Assist. to the Special Agent in Charge, Electronic Crimes Task Force,
US Secret Service, Denver Field Office
Upcoming Summits
The third annual Denver Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Tuesday, April 2
7:45AM – 6:00PM
1701 California Street
Denver CO 80202
Insider Threat
What the CISO and Every IT Security Management Team Must Face & Govern 24/7
Cloud INsecurity
Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them
Incident Response
What to do Before, During and After a Breach
Learn
Learn from renowned security experts from around the globe on how to protect your business from cyber attacks during interactive Panels & Round Table discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
5All Inclusive
During the summit, all of your meals, refreshments and snacks are included. We provide a catered breakfast, lunch & cocktail reception for all of the attending delegates for one low price. You may also indulge in complimentary cigars at the conclusion of each event.
CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 CPE Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
7Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
8Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment set within a luxury venue.
9Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
10Cyber Crime
Cyber Crime is the fastest growing threat to businesses globally. Secure your critical infrastructure before it’s too late!
QUESTIONS
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
VOLUNTEERING
Interested in volunteering at the Cyber Security Summit? Please email Lindsay Wess at LWess@CyberSummitUSA.com
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:45-8:30
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
08:30-9:00
Ike Barnes
Assist. to the Special Agent in Charge, Electronic Crimes Task Force
U.S. Secret Service, Denver
9:00-9:30
Ted Sherrill
Senior Director, Security Solutions
Oracle
Most organizations understand that “it is not a matter of if a cyber incident will occur but when.” Therefore, leading organizations work to balance cyber security along with cyber resilience so the impact to systems from an incident is minimized. Effective cyber security monitors the threat landscape to identify which threats pose the most significant risk and utilize controls to minimize the likelihood of occurrence. Optimal cyber resilience complements the cyber security practice with controls that minimize the impact to the organization’s systems when a security incident occurs. This session will provide examples of how organizations are working to achieve optimal cyber security and resilience within an evolving threat landscape.
9:30-10:00
Jesse Hood
Regional Director
Darktrace
Global ransomware attacks like WannaCry already move too quickly for humans to keep up, and even more advanced attacks are on the horizon. Cyber security is quickly becoming an arms race — machines fighting machines on the battleground of corporate networks. Algorithms against algorithms.
Artificial intelligence-based cyber defense can not only detect threats as they emerge but also autonomously respond to attacks in real time. As the shortage of trained cyber analysts worsens, the future of security seems to be automatic. But are humans ready to accept the actions machines would take to neutralize threats?
Darktrace recently ran tests across enterprises of all sizes in a variety of industries and has subsequently deployed AI-based autonomous response in over one hundred organizations. In this presentation explore lessons learned and hear about several use-cases in which autonomous response technology augmented human security teams.”
In this session learn about:
10:45-11:30
Ryan Spelman
Senior Director
Center for Internet Security
MODERATOR
Jason Chambers
Senior Manager of Engineering
Cisco
Jeff Costlow
Deputy CISO
ExtraHop Networks
Karl Gainey
Director of Sales Engineering
enSilo
Tim Golden
Director & Server Chief Technologist
Hewlett-Packard Enterprise
Nick Olmsted
Principal Systems Engineer
Code42
Today 86% of organizations are in the process of building or already have an existing system in place to prevent/defend against insider attacks; if this statistic proves anything it is that more and more business are coming to terms with the hostilities of our world. Expected or unexpected, an employee with access to company-wide systems, no matter their intentions is a great threat to any organization. An employee with malicious intentions is dangerous, but according to a recent IBM survey, 95% of all breaches involved someone making a mistake. The Insider Threat panel at the Cyber Security Summit will show you how your organization is at risk, as well as showing you innovative & necessary steps to take in order to prevent attacks and increasing your defense systems.
11:30-12:00
Jeff Costlow
Deputy CISO
ExtraHop Networks
Data is a blessing and a curse. Get the right data, in the right amount, at the right time, and you are in the driver’s seat. The wrong data, too little data, too much data, or the wrong timing, and you are in the hot seat. The explosion of data and its byproduct, network traffic, create structural problems for the SOC.
In this session, attendees will learn how taking a different approach to data – one that emphasizes speed, fidelity, and the elimination of data silos – can enable more successful threat hunting and incident response. Topics covered include the impact of TLS 1.3 and encryption on data and its ripple effect on security operations, as well as best practices for threat hunting. The session will also delve into how network traffic analysis can serve as the foundation of more effective security practices, data-driven decisions, and a mature, proactive SOC.
12:00-12:45
12:45-1:15
Scott Gordon
(CISSP) Chief Marketing Officer
Pulse Secure
Any means access to enterprise apps and resources is the new normal, as is news on advanced threats and massive data breaches. While perimeter controls are not going away, the mantra of Zero Trust dictates a verify before trust approach to safeguard access. As companies continue to migrate to the cloud, organizations are considering per-application access using a software defined perimeter (SDP) architecture. SDP offers simple and secure endpoint to application authentication with stateful access compliance. While the death of firewalls and VPNs has been grossly exaggerated, how, when and where should organizations take advantage of this extended mode of secure access?
This session will explore:
1:15-1:45
Todd Rossin
CEO & Chief Strategist
IDMWORKS
Organizations process and store huge volumes of sensitive information that belong to their customers and employees – from financial information to medical records to personal identifiers, like social security numbers and birthdates. Inadequate controls in IAM processes and technology can lead to breach, involuntary exposure of this data, and non-compliance issues. But you cannot correct what you don’t know, so the first step in any IAM program is assessment.
IDMWORKS CEO & Chief Strategist, Todd Rossin, will address the most common questions around IAM Assessments & Roadmaps – Why Should We Assess? What Should We Assess? and When Should We Reassess?
2:00-2:45
Ryan Spelman
Senior Director
Center for Internet Security
MODERATOR
Grant Asplund
Cloud Evangelist
Check Point Software Technologies
Barbara Grofe
Principal
Nerthus Consulting, LLC
Mounir Hahad, Ph.D
Head of Juniper Threat Labs
Juniper Networks
Alex Humphrey
Solutions Consultant
Armor Cloud Security
Gavin Matthews
Product Manager
Automox
For many organizations they are looking at over half of their IT spending being related to cloud, whether infrastructure, services or other tools in the near future. As a CISO, this movement to the cloud can fill you with dread. Furthermore, one of the risks corporate boards understand best is third party risk, and now your entire network is in someone else’s hands. This transition is the subject of a lot of concern and a lot of mixed signals. It doesn’t have to be that way though, especially as moving to the cloud can be a security improvement, if managed appropriately. This panel will talk about the security issues CISO’s and IT leaders need to be aware of as they move further and further over to the cloud, what best practices and services they should consider or utilize, and how they can fully leverage the cloud resources to bring their organization to the next level of security.
2:45-3:15
Colin Black
Chief Operating Officer
CrowdStrike
Adversaries have had the upper hand for too long. CrowdStrike is systematically turning the tables on them, creating a platform that allows you to beat them at their own game. Find out why 2019 is the year we take cyberspace back.
Learn more about:
3:15-3:30
James Lui
Vice President of Product Management
Ericom Software
3:45-4:30
Ajay Menendez
Executive Director, HUNT Analytics Program
SecureSet
MODERATOR
Mary Haynes
Vice President, Network Security
Charter Communications
Aaron Janssen
Sr. Sales Engineer
Malwarebytes
Bonnie Moss
Executive Director
SMB iSAO
Chris Sears
Sr. Solutions Engineer
Securonix
Jonathan Steenland
Chief Operating Officer
National Cybersecurity Center
Collin Woo
Senior Solutions Engineer
Oracle Dyn
A common phrase in information security is: “It is a matter of when you will be breached, not if.” As the headlines provide real-life examples from Marriot, to Equifax, to FedEx, this seems more true than ever before. But what should you do to prepare, respond and recover from it? What tools and tactics will make it easier to detect a breach (either as it happens or after the fact), what do you say to key stake holders about what is happening and how do you pivot from “How did this happen” to “How can we make sure it doesn’t happen again”. Few things in IT can be as high visibility and high stakes as a breach and this panel will equip the audience with what they need to know to better handle when a breach happens.
4:45-5:15
Tory Smith
Special Agent
The FBI
5:15-6:00
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |