CEO and Co-Founder,
Horizon3.ai
Upcoming Summits
Cybersecurity Summit
CPE/CEUs with full attendance
In-Person Summit
Tue, September 17, 2024
7:30AM - 5:00PM EDT
Hyatt Regency Atlanta
Regency Ballroom
265 Peachtree St. NE
Atlanta, GA, 30303
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 225
Event parking at the hotel is $25 for Valet. Mention that you are there for the Cybersecurity Summit during drop off or pick up to receive the event parking rate.
The 11th Edition of the Atlanta Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-9:00 EDT
9:00-9:35 EDT
9:35-10:05 EDT
As organizations deal with the proliferation of sensitive data, they must be cognizant of the type, classification and location of sensitive data within their environment, while automatically detecting and remediating the risk of data exposure and exfiltration. In this session, we will review a comprehensive approach to strengthening organizational data security posture, and tenets for a sound AI implementation. Ensure you know what sensitive data you are protecting and proactively manage its lifecycle to remediate the risk of data exposure as part of your zero trust journey.
10:05-10:35 EDT
On July 26, 2023, the SEC adopted rules requiring registrants to disclose their cybersecurity risk management strategy and governance, as well as the material impact of cybersecurity incidents. This reflects a larger trend globally of regulators requiring more accountability for incident readiness and response, IRR. As security leaders are increasingly under scrutiny, what proactive measures should they be considering for risk mitigation and incident preparedness? And, how are security leaders planning for incident response to ensure they are containing and eradicating the threat, recovering affected systems, and learning from the incident to improve future security posture? Join this session for new data from a survey of 500 security leaders that sheds light on what they are prioritizing for IRR today and planning for tomorrow.
10:35-11:00 EDT
11:00-11:30 EDT
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
11:30-11:50 EDT
As we step into 2024, it’s clear that Software Bill of Materials (SBOMs) are finally evolving beyond a buzzword, becoming indispensable for security and legal compliance in software development. The U.S. government and regulatory bodies around the globe have incorporated SBOMs into new cybersecurity legislation and software supply chain protections – and with good reason. Without an SBOM, companies risk being blind to known-vulnerable open source components being shipped in their software applications, and much like Equifax did in 2017, will struggle to respond to new zero day vulnerability disclosures in open source components. Join Sonatype as we explore how SBOMs can enhance resilience in the face of evolving threats, discuss best practices for effective SBOM management, and provide guidance for easily integrating SBOMs into your workflow.
11:50-12:10 EDT
Please join Daniel Pollack, Check Point Harmony Manager for the Southern US, for a discussion about current attacks seen in the marketplace in 2024. We will review the highlights of recent attacks and responses documented by Check Point Research. Know what attacks are trending to help stay prepared.
12:10-12:30 EDT
This presentation delves into three important areas of cybersecurity. First, it addresses the security concerns associated with daisy chaining identity providers, highlighting the increased attack surface, trust management issues, and complexity. Second, it explores the cybersecurity challenges inherent in the shared responsibility model, advocating for a shift towards shared accountability. Finally, it emphasizes the need for more dynamic focused oversight of third-party suppliers to ensure the effectiveness of their cybersecurity and technology controls.
12:30-1:30 EDT
1:30-2:10 EDT
What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight?
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Bradford Rand
President & Founder
Official Cyber Security Summit
MODERATOR
Chip Poole
Sr. Sales Engineer
Rubrik
Eric Wing
Technical Leader, US South
Trend Micro
Christopher Hills
Chief Security Strategist
BeyondTrust
Billy Hoffman
Field CTO
Ionix
Jeff Garrett
VP of Solutions Architecture
Opkalla
Avery Rozar
CEO / Lead Hacker
TrollEye
2:10-2:30 EDT
Join Kevin, Secureworks’ Director of Global Incident Command, as he unveils the blueprint for future-proofing cybersecurity in the face of relentless, opportunistic threat actors. In this keynote, we’ll explore the imperative for organizations to adapt, collaborate, and fortify their tech strategy against the ever-changing threat landscape. By delving into Kevin’s expertise, discover how he bridges technical expertise with practical applications, recognizing that threat actors aren’t solely targeting specific industries but are strategically exploiting vulnerabilities in diverse technologies. Gain invaluable insights to empower your cybersecurity approach, ensuring resilience
2:30-2:50 EDT
Unwanted intruders in your home are not going to take your old beat-up running shoes. Instead, they will select something of extreme value. DATA is that “something of extreme value” in our businesses. Not only is data critical to large companies with clients worldwide who are trusting them with their personal information, but data is equally important to organizations of all sectors and sizes!
Recent studies place the average chance of experiencing a data breach over the next two years at 29.6%. That means there is roughly a 1 in 3 chance of experiencing a data breach in the next 2 years. It means we can no longer plan for the worst and hope for the best. We must expect and plan for the worst and prepare to recover from it.
How? Strong defensive controls, greater visibility, and increased speed of response. This is where CYBER SECURITY and CYBER RESILIENCY come into play. Is your organization prepared to protect itself, track its threats, and respond quickly? What’s more, can your organization recover from a sophisticated, capable, adversarial attack?
If you answer “YES” to these key questions, you’re already on the good path! But is it enough? The risks associated with AI have engulfed us, and before you know it we’ll all be fighting the risks associated with Quantum Computing.
2:50-3:10 EDT
Quantifying cyber risk can be extremely difficult. Join this session delivered by Tommy Johnson, a cyber insurance and threat intelligence professional, as he examines how to better determine cyber risk and prepare for optimal coverage. Tommy will share current cyber risk assessment issues and considerations, and will explore modern methods to gain more pragmatic security posture valuation applying attack surface management data and threat intelligence.
3:10-3:30 EDT
3:30-3:45 EDT
Something’s gotta give (and it’s not you). Data loss and theft has become a major concern for organizations due to their competitive, reputational, and financial impact. The question is: how do already overextended security teams address this issue? Code42 (now part of Mimecast) Field CISO, Beth Miller, will share findings about the primary factors consuming security teams’ time and explore how they’ve tackled these challenges through automation, process improvement, and more.
3:45-4:15 EDT
4:15-5:00 EDT
The Cybersecurity Summit will be giving away an InfoSec world VIP pass during the cocktail reception to one lucky winner (a $2,400 value).
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Franki Rosenthal at Franki.Rosenthal@cyberriskalliance.com or call at (954) 560-7327.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |