Chrome Enterprise Browser Specialist,
Chrome
Upcoming Summits
Cyber Security Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Fri, November 17, 2023
7:30AM - 6:30PM EST
Sheraton New York Times Square Hotel
Metropolitan Ballroom
811 7th Avenue, W 53rd Street,
New York, NY 10019
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852
The 12th Edition of the New York Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
7:30-8:00 EST
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:00-8:30 EST
8:30-9:15 EST
Generative AI is proving to increase productivity and augment humans in new ways. To seize these opportunities, organizations must be aware of and manage its risks. That includes understanding how generative AI has changed the threat landscape and the security concerns that come with it. In this session, learn about the different AI approaches within the cyber security domain, discuss the benefits and limitations, and how to mitigate some of the risks. Also, learn how applying Self-Learning AI across your organization’s digital environment will help your security team prevent, detect, respond, and heal from incidents, including those augmented by generative AI.
9:15-9:50 EST
As we near the end of the year, join Cris Thomas, X-Force Global Lead of Policy and Special Initiatives, as he delivers the Cyber State of the Union, where he will discuss this year’s most prominent threats, who they’ve targeted, how much it’s costing various industries and geographies, and what we can expect from emerging threats on the horizon.
9:50-10:15 EST
10:15-10:35 EST
10:35-11:20 EST
Despite having distinct differences, data privacy and compliance are deeply intertwined with cyber security. As focus on data privacy and compliance increases, business leaders can expect to see vast changes related to how consumer data is managed, shared, and secured. Policy & laws on data privacy and compliance continue to expand and become increasingly stringent, so it is important for companies and their respective business leaders to consider these areas as they develop & evaluate their cyber security strategies. For instance, last year the SEC proposed amendments to its rules on cyber security, risk management, strategy, governance, and incident disclosure by public companies.
At a more granular level, there are various initiatives to protect specific consumer data and ensure enterprises are compliant in doing so – particularly health data and children’s personal information. The American Data Privacy and Protection Act (ADPPA) if passed could greatly impact health data beyond the scope of HIPAA by establishing a national framework to protect & preserve the privacy of consumer data collected by entities not covered by HIPAA. In an American Medical Association survey, about 75% of surveyed patients expressed concern and confusion related to the privacy of their health data and how it is handled. The ADPPA could help clear up some of this confusion by establishing clear expectations. Another critical area is the collection of personal information of children. The Children’s Online Privacy Protection Act (COPPA) helps put parents in control of how their children’s data is handled and ensures that all entities in possession of this data sustain its confidentiality, security, and integrity.
Maintaining strong data privacy and compliance practices is imperative in preventing sensitive personal data from becoming compromised. This information is extremely valuable to cyber criminals, who seek to utilize compromised data to steal others’ identities or resell such PII.
This panel will look at the latest data privacy policies and implications for what this means for business leaders in the future. Our lineup of experts will lend their insights and offer best practices relating to privacy, compliance, and identity protection.
Deidre Diamond
Founder
Secure Diversity
MODERATOR
Matthew Radolec
Senior Director, Incident Response & Cloud Operations
Varonis System, Inc.
Maurice Côté
VP Products
Devolutions
Ronald Stamboly
Senior Sales Engineer
Thales, Cloud Protection & Licensing
Gina Sledd
Solutions Engineer
Cloudflare
William Malik
VP, Infrastructure Strategies
Trend Micro
Anirban Banerjee
CEO and Co-founder
Riscosity
Justin Endres
Chief Revenue Officer
Seclore
11:20-11:45 EST
11:45-12:10 EST
Organizations process and store huge volumes of sensitive information. Inadequate controls in IAM processes and technology can lead to breach, involuntary exposure of data, and non-compliance issues.
Join us as we demonstrate a proven Zero-Trust driven assessment, architecture and executable roadmap process that answers the most common questions about CyberSolve implementations: How do we determine what we COULD do vs. what we SHOULD do? What’s this going to cost us? How do we maintain our IAM once it is implemented? What is different when addressing Workforce IAM vs Customer IAM (CIAM)?
12:10-12:35 EST
Organizations embrace modern-day applications and services to enhance its technical capabilities with the goals of becoming more agile and more efficient. This journey towards modernization is commonly referred to as Digital Transformation and is frequently propelled by broader organizational business objectives. However, as with any beneficial change, there come associated risks and rewards. This presentation will delve into the intersection of Digital Transformation and Security Operations, shedding light on the blind spots and inefficiencies that can emerge. You will also gain insights into various tools and techniques to equip your security team for effectively countering well-prepared threat actors.
12:35-12:45 EST
Join Teneo as we take you on a humorous journey through the world of IT security, all wrapped up in the spirit of a Thanksgiving dinner. We’ll count down the top essentials of a secure IT network using Teneo’s StreamlineX components, all related to the familiar elements of hosting a Thanksgiving dinner. So, grab your seat at the table and let’s savor the delectable blend of technology and turkey!
12:35-1:10 EST
1:10-1:55 EST
“Pay Up, or Else”. The number of organizations who have been faced with this scenario has been steadily increasing over the past several years as ransomware attacks continue to rise — both in numbers and the size of payouts.
The clear and present danger of a ransomware attack looms large among cyber executives and business leaders as the number of vulnerabilities increases daily. According to a 2022 CRA Business Intelligence survey, nearly one in four respondents reported that their organization experienced one or more ransomware attacks in the past 12 months, and almost one out of three of these organizations said the attacker succeeded in gaining access to their systems, encrypting files, and demanding a ransom
According to this survey, many believe that the worst is yet to come and that they are at a significantly higher risk of a cyberattack than ever before – it’s not a matter of “if,” but “when.”
Preparing for the inevitable and defending against the threat of a ransomware attack requires constant evaluation and assessment, and then making the necessary adjustments.
On this panel, our lineup of industry experts will discuss the key security measures enterprises must take, going beyond backup and recovery and anti-malware/anti-virus solutions to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption, and cloud security software.
Jennifer Gold
President
New York Metro InfraGard Members Alliance, Inc.
MODERATOR
Mark Hamel
Principal Sales Engineer
BlackBerry
David Parsin
Cyber Security Expert
Bitdefender
Gurdeep Singh
Strategic Sales Engineer
Deep Instinct
Paul Reid
Global Head of Threat Intelligence | Team Helios
OpenText
Snehal Contractor
Vice President Worldwide Systems Engineering & Technical Services
Stellar Cyber
John Gunn
CEO & Next-Generation MFA Evangelist
Token
1:55-2:20 EST
Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations.
With this evolving infrastructure also come growing security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired outcomes while effectively managing risks and minimizing complexities, organizations should look to adopt a cybersecurity platform-based approach that provides visibility across their environment and a means to manage both security and network operations easily.
The Fortinet Security Fabric solves these challenges with broad, integrated, and automated solutions that enable security-driven networking, zero-trust network access, dynamic cloud security, and artificial intelligence (AI)-driven security operations. Fortinet offerings are enhanced with an ecosystem of seamless integrated third-party products that minimize the gaps in enterprise security architectures, while maximizing security return on investment (ROI).
2:20-2:45 EST
In today’s cybersecurity landscape, nothing is constant except change. 2023 has been no exception. During the Top Cyberattack Trends of 2023, we will explore six of the cyber risks that are trending now, with real-life examples.
Join Mike DePalma, Vice President of Business Development at Datto, a Kaseya Company, as he takes a deep dive into this year’s worst attacks and how to mount a defense that keeps businesses out of trouble.
2:45-3:10 EST
With modern applications consisting of about 90% open source software, bad actors are increasing their efforts to exploit weaknesses in packages developers use. This means that software supply chain management and governance has never been more important. Join us as we explore current risks to the software supply chain as well as processes to help address these vulnerabilities in our applications.
3:10-3:25 EST
3:25-4:10 EST
Use of the cloud is continuously growing, not surprisingly so due to its perceived lower costs, greater agility, and ability to increase computing power with increased demand & continuously deploy new applications and software features.
Despite the appeal of cloud, there are many security risks and vulnerabilities and managing these risks has proven to be a big challenge as cyber criminals shift their tactics to cloud data and systems in responses to this increased use of the cloud. According to a CRA Business Intelligence’s September 2022 Cloud Security Survey, misconfigurations, lack of oversight, and little visibility across the organization are among their chief concerns regarding cloud deployments.
If organizations are going to successfully adopt/transition to the cloud, they must ensure security is part of their program. An effective cloud security program includes various process and technology capabilities to effectively keep up with the current threat landscape and vulnerabilities.
Eric Pinnell
Senior Cybersecurity Engineer
Center for Internet Security (CIS)
MODERATOR
Eric Magnus
Director of Solutions Engineering
Sysdig
Bob West
CSO, Prisma Cloud
Palo Alto Networks
Andrew McCoy
Field Security Specialist
GitHub
Tomas Smalakys
CTO, NordPass
NordSecurity
Tim Woods
VP Technology Alliances
FireMon
David Leitzel
Sr. Cloud Solution Architect
Uptycs
4:10-4:35 EST
In this talk we’ll cover real life examples of how attackers are finding your assets, and how you can stay a step ahead.
4:35-5:00 EST
The frequency of cyberattacks targeting businesses is increasing – and will continue to increase. Today, when attackers don’t work alone but rather in enterprises with institutional hierarchies and R&D budgets, it’s important to rethink the use of passwords.
Employees are the weakest link of an organization’s security chain. Even those in industries such as finance, healthcare, and IT, which are typically regarded as secure, have questionable password habits.
Going passwordless might be just the answer to all of the downfalls of passwords. Big tech companies, like Google and Apple, are already endorsing and supporting passkeys, a change that will soon make passwords a thing of the past and provide more online security.
5:00-5:25 EST
During the past 10 years I’ve participated in many security incidents, received confidential readouts of other company incidents, collaborated with top well-known incident response firms as well as government agencies. It’s with these experiences and learnings I’ve applied an overlay of Zero Trust to the problem. Having also delivered Zero Trust strategies at two globally-recognized enterprises we can speak to the reality of the problem and solution.
In 2022 I presented how my Enterprise Security teams delivered Zero Trust at Adobe and Cisco. So, let’s talk about why we prioritized the initiative; a forward thinking strategy that really defended against the attacks we were seeing. During this session we’ll discuss some high-profile security incidents from the past year, reviewing the themes, kill chain, and how or where a Zero Trust strategy might help prevent the attack, slow them down, or reduce risk.
As an example, many high profile hacks all started similarly. Related to an employee or contractor credential theft (or purchase) and an MFA fatigue or bypass. These are NOT highly sophisticated attacks and there are strategies that can save your bacon.
5:25-5:40 EST
5:40-6:00 EST
6:00-6:30 EST
6:30-7:00 EST
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance for the full day. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Thank you for registering for the Cyber Security Summit. Our networking breakfast will start promptly at 7:30 AM. To receive your full CEU / CPE credits, you must attend for the entire day. We look forward to seeing you soon!
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |