CEO,
Vicar Group, LLC
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
Virtual Summit
Fri, April 26, 2024
9:00AM - 3:25PM EDT
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 225
The Finance & Risk Cybersecurity Summit is a one-of-a-kind conference designed for exclusively invited Executives in need of innovative solutions to protect their company’s critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Supply Chain Attacks
Supply chain attacks make it possible for cyber attackers to circumvent security controls by creating avenues to sensitive resources through a target’s third-party vendor.
Ransomware
Ransomware and Ransomware-as-a-Servce is a critical cyber risk to financial services. During a ransomware attack, cybercriminals lock victims out of their computers by encrypting them with malware. The damage is only reversed if a ransom is paid.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
9:00-10:00 EDT
10:00-10:30 EDT
10:30-11:05 EDT
Join us for a fast-paced session tailored to cybersecurity professionals that explores the critical importance of identity security amidst the tumultuous landscape of mega-breaches and generative AI. We will review the alarming surge in data breaches and ransomware attacks, which now pose unprecedented risks and costs. We will unveil the sinister potential of generative AI in the hands of cybercriminals, empowering them to craft more devastating attacks on organizations worldwide. Gain valuable insights and strategies from expert practitioners on how to fortify defenses and protect digital identities against evolving threats. This informative session will help you stay ahead in the relentless battle against cybercriminals.
11:05-11:50 EDT
11:50-12:10 EDT
Over the past several years, SaaS and GenAI tools like Slack, Teams, Google Drive, OneDrive and ChatGPT have transformed how we work, enhancing collaboration and productivity. However, this shift has also brought complex security risks, especially when handling sensitive data in regulated industries, like Financial Services.
If you’re interested in learning about how to protect your business from data security threats in SaaS and GenAI tools, join Richard Vibert, CEO of Metomic, to learn more about:
– Real-life examples of data breaches and the threats financial institutions face on a daily basis.
– The security risks that come from using SaaS and GenAI applications.
– Practical tips for improving data security in your organisation.
12:10-12:40 EDT
12:40-1:05 EDT
1:05-1:25 EDT
As organizations increase their reliance on third parties, CISOs become responsible for securing an exponentially expanding digital footprint. As this web of interconnectivity and outsourced services grows, new attack vectors are introduced. That is particularly true for software vendors who rely on third party and open source components which are increasingly exploited by malicious actors. During this session, we will outline key actions that enterprises can take to gain visibility and control over commercial software and the supply chains they rely on to operate their business.
1:25-1:40 EDT
Protect your applications & network infrastructure, IoT devices, and preparing for DDos attacks.
1:40-2:00 EDT
2:00-2:15 EDT
2:15-2:40 EDT
The cost of data breaches continues to grow—topping $4.5 million on average. But what if breaches could become harmless?
2:40-3:00 EDT
3:00-3:25 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |