Supervisor of Computer Intrusion Squad,
The FBI, Atlanta Field Office
Upcoming Summits
The fourth annual Atlanta Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Wednesday, February 13
7:45AM - 6:00PM
3300 Peachtree NE
Atlanta, GA 30305
Insider Threat
What the CISO and Every IT Security Management Team Must Face & Govern 24/7
Cloud INsecurity
Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them
Into the Breach
What to do Before, During and After a Breach
Learn
Learn from renowned security experts from around the globe on how to protect your business from cyber attacks during interactive Panels & Round Table discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
5All Inclusive
During the summit, all of your meals, refreshments and snacks are included. We provide a catered breakfast, lunch & cocktail reception for all of the attending delegates for one low price. You may also indulge in complimentary cigars at the conclusion of each event.
CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 CPE Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
7Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
8Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment set within a luxury venue.
9Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
10Cyber Crime
Cyber Crime is the fastest growing threat to businesses globally. Secure your critical infrastructure before it’s too late!
QUESTIONS
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
VOLUNTEERING
Interested in volunteering at the Cyber Security Summit? Please email Lindsay Wess at LWess@CyberSummitUSA.com
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:45-8:30
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
08:30-9:00
Alan Davis
Special Agent, Electronic Crimes Task Force
U.S. Secret Service, Atlanta
Chad Hunt
Supervisor of Computer Intrusion Squad
The FBI, Atlanta
9:00-9:30
9:30-10:00
Matt Cauthorn
VP of Security
ExtraHop Networks
Improved breach detection and threat response are good reasons to up level your security operations center (SOC) from basic monitoring and response to advanced analytics and threat hunting. Automation and orchestration of tedious steps and workflows can increase SOC incident capacity, focus resources, and shorten time to resolution. Effective strategies reduce false positives, blind spots, and data silos to create headroom for more proactive SOC activities — the elusive next-gen SOC. Learn ways to apply automation to the NIST 800 framework from better preparation using dynamic discovery, automated classification of critical assets, and behavioral baselining to anomaly-driven threat detection and real-time investigations.
10:45-11:30
Ria Aiken
Director, Mayor’s Office of Crisis Management & Emergency Preparedness
City of Atlanta
MODERATOR
Todd Berger
Sr. Director, Technical Solutions
BlackBerry
Jason Chambers
Senior Manager of Engineering
Cisco
Karl Gainey
Director of Sales Engineering
enSilo
Patrick Knight
Senior Director of Cyber Strategy and Technology
Veriato
Sneer Rozenfeld
Vice President
Cyber 2.0
Mark Sanders
Sr. Solutions Architect
Venafi
Today 86% of organizations are in the process of building or already have an existing system in place to prevent/defend against insider attacks; if this statistic proves anything it is that more and more business are coming to terms with the hostilities of our world. Expected or unexpected, an employee with access to company-wide systems, no matter their intentions is a great threat to any organization. An employee with malicious intentions is dangerous, but according to a recent IBM survey, 95% of all breaches involved someone making a mistake. The Insider Threat panel at the Cyber Security Summit will show you how your organization is at risk, as well as showing you innovative & necessary steps to take in order to prevent attacks and increasing your defense systems.
11:30-12:00
Cameron Armstrong
Director
Darktrace
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
12:00-12:45
12:45-1:15
Ben Densham
Chief Technology Officer
Nettitude
1:15-1:45
Pete Nicoletti
Chief Data Officer
Cybraics
In this presentation we’ll discuss a number of issues contributing to the increasing number of breaches and how we can leverage the latest advances in AI/ML to turn this trend around.
The issues that we’ll discuss are: Conventional tools only combat known attacks. The incredible increasing volume of data. Outsourced Managed Security Service Providers (MSSP) Operations are mostly failing at preventing breaches. Alert Overload. Lack of Security Professionals. Lack of subscribing to and managing environments to a Security Framework. Average time to fully contain a breach is lengthening. The cost of a breach remains very expensive. The length of time to identify a breach is barely improving. Efficacy of Conventional Security tools averages only 85%. Almost every company needs more money for cybersecurity but won’t get it. Web Sites and Servers are not kept up with patches.
For each of the above challenges there are new approaches that need to be understood and potentially leveraged to reduce risk.
2:00-2:45
Ryan Spelman
Senior Director
Center for Internet Security
MODERATOR
Matt Cauthorn
VP of Security
ExtraHop Networks
Mikal Hass
Cloud Manager, Cyber Security
Ernst & Young
Jim Hollar
Advisory Cybersecurity Engineer
RSA
Zoe Lindsey
Security Advocate Manager
Duo Security
Rafal Los
VP of Solution Strategy
Armor Cloud Security
Mark Thames
Americas Security Partner Leader
Juniper Networks
For many organizations they are looking at over half of their IT spending being related to cloud, whether infrastructure, services or other tools in the near future. As a CISO, this movement to the cloud can fill you with dread. Furthermore, one of the risks corporate boards understand best is third party risk, and now your entire network is in someone else’s hands. This transition is the subject of a lot of concern and a lot of mixed signals. It doesn’t have to be that way though, especially as moving to the cloud can be a security improvement, if managed appropriately. This panel will talk about the security issues CISO’s and IT leaders need to be aware of as they move further and further over to the cloud, what best practices and services they should consider or utilize, and how they can fully leverage the cloud resources to bring their organization to the next level of security.
2:45-3:00
James Lui
Vice President of Product Management
Ericom Software
3:00-3:30
Todd Rossin
CEO & Chief Strategist
IDMWORKS
Organizations process and store huge volumes of sensitive information that belong to their customers and employees – from financial information to medical records to personal identifiers, like social security numbers and birthdates. Inadequate controls in IAM processes and technology can lead to breach, involuntary exposure of this data, and non-compliance issues. But you cannot correct what you don't know, so the first step in any IAM program is assessment.
IDMWORKS CEO & Chief Strategist, Todd Rossin, will address the most common questions around IAM Assessments & Roadmaps - Why Should We Assess? What Should We Assess? and When Should We Reassess?
3:30-4:00
Timothy Appleby
Program Director - WW Security Enablement Strategy, Transformation and Innovation
IBM
IBM Security has helped 1000’s of clients with everything from small scope engagements through to building and managing complete, global, security programs. From these experiences, we are constantly updating our perspective on where organizations should focus their limited resources to reduce risk while facilitating business innovation. Please join us at this session to hear about what we see on a daily basis and discuss our recommendations in these three critical areas - Strategy and Risk, Threat Management and Digital Transformation.
4:20-5:00
Kamal Ghali
Attorney Bondurant, Mixson & Elmore;
Former DOJ Deputy Chief Prosecutor Cybercrime & Intellectual Property, US Attorney’s Office
MODERATOR
Patrick Gray
Security Strategist & Consultant
CloudFish
Luis Guzmán
Senior Solutions Engineer
Securonix
David Lee
Identity Strategist Office of the CTO
SailPoint
Pete Nicoletti
Chief Data Officer
Cybraics
Adam Tice
SVP, Cyber Operations
Equifax
A common phrase in information security is: “It is a matter of when you will be breached, not if.” As the headlines provide real-life examples from Marriot, to Equifax, to FedEx, this seems more true than ever before. But what should you do to prepare, respond and recover from it? What tools and tactics will make it easier to detect a breach (either as it happens or after the fact), what do you say to key stake holders about what is happening and how do you pivot from “How did this happen” to “How can we make sure it doesn’t happen again”. Few things in IT can be as high visibility and high stakes as a breach and this panel will equip the audience with what they need to know to better handle when a breach happens.
5:00-6:00
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
Program Director - WW Security Enablement Strategy, Transformation and Innovation,
IBM
The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |