust to avoid becoming a hostage to cyber criminals and what to do if you fall victim to an attack
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 3 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
QUESTIONS
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
8:00-8:30
Adam Hickey
Deputy Assistant Attorney General for the National Security Division
U.S. Department of Justice
8:30-9:15
For 14 years, Verizon’s annual Data Breach Investigations Report (DBIR) has set the standard for deconstructing and explaining precisely how cybercriminals attack, and the 2021 DBIR is now available – featuring a detailed breakdown of tens of thousands of security incidents and thousands of breaches worldwide. This webinar will look at the key findings from the 2021 DBIR and examine the critical security controls needed to fight the most common and pervasive types of cyberattacks in nearly 20 industries. Learn how to use the DBIR data to influence and optimize your security program.
9:15-9:50
Grant Asplund
Chief Cyber Security Evangelist
Check Point Software Technologies
Security practitioners understand the need to implement new controls that help their organizations’ defend against the rising number of attacks and Fifth Generation threats like the SolarWinds Orion supply chain hack. But slowed economic growth and the push to secure systems from sophisticated new threats challenges many companies.
These global market conditions underscore the importance of employing a consolidation strategy with a unified security architecture at its center that protects cloud, networks, endpoints, and mobile devices.
Join Grant Asplund, Chief Security Evangelist for Check Point Software Technologies, as he shares the building blocks for putting in place a consolidation strategy that:
• Increases security efficiency with a unified security architecture
• Improves your organization’s overall threat prevention profile
• Eliminates complexity caused by managing disparate systems
• Reduces total cost of ownership
9:50-10:15
Marcus Fowler
Director of Strategic Threat
Darktrace
Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify. As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats – wherever they strike.
In this session, discover:
10:15-10:40
Jeff Costlow
CISO
ExtraHop
The SolarWinds SUNBURST attack was a rude awakening for many security teams, and it won’t be the last time Security leaders face tough questions about how an adversary evaded defenses and stayed hidden. With threats persisting inside the network for months, security teams need a new plan. In this session, CISO Jeff Costlow discusses strategies, including revising existing mental models and incident response processes, to build resilience in the fight against advanced threats.
10:40-11:30
Kathleen Moriarty
Chief Technology Officer
Center for Internet Security
MODERATOR
Anya Vysotskaya
Sr. Analyst II
Flashpoint
Brandon Traffanstedt
Sr. Director of Identity Security Solutions
CyberArk
Andy Stone
CTO - Americas
Pure Storage
Jeff Phelan
Public Sector CTO
Rubrik
Jim Shook
Director, Cybersecurity & Compliance Practice
Dell Technologies
In 2020, there was an unprecedented growth in ransomware attacks and this trend shows no signs of slowing down. Rather, these attacks are evolving and becoming more harmful as cyber criminals become more organized and effective. It is predicted that in 2021, businesses will fall victim to a ransomware attack every 11 seconds with an estimated cost of over $20 billion – 57 times more than in 2015, making ransomware the fastest growing type of cybercrime.
As a result, companies are transitioning from the traditional “trust but verify” method and implementing a Zero Trust model, requiring all users to be authenticated and continually authorized in order to be granted access and maintain access to company data and applications. By leveraging various technologies & techniques such as multifactor authentication, IAM, least privilege access, and microsegmentation, the Zero Trust model reduces the risk of a ransomware attack and minimizes the potential damage from a breach.
This panel will highlight where enterprises are most vulnerable to becoming a victim of ransomware and how utilizing a Zero Trust model minimizes this risk. Industry experts will discuss best practices to avoid a ransomware attack including adapting the Zero Trust model, what to do if your company is being held for ransom, ways to mitigate the damage caused by an attack, and how to recover afterwards.
11:30-11:55
George Avetisov
CEO & Cofounder
HYPR
With the Passwordless Decade well underway, more and more organizations are asking the question: Why is now the right time to move beyond passwords?
George Avetisov, CEO of HYPR, will discuss the rise of organizations moving to the cloud, how the perimeter fades and the attack surface gets larger. Modern tools such as SNIPR and Modlishka make it easier for hackers to launch large-scale automated attacks, bringing credential re-use and two-factor-authentication attacks to record highs.
How did we get here, and will mainstream adoption of passwordless security have an impact? We will explore how the rise of virtual desktop infrastructure and a remote workforce has affected workstation login and review how the evolution of authentication has impacted organizations’ identity and access management systems.
In this session, you’ll learn:
11:55-12:20
Kevin Sheu
Senior VP of Marketing
Bitglass
Secure access service edge has quickly emerged as a hot topic in cybersecurity, but what exactly does it mean and why should organizations care? As cloud migration, BYOD adoption, and remote work have skyrocketed in prevalence, it has become increasingly apparent that organizations need to think differently about security. While legacy tools like firewalls are no longer equipped to handle the modern IT ecosystem, SASE platforms like Bitglass are built for this exact moment. In this presentation, you will learn:
12:20-12:45
Paul Martini
CEO, Co-Founder & Chief Architect
iboss
Secured Access Service Edge, or SASE, is no longer a buzzword tossed around by cybersecurity pundits but is a robust, cloud-based service model to enable secure anywhere, anytime access from any device.
In the Are you SASE Ready? 5 Steps for Building Your SASE Roadmap webcast, you will learn how to build a roadmap to move to SASE and the benefits such a move will offer.
The session will cover how SASE will provide your organization with a path to reducing network and security cost and complexity while increasing security and connectivity to give your users a better experience, regardless of location.
In this session, Paul Martini, CEO, CTO & Co-founder at iboss, will discuss:
An understanding of the main drivers that lead organizations to migrate to SASE cloud;
5 steps to help you understand how to future-proof your network security investments;
What to consider when choosing a SASE platform.
12:45-1:10
Mark Guntrip
Sr. Director, Cybersecurity Strategy
Menlo Security
1:10-1:35
Track A1:10-1:35
Track B1:35-2:00
Track AAttackers must maneuver through a series of devices on your network to be successful. Your goal as a defender is to be able to observe those maneuvers and deploy defensive actions fast enough to prevent major consequences. This talk will propose a simplification of modern security architecture that will dramatically improve organizations’ ability to investigate at speed, and thus keep up with adversaries.
1:35-2:00
Track B2:00-2:30
As organizations continue to grow, especially through acquisition, the adoption of tools to automate processes to augment workers has become increasingly popular. In an effort to increase the operational efficiency that tools such as Robotic Process Automation provide, the security element is oftentimes forgotten. Join One Identity’s Larry Chinski to discuss threats that digital coworkers pose in an organizations, and how to mitigate them.
2:30-3:15
Lynn Dohm
Executive Director
WiCyS
MODERATOR
Baseer Balazadeh
Sr. Technical Marketing Engineer
Gigamon
Gavin Reid
Chief Information Security Officer
Recorded Future
Raymond Kirk
Technical Product Manager
Tripwire
Tyler Shields
Chief Marketing Officer
JupiterOne
Peter Blanks
Chief Product Officer
Synack
Over the past few years, the number of organizations that have adopted cloud-based systems has grown exponentially, largely due to the COVID-19 pandemic. In turn, cloud security has become a critical issue for IT security executives and their teams. McAffee reported an increase of 630% in attacks by external actors targeting cloud services between January and April of 2020. This uptick in cloud security breaches is projected to persist even after the pandemic as many companies continue to utilize the cloud and leverage its benefits.
While migrating to the cloud offers numerous advantages, it also poses certain threats and challenges. In a recent report by Oracle & KPMG, over 90% of IT Professionals felt their organization had a cloud security readiness gap. A significant concern for many who are adapting to a cloud-based workforce is misconfigurations and gaps in cloud security programs. Additionally, cloud-based infrastructure requires adopting new security policies and processes. Many companies believe their existing security teams lack the necessary skillsets and knowledge that the cloud environment requires, especially as organizations turn to multi-cloud, hybrid cloud, and distributed cloud models.
This panel will highlight the areas where cloud systems can leave enterprises vulnerable, ways to minimize common misconfiguration errors, and other best practices to mitigate threats when migrating to the cloud. Our lineup of Industry Experts will provide their expertise on developing a robust cloud security strategy that addresses these issues and insight on how to stay secure in the future of cloud security.
3:15-3:40
Ian Pratt
Global Head of Security for Personal Systems
HP Inc.
Users can be induced to click on malicious content through fear, curiosity or trust. The malware they invite onto their devices routinely evades detection by even the most sophisticated security products, making breaches inevitable. It is time for a different approach to endpoint security, applying the sound engineering principles of least privilege and strong isolation enabled by modern CPUs – protection that doesn’t rely on detection.
3:40-4:05
It is important to recognize that, overall, the industry has an effectiveness problem. The escalation in threat activity and the talents shortage in the industry has created a situation where, despite lots of products and cybersecurity spend, we aren’t getting better protection. To put a finer point on it, there are over 3,000 vendors selling products in the industry. The total spend last year was $120B+ and even with all of that there we almost 4,000 breaches — a 96% increase over the previous year. The key takeaway from these breaches is that they are NOT product failures. They are operational failures. To prevent these kinds of breaches from happening again in the future, we believe, the industry needs to adopt a new approach – an operational approach – to cybersecurity.
4:05-4:30
Michael Kaczmarek
VP Product Management, Security Solutions
Neustar
When you hear “ransom attack” you probably think of ransomware – the malware that can encrypt or block files or entire systems until you pay the attacker to restore access. But there’s been a massive surge in a virulent new type of ransom attack. And the defenses you’ve established to fight ransomware won’t help defeat this new threat, because it doesn’t require malware. Instead, the extortionists simply threaten to shut down your network with a massive Distributed Denial of Service (DDoS) attack at a specified day and time – unless you pay.
Attend this session to learn:
4:30-4:55
In this two-part session, cyber veteran Ben Denkers, EVP at Redspin will discuss the new Cybersecurity Maturity Model Certification (CMMC) as the emerging gold standard for security and how this framework validates the effectiveness of your risk management program, ensuring you have an approach that responds every day. In part two, CMMC expert, Tony Buenger a CMMC Provisional Assessor at Redspin, will share high-level lessons learned from Redspin’s CMMC assessment. Redspin was the first organization to pass the CMMC Level 3 assessment and is now an Authorized CMMC Third-Party Assessment Organization (C3PAO).
4:55-5:10
Robert DeVito
Global Director, Customer & Partner Sales Engineering
Google
With the dramatic increase in distributed workforces and the growing adoption of cloud applications, companies face unprecedented levels of IP, data, and identity sprawl beyond the enterprise firewall. Every endpoint is an entry into your business, cybercriminals have more ways to break in than ever before, and human error on the inside is a constant risk. Historically, endpoint security has been a zero-sum game—with the odds inevitably stacked against IT. But rather than protect devices, what if you could just control the security of them?
In this presentation, see how Chrome OS and Chrome Browser are secure by design—embedding security into every workflow to provide proactive protection for users, devices, applications, and data, wherever work happens. This is cloud-first security control in the hands of the modern businesses that will thrive moving forward.
5:10-5:25
Katie Paxton-Fear
Application Security Engineer
Bugcrowd
Often we hear about ransomware targeted at organisations who are specifically targeted by gangs to make a profit, pipelines or organisations at the top of the supply chain. However, ransomware is a threat that all businesses face, even SMEs, and often these organisations struggle the most in protecting, responding and recovering from ransomware incidents. This is a true story from my first week at my first job after finishing my degree, and how we got hit by ransomware and the difficult decisions some of the most junior members of staff had to make. While we had backups, how do you make the case to shut down the entire business for a day while they are running over just paying the ransom? Overall, it’s the story of how our security culture failed and how we could have prevented the attack in the first place by following some simple pieces of advice and how other SMEs can do the same.
5:25-5:55
Quinn Carman
Chief
The NSA, Red Team
Prior to defending an organization against a determined attacker, their techniques must be understood. This presentation provides an adversarial viewpoint to inform network defense leaders how the attackers see their organizations and are able to be successful with their objectives, even when well defended. The presenter will draw upon over 17 years of personal experience as a Red Team operator and leader to illustrate how your organizations are viewed, through the eyes of an adversary.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |