|02/11 - Atlanta 03/18 - Tampa 04/07 - San Diego 04/14 - Denver 05/06 - Nashville 05/13 - Dallas||06/09 - Silicon Valley 06/23 - Seattle/Portland 06/29 - Philadelphia 07/07 - St. Louis/OKC 07/14 - Detroit 07/21 - DC Metro||08/24 - Chicago 09/14 - Miami 09/23 - Charlotte 09/30 - Columbus 10/13 - Scottsdale 10/20 - New York|| 10/27 - Los Angeles 11/17 - Boston 12/02 - Houston |
Request Prospectus » View Past Summits »
New Speakers are Added Daily
Morning Security Briefing Morning Briefing: Leo Taddeo, Former Special Agent in Charge Cyber/Special Operations Division, FBI New York Field Office
Morning Keynote Sponsored by Palo Alto Networks: “Crack the Code and Defeat the Advanced Adversary” Morning Keynote: Sebastian Goodwin, Director of Endpoint Security/IT Security Leader/Author, Palo Alto Networks Cybersecurity can sometimes feel like a puzzle, a code to crack. This isn’t how it should be. Adversaries don’t need to win. Stopping them doesn’t require endless time and resources because most just take the path of least resistance for the easiest win. Your objective as a security practitioner is to raise the total cost of a successful attack, to make your organization a less appealing target. During this keynote presentation, Palo Alto Networks will take a detailed look at real attacks and how you can crack the code to defend your organization. Specifically, we’ll discuss:
Exhibitor Technology Showcase & Business Meetings / Networking
PANEL 1: The Relationship between Cyber Security and The C-Suite & The Boardroom Effective Cyber Security Management Requires Real Coordination Between the Board of Directors, Other C-Suite Executives & CISOs/CSOs Due to the increase in sophistication & frequency of data breaches, there is a necessity for pro-active and continuous engagement between the board, senior management and the CISO/CSO. Corporate proprietary data and/or highly confidential information is constantly at risk. Knowing a company’s current cyber security strategy and its future plans on how best to close discovered gaps is nearly as important as knowing the organization’s financial health. As a result, there must be an alignment of interests among those who face direct civil (C-Suites & Board Members) liability for failure to supervise and implement the proper Cyber Security precautions within their organization. This panel will discuss the ever-growing critical relationship and its importance to minimize potential damage to their brand’s reputation and/or face regulatory fines and punishment for not properly safeguarding the company’s critical assets. Moderated by: Michael Farrell, Editor of Passcode, The Christian Science Monitor
PANEL 2: The True Costs to a Company’s Brand / Reputation after a Cyber Attack and the importance of Cyber Security Insurance and an Incident Response Plan & Team.
Market indications predict the worst is yet to come as it pertains to cyber attacks on businesses.
A wide variety of industries including healthcare, banking, retail and entertainment have fallen victim to the non-stop breach activity over the last few years.
The US State Dept., Sony, JPMorgan Chase, Target, Home Depot and Anthem have all experienced massive, negative fallout from their incidents.
The end results from cyber security attacks like these include financial loss, negative press & media attention, legal action & lawsuits, senior level management terminations, brand damage and potential demise of the corporation.
This discussion will cover the known, the immeasurable and the unknown costs associated with a data breach or cyber related incident. In addition, this panel will focus on the critical importance of having a written & battle-tested IRP (Incident Response Plan) along with a capable IRT (Incident Response Team) in place if a cyber attack occurs. Cyber insurance or “tailored” legal / consulting advice is used in controlling and potentially reducing liability costs.
Moderated by: Tom Resau, Vice President, W2 Communications
Lunch Briefing: Implementing a Transparent Encryption Layer Briefing by Trent Telford, Founder and CEO, Covata Limited
As attacks continue to plague organizations across every industry, it is abundantly clear that old security methods are not working. Organizations need to take a new, data-centric approach. Central to this is easy, transparent encryption. Not the old, hard to manage solutions that put the onus on the employee, but new methods that remove the burden, empower productivity and greatly improve security. We’ve entered a new era for security and employees must have the tools to do their jobs better and more securely.
As Trent Telford, CEO of data protection firm Covata, sees it, we need to make encryption usable and as a result adoptable by all personnel within an organization for it to protect the business. Attacks are going to continue to happen and whilst hackers are becoming increasingly sophisticated, the easiest way into an organization is through the weakest link. Here is what you should be looking for in your security solution to maximize its effectiveness.
PANEL 3: Corporate Espionage and Insider Threat – Monitoring Outlier Behavior that Indicates Malicious Intent
Insider threat has been synonymous of late with terms such as breach, data leakage and a host of cyber security implications often aimed at the consumer. While personnel files, social security numbers, credit cards, and PII are often the target of attacks, corporations are now watching much more! What happens when a fast riser or even an uninspired employee decides to go to a competitor or launch his or her own endeavor? What data, clients or even personnel are they exfiltration on the way out? How would you know? There are many identifiers and triggers that often go undetected. Insiders know how to go unnoticed (slow and low), just as malware finds its way through layers and layers of defenses. How do we defend against corporate espionage? What are the implications? What are the signs?
Moderated by: Ryan Stolte, Founder & CTO, Bay Dynamics
PANEL 4: What Emerging Risks are likely to become Major Threats? What new Countermeasures & Cutting Edge Technologies can assist in defending against them? This panel will cover suggestions on how to protect against and prevent the many cyber challenges previously discussed & potential customized solutions that fit your company. We will also discuss the latest technologies, software and hardware solutions available today to protect tomorrow’s cyber security challenges. Moderated by: Joseph Steinberg, Cyber Security Expert / Author / CISSP, ISSAP, ISSMP, CSSLP
Pre-Set Business Meetings, Open Networking & Champagne Reception