Opening Remarks Cyber Security Summit Host: Julian W. Waits, Sr., President and CEO, ThreatTrack Security
Morning Keynote: “Why you should worry about insider threat and how to go about it” Keynote Introduction: Sachin Nayyar, CEO and Founder, Securonix Keynote Presentation: Chris Inglis, Former Deputy Director, NSA
Cyber Security Market Forecast & Emerging M&A Trends: Rapidly evolving cyber threats and attacks have triggered an onset of unprecedented acquisitions for enterprise security defense. Industry M&A activity is anticipated to increase momentum as major technology companies make significant investments to improve their end-to-end cyber security capabilities. This panel will cover how companies are gaining a competitive advantage in today’s dynamic marketplace by acquiring several specialized security firms. Industry experts will explore the M&A process including corporate strategies, financial implications, legal aspects and the secure transition of highly vulnerable business applications & intellectual property.
The Weakest Link: Securing The Human Panel: A large emphasis is placed on implementing new and innovative technologies when it comes to cyber security and protecting the enterprise. In order to effectively protect an organization we must have an understanding of the single largest threat against a company, the human. This panel will explore the human element, insider threats, social networking, behavioral aspects and how to implement security awareness programs to secure the weak link in the chain.
Enterprise Mobile Security & BYOD Panel: The use of mobile devices to conveniently access corporate data and systems has become essential for companies in today’s constantly evolving business environment. As the number of employee-owned smartphones and tablets being used in the workplace grows, often circumventing corporate security policies and safeguards, the need for greater security implementations has become crucial. This panel will explore the importance of effectively protecting local and remote devices and why mobile security plays a large role in securing critical enterprise infrastructure.
Lunch Break, Governor’s Briefing & Sponsor Presentations
Afternoon Keynote: Mark Weatherford, Principal, The Chertoff Group
Cyber Policy Panel: As we see a rapid growth in the number of people, devices and data connected to and reliant on the internet, the future of our economic activity and national security relies on collectively building a more secure cyber ecosystem. Establishing a cohesive national cyber security initiative has become one of the major emerging security challenges of the new century. This panel will analyze the ongoing debate surrounding the implementation and enforcement of strategies, policies and emerging areas of enterprise security architecture that will govern people and information in the years ahead.
Cyber Defense Panel: Innovative threat intelligence solutions have been developed by government agencies and leading cyber security solution providers to identity and eliminate targeted attacks against networks and reduce the risk of cyber war and terrorism against our nation. The Cyber Defense panel will examine the ongoing mission to advance innovation and enable global collaboration between the public and private sectors to defeat Cyber security threats. Addressing trends in today’s security, next generation threats and what we can do about it.
Closing Remarks
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |