Global Vice President of Growth,
Darktrace
Upcoming Summits
Cyber Security Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, September 28, 2023
7:30AM - 5:00PM CDT
The Westin Kansas City at Crown Center
Century Ballroom
1 East Pershing Road
Kansas City, MO 64108
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The Inaugural Kansas City Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
To become an official strategic marketing partner, contact MHutton@CyberSecuritySummit.com or call 212.655.4505 ext. 241
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
7:30-9:00 CDT
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
9:00-9:35 CDT
In this engaging presentation, we will explore the powerful intersection of artificial intelligence (AI) and video analytics in enhancing the physical security of cyber systems. With the increasing prevalence of cyber threats, it has become imperative for organizations to adopt innovative approaches to protect their physical infrastructure, which often serves as a gateway to their digital assets.
During the presentation, we will delve into best practices, compliance requirements (PCI-DSS, HIPAA, FNRA, etc.) for protecting physical assets of cyber systems, and how AI-based video analytics technologies can revolutionize physical security by providing proactive and intelligent monitoring capabilities. We will also discuss how these technologies leverage computer vision, machine learning, and deep neural networks to analyze video feeds, detect potential security incidents, and provide qualified alerts in real-time.
9:35-10:00 CDT
An often overlooked component of ‘data security’ is backup & recovery. Backup & Recovery is often an afterthought, and many companies assume that ‘if I have backups, I can recover my data.’
However, there are many factors that need to be taken into consideration in the backup architecture to ensure that the backup copies (data) is truly secure.
David’s presentation will show you common backup designs and attack vectors, tips/recommendations, and lessons learned over the years/examples of failures.
10:00-10:50 CDT
10:50-11:15 CDT
As security practitioners, we’re always trying to find ways to get ahead of attackers and mitigate threats before they wreak havoc in our environments. But, traditional defense-in-depth strategies rely more on reactive controls to build walls that we hope will stop attacks from being successful. However, time and again, we see news headlines proving how often and how easily these reactive approaches are defeated.
Today’s attack surface requires a different approach, focusing on preventative risk mitigation strategies that give more visibility, more context and a better mechanism to tie technical risk to business context. While reactive controls are still necessary, the more we can identify areas of risk before the attackers do and close the gaps in our defenses, the fewer attacks will take place and the more effective those reactive controls will be.
Preventative security strategies are driven by making better decisions about how, when and where to mitigate risks. In this talk, we’ll review techniques to implement within your security program that will give a better understanding of the technical and business risk across your attack surface, how to identify the areas to focus on first and ways to drive a more meaningful approach to mitigating risks before cyberattacks exploit your weaknesses.
11:15-11:40 CDT
Today, more than any other time in history, we are digitally connected. And, with a continuous rise in mobile related attacks, and an ever-increasing use of mobile devices to perform business tasks, protecting your organization from Mobile threats is more critical than ever. And, despite our best efforts, threats and breaches continue to increase.
Join Grant Asplund for this insightful presentation to learn about the latest mobile and user protection including Check Point’s Harmony suite for securing users and access. Today’s mobile security needs to prevent the download of malicious files to mobile devices, not just from the web and email but also collaboration tools like Teams and Slack and others. Learn out how you can achieve 99.7% efficacy against zero-day threats across your entire enterprise leveraging ThreatCloud, the best threat intelligence solution in the industry.
11:40-12:05 CDT
Generative AI is proving to increase productivity and augment humans in new ways. To seize the opportunities AI presents, organizations must first be aware of and manage its risks. That includes understanding how generative AI has changed the threat landscape and the security concerns that come with it – access control, cyber risk and compliance, data privacy, governance, and security. In this session, learn how applying Self-Learning AI across your organization’s digital environment will help your security team prevent, detect, respond, and heal from incidents, including those augmented by generative AI, through every stage of the attack lifecycle. These defensive capabilities share AI outputs with each other to strengthen autonomous insights and actions, giving your teams greater visibility, impact, and control to stay ahead of evolving threats.
12:05-1:00 CDT
1:00-1:30 CDT
“Pay Up, or Else”. The number of organizations who have been faced with this scenario has been steadily increasing over the past several years as ransomware attacks continue to rise — both in numbers and the size of payouts.
The clear and present danger of a ransomware attack looms large among cyber executives and business leaders as the number of vulnerabilities increases daily. According to a 2022 CRA Business Intelligence survey, nearly one in four respondents reported that their organization experienced one or more ransomware attacks in the past 12 months, and almost one out of three of these organizations said the attacker succeeded in gaining access to their systems, encrypting files, and demanding a ransom
According to this survey, many believe that the worst is yet to come and that they are at a significantly higher risk of a cyberattack than ever before – it’s not a matter of “if,” but “when.”
Preparing for the inevitable and defending against the threat of a ransomware attack requires constant evaluation and assessment, and then making the necessary adjustments.
On this panel, our lineup of industry experts will discuss the key security measures enterprises must take, going beyond backup and recovery and anti-malware/anti-virus solutions to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption, and cloud security software.
1:30-1:55 CDT
Modern networks are increasingly complex spanning many edges due to a mix of cloud and on-premises infrastructures in support of a digital transformation and hybrid workforces, with that comes requirements for more granular control through visibility and consistent security policy no matter where a user or resource is located.
Fortinet was founded with the mission “Security everywhere you need it” and provides a consolidated converged networking and security platform that empowers organizations to adopt and integrate new technologies while ensuring a consistent user experience and security posture.
Join Fortinet’s Director of Engineering, Mark Cole as he takes you through the journey of networking and security convergence and see how a consolidated platform approach leveraging best in class products praised by the industry and analysts gains you better visibility, performance and piece of mind. Walk through trends and challenges from last mile availability to phasing out VPN for private access while implementing flexible controls that apply no matter the context or where the user or application is located. Finally, we will discuss the emerging single vendor SASE quadrant and chat about it’s networking and cloud delivered security services.
1:55-2:20 CDT
The August 2023 SANS DevSecOps Survey shows that latest automated tools — such as CNAPP, CSPM, and CWPP — by themselves are not enough to succeed with DevSecOps. The survey reported that automated application testing grew by 52% between 2022 and 2023, yet organizations reported that tools like these were seen as less useful than in 2022. How is that possible? Great DevSecOps requires a foundation of solid testing data plus good communications and consistent processes. Join Seemplicity as we share our insights from the SANS survey and talk about a foundation for successful DevSecOps and Remediation Operations.
2:20-2:45 CDT
During the past 10 years I’ve participated in many security incidents, received confidential readouts of other company incidents, collaborated with top well-known incident response firms as well as government agencies. It’s with these experiences and learnings I’ve applied an overlay of Zero Trust to the problem. Having also delivered Zero Trust strategies at two globally-recognized enterprises we can speak to the reality of the problem and solution.
In 2022 I presented how my Enterprise Security teams delivered Zero Trust at Adobe and Cisco. So, let’s talk about why we prioritized the initiative; a forward thinking strategy that really defended against the attacks we were seeing. During this session we’ll discuss some high-profile security incidents from the past year, reviewing the themes, kill chain, and how or where a Zero Trust strategy might help prevent the attack, slow them down, or reduce risk.
As an example, many high profile hacks all started similarly. Related to an employee or contractor credential theft (or purchase) and an MFA fatigue or bypass. These are NOT highly sophisticated attacks and there are strategies that can save your bacon.
2:45-3:25 CDT
3:25-4:10 CDT
Use of the cloud is continuously growing, not surprisingly so due to its perceived lower costs, greater agility, and ability to increase computing power with increased demand & continuously deploy new applications and software features.
Despite the appeal of cloud, there are many security risks and vulnerabilities and managing these risks has proven to be a big challenge as cyber criminals shift their tactics to cloud data and systems in responses to this increased use of the cloud. According to a CRA Business Intelligence’s September 2022 Cloud Security Survey, misconfigurations, lack of oversight, and little visibility across the organization are among their chief concerns regarding cloud deployments.
If organizations are going to successfully adopt/transition to the cloud, they must ensure security is part of their program. An effective cloud security program includes various process and technology capabilities to effectively keep up with the current threat landscape and vulnerabilities.
Garrett Fleishman
Training Channel Business Development Senior Manager
CompTIA
MODERATOR
Wanda Miles
Senior Security & Compliance Program Manager
Exabeam
Aaron McAllister
SASE Solutions Architect
Cloudflare
Ryan Hollis
Cloud & Container Security Engineer
Orca Security
Brian Buquoi
Manager, Solutions Architecture
Prisma Cloud
Tom Bowyer
Manager, Product Security
Automox
4:10-4:40 CDT
4:40-5:00 CDT
To be eligible to earn your Full CPE Credits, delegates must be in attendance for the full day. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Thank you for registering for the Cyber Security Summit. Our networking breakfast will start promptly at 7:30 AM. To receive your full CEU / CPE credits, you must attend for the entire day. We look forward to seeing you soon!
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |