Partner - Global OT Security Services Business Leader Consulting,
IBM
Upcoming Summits
Nationwide Virtual Conference
Earn CPE/CEUs with full attendance
Virtual Summit
Tue, November 28, 2023
10:00AM - 4:15PM EST
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852
The Second Annual Critical Infrastructure Cyber Security Summit is a one-of-a-kind conference designed for exclusively invited Executives in charge of the protection of our Nation’s critical infrastructure & data. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
9:30-10:00 EST
10:00-10:35 EST
The rapid integration of Artificial Intelligence (AI) technologies is reshaping the landscape of cyber threats, particularly targeting critical infrastructure. This session offers a comprehensive examination of the profound impact of AI on cyber attacks against vital infrastructure systems and the ensuing challenges and opportunities. The advent of AI-driven cyber attacks calls for an urgent reassessment of cybersecurity strategies, necessitating innovative countermeasures that leverage AI for threat detection, prevention, and response.
Artificial Intelligence, with its capacity for autonomous decision-making and adaptability, has enabled cyber attackers to innovate and orchestrate highly sophisticated and targeted assaults on critical infrastructure. AI-powered attack techniques include machine learning-based evasion, adversarial attacks, automated vulnerability exploitation, and context-aware attacks, drastically amplifying the potential damage and stealthiness of cyber assaults.
These AI-driven cyber threats pose a significant risk to critical infrastructure sectors, such as energy, healthcare, finance, transportation, and communication, impacting national security, public safety, and economic stability. As AI continues to evolve, threat actors are likely to exploit its capabilities more effectively, demanding an urgent need for advanced defensive mechanisms and cyber resilience strategies.
In response to this evolving threat landscape, proactive cybersecurity measures integrating AI and machine learning are being developed. AI-powered cybersecurity solutions offer efficient threat detection, anomaly identification, behavioral analysis, and automated incident response. Harnessing AI for cybersecurity not only empowers defenders to detect emerging threats but also enhances the overall agility and adaptability of cyber defense mechanisms.
To mitigate the impact of AI-driven cyber attacks on critical infrastructure, it is imperative to continuously advance cybersecurity practices, foster collaboration between public and private sectors, promote information sharing and threat intelligence, and invest in research and development to stay ahead of evolving threats. Incorporating AI into the cybersecurity arsenal is a fundamental step towards building a resilient defense against the dynamic and sophisticated cyber threat landscape.
10:35-11:10 EST
Step into the eye of the cybersecurity storm in a session that exposes the seismic shift in the cyber battleground brought by generative AI. You will learn how this revolutionary technology can help fortify critical infrastructure security, equipping us with cutting-edge tools for threat detection, predictive analytics, and perimeter defenses. But there’s a twist – the same AI is also arming hackers with formidable capabilities, transforming them into more dangerous digital adversaries. This session takes a deep dive into the heart of AI-driven security strategies and the shadowy world of hacker innovation. It’s a vital roadmap for those in critical infrastructure, charting a course through this tumultuous landscape. Prepare for a session that not only informs but also illustrates the high-stakes game of cyber warfare in the generative AI era.
11:10-11:30 EST
When systems fail or go offline, regardless of cause, it can result in safety issues, lost production, decreased quality, unhappy customers, and loss of reputation. Asset management solutions help businesses get the most out of their digital and physical assets and improve reliability, but what about cyber threats? They interrupt operations too. A solid cyber security program can greatly reduce the impact of attacks, so what if we could combine both of these elements? Integrating our asset management and cyber security capabilities can dramatically improve overall resilience. Join us to hear what we’ve learned and how organizations can get much more value out of the solutions they already have in place.
11:30-11:45 EST
The enemy only has to be right once, and our security teams have to right 100% of the time.
Many of the most effective, preventative solutions may require little or no new technologies but they can be difficult to implement. This reality challenges our people, our budgets, our technologies and our confidence to defend our businesses and organizations.
Hear Terry McGraw give an overview of the State of the Threat in 2023 and how being brilliant at the basics and practicing the fundamentals of security with the right people, processes and technologies can help you avoid being a victim.
11:45-12:30 EST
The United States’ critical infrastructure heavily relies on Industrial Control Systems (ICS) and advanced technologies to ensure efficient operations across various sectors. However, this dependency exposes the nation to evolving cyber threats. This session provides a concise overview of recent cyber attacks targeting ICS and technology within the United States, highlighting their impact, techniques, motivations, and potential mitigations. Understanding the nature of these cyber attacks is crucial for implementing effective cybersecurity measures to safeguard the nation’s critical infrastructure and maintain national security.
In recent years, the United States has witnessed a surge in cyber attacks on its industrial control systems and technology, posing significant risks to national security and economic stability. These attacks encompass a wide range of tactics, techniques, and procedures (TTPs) employed by sophisticated threat actors, including nation-state actors, cybercriminals, hacktivists, and insider threats.
The impact of these cyber attacks on industrial control systems has been substantial, leading to disruptions in essential services, financial losses, data breaches, and compromised operational safety. Attackers often exploit vulnerabilities in outdated or poorly secured systems, employ malware, conduct phishing campaigns, launch distributed denial of service (DDoS) attacks, and engage in ransomware attacks to compromise critical infrastructure.
Motivations behind these attacks vary, encompassing financial gain, geopolitical advantage, ideological motives, and sabotage. Nation-state actors often seek to gather intelligence, disrupt operations, or gain a strategic advantage in international conflicts. Cybercriminals, on the other hand, focus on financial gains through extortion and data theft.
To mitigate these threats, proactive measures are essential, including regular security assessments, updating and patching of systems, implementing robust access controls, enhancing employee training, employing advanced threat detection and response systems, and fostering collaboration among stakeholders.
Additionally, fostering a culture of cybersecurity awareness and investing in research and development for innovative security solutions are crucial steps towards securing the nation’s critical infrastructure against evolving cyber threats.
12:30-12:55 EST
For far too long we have had discussions about IT security OR OT security as if they were two separate things. In reality, the people, processes and technology have become more inextricably intertwined than ever before. An effective cybersecurity program must be able to evaluate the risk that both IT and OT devices pose to the essential mission functions of the environment.
12:55-1:10 EST
1:10-1:35 EST
The cost of data breaches continues to grow—topping $4.5 million on average. But what if breaches could become harmless?
1:35-2:20 EST
In recent years, critical infrastructure systems have become prime targets for malicious actors seeking financial gains through ransomware attacks. This session provides an overview of the escalating threat landscape concerning ransomware attacks on critical infrastructure, analyzing notable incidents, tactics employed by threat actors, and the implications for society.
The rise of sophisticated cyberattacks on essential services, including energy, healthcare, transportation, and finance, underscores the urgency for proactive cybersecurity measures and enhanced incident response strategies.
We are here to explore the emerging technologies and best practices in cybersecurity to fortify critical infrastructure against evolving ransomware threats, emphasizing the need for a comprehensive and collaborative approach to secure these vital systems effectively.
2:20-2:45 EST
2:45-3:40 EST
Ronald Fisher
Homeland Security Division Director
Idaho National Laboratory
Tim Klett
Senior Technology Integration Strategist
National and Homeland Security Directorate, Idaho National Laboratory
Jeremiah Stoddard
Critical Infrastructure Cyber Protection & Defense Analyst, Cybercore Integration Center
Idaho National Laboratory
3:40-4:15 EST
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |