Principal Security Consultant,
Bishop Fox
Upcoming Summits
Nationwide Virtual Conference
6 CPE/CEUs with full attendance
Virtual Summit
Thu, June 22, 2023
9:00AM - 4:00PM EDT
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The Second Annual Cyber Security Finance & Banking Summit is a one-of-a-kind conference designed for exclusively invited Executives in need of innovative solutions to protect their company’s critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Cloud Third-Party Threats
Cloud systems store vast amounts of sensitive business data and are another massive security liability. Interestingly, protecting these systems isn’t exactly up to the financial organizations, but rather, their service providers. What steps should financial institutions take to ensure they have found a reliable partner to protect themselves and their customers?
Security Balance – Finding Harmony Between Consumer Protection & Consumer Demand
A company’s success lies on a fine line between the convenience and flexibility expected by their digital customers & the ability to protect them within the financial service sectors risk adverse ecosystem. How does one innovate and evolve while the necessity to protect critical assets and data seems to always take the spotlight? Today we will discuss the challenges and approaches available that can help prioritize consumer experience without sacrificing the need to protect sensitive financial data.
Ransomware & Cyber Insurance
Ransomware attacks on FinTech and the need for Cyber Insurance has rapidly grown in recent years. The reason? Ransomware exploits the best vulnerability there is: human error. Today we will discuss prevention, but ending there is not enough. Companies increasingly need protection after they get hacked, both technologically and financially. Because of this, cyber insurance policies that cover ransomware have become a must-have for most businesses.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
9:00-10:00 EDT
10:00-10:35 EDT
Cybersecurity is no longer merely a bits-and-bytes discipline. It’s a board-level agenda item. A company-wide imperative. While technical skills are table stakes, today’s security leaders need to increase their emphasis on communication and collaboration. Equifax CISO Jamil Farshchi will share tried-and-true methods for partnership-driven conversations on cyber risk that are transparent, measurable, and easily comprehensible. Fortune 500 CISO and World Economic Forum contributor Ahmad Douglas will moderate.
10:35-11:05 EDT
As we get into 2023, Security teams continue to be faced with critical questions: what is the current state of the threat landscape? What are the latest malicious TTP’s and how can we prepare to defend against them?This year’s IBM Security X-Force Threat Intelligence Index (TII) Report presents an uncomfortable truth: cyberattacks are more prevalent, creative and faster than ever. 94% faster to be exact, as threat actors exponentially increase the time it takes to deploy ransomware from months to less than 4 days. The ransomware economy continues to add pressure with deployment of backdoors and ransomware attacks listed as the top 2 actions on objective from hackers, and attacks using extortion saw a sharp increase to more than a quarter of incidents observed.Join IBM Security to hear the latest insights from the newly released 2023 TII Report, surfacing findings from thousands of real-life incident response engagements, top attack types and pathways to compromise, and recommendations to implement to strengthen your security posture. Discuss concrete actions that CISOs can take with their teams to proactively address the threats shown and shift from reactive to proactive threat management.
11:05-11:25 EDT
Join Cisco Advisory CISO Wolfgang Goerlich for a practical discussion on the promises and the realities of zero trust architecture for the enterprise. Past the buzzwords and lofty promises, can zero-trust strategies help build better defenses where the rubber hits the road? In this talk, you’ll learn which types of organizations are most likely to have adopted zero-trust initiatives, how they are handling their legacy systems and assets, and what accelerates
11:25-12:00 EDT
Ransomware attacks on FinTech and the need for Cyber Insurance has rapidly grown in recent years. The reason? Ransomware exploits the best vulnerability there is: human error.
According to the 2022 ENISA Threat Landscape report, ransomware attacks were the highest they’ve ever been, with phising as the leading vector of initial access. Another report found that 55% of financial institutions were hit by ransomware within the last year, a 62% increase.
Today we will discuss prevention, but ending there is not enough. Companies increasingly need protection after they get hacked, both technologically and financially. Because of this, cyber insurance policies that cover ransomware have become a must-have for most businesses.
But what does this involve and why does it matter?
John Carlson
Vice President Cybersecurity Regulation and Resilience
American Bankers Association (ABA)
MODERATOR
Sara Otremba
Director of Product Management, Server/Workstation PAM (Privileged Access Management)
Delinea
Stephen Gyarmati
Senior Principal Field Technical Director
Cohesity
Neel Thakkar
Sales Engineer
Sonatype
Kevin O’Connor
Director of Threat Research
Adlumin
12:00-12:20 EDT
12:20-12:45 EDT
12:45-1:30 EDT
Cloud systems store vast amounts of sensitive business data and are another massive security liability. Unfamiliarity with best practices & the cloud shared security model can make these environments even more vulnerable to attack.
Interestingly, protecting these systems isn’t exactly up to the financial organizations, but rather, their service providers. While threat actors are still mainly targeting cloud infrastructure for new exploits, an emerging tactic is to target the service provider itself. Exploiting the relationship between these organizations serves only to expand the impact of their attack.
What steps should financial institutions take to ensure they have found a reliable partner to protect themselves and their customers?
David Cass
Vice President - Cyber & IT Risk
Federal Reserve Bank of New York
MODERATOR
Bob West
CSO, Prisma Cloud
Palo Alto Networks
Gus Evangelakos
Director of Sales Engineering
Orca Security
Seth Art
Principal Security Consultant
Bishop Fox
Keith Hoodlet
Principal Field Security Specialist
GitHub
Jeff Purrington
Identity Strategist
SailPoint
1:30-1:50 EDT
AI and machine learning have been brought to the fore with publicly available services such as Chat GPT. The accuracy, effectiveness, and use cases in real world applications is in its infancy. However, the use of AI within cybersecurity has been evolving over more than a decade of production deployment. Automation is also being used by cybercriminals and this talk will cover some of the ways in which automation is being used in cybersecurity to:
1:50-2:35 EDT
A company’s success lies on a fine line between the convenience and flexibility expected by their digital customers & the ability to protect them within the financial service sectors risk adverse ecosystem.
How does one innovate and evolve while the necessity to protect critical assets and data seems to always take the spotlight?
Today we will discuss the challenges and approaches available that can help prioritize consumer experience without sacrificing the need to protect sensitive financial data.
Jennifer Gold
President
New York Metro InfraGard Members Alliance, Inc.
MODERATOR
Girish Nair
Director of Sales Engineering
Cycode
David Januchowski
Senior Solution Architect
Okta
Mark Sutera
VP of Enterprise Sales
Seclore
Jack Roehrig
Technology Evangelist
Uptycs
Michael Pawlowski
Solution Engineer
Armis
Tom Dunlap
Founder & Managing Partner
DIACSUS
2:35-2:50 EDT
2:50-3:10 EDT
3:10-3:40 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |