Upcoming Summits
Brinqa customers are creating a new breed of cyber risk intelligence programs by making vulnerability management a central focus of their efforts.
These programs take vulnerability management effectiveness to a new level, by introducing automation at every step of the process – whether it is integration and correlation of data from multiple sources, prioritization of vulnerability and asset risks, creation and management of tickets based on optimal remediation strategies, or representation and distribution of real-time metrics and KPIs. By extending these core capabilities to additional sources of security data – asset inventory, network management, web application scanning, BC/DR, policy compliance, IDS/IPS, change and configuration management, directory services, SIEM, etc. – these programs are providing security analysts, business owners and executives with actionable insights that were previously unattainable.
Presented at the Cyber Security Summit Boston – November 8, 2017. Highly targeted, low volume spear phishing – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today. This is not news. But what may come as a surprise is that the vast majority of these imposter attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload, but things are changing. New email authentication technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
For decades, and as a best practice, companies have purchased point security products in the name of prevention. Today’s growing threat surfaces coupled with the sophistication of attacks has, however, led us to a point where breaches are now inevitable. From the boardroom to the security operations team, organizations must change their mindset away from prevention toward data forensics in support of fast and accurate incident response.
Presented at the Cyber Security Summit Boston – November 8, 2017. You have lots of security-related data, and it’s not all created equal. Effective threat hunting and incident response require you to pivot quickly and efficiently between the low- and high-fidelity data that exists across firewalls, intrusion prevention systems, security information event management platforms, flow collectors, etc. Understanding the common data elements across these disparate systems allows your team to efficiently pivot from low fidelity data used for rapid root-cause analysis to high-fidelity data that can be a means of conviction.
Presented at the Cyber Security Summit Boston – November 8, 2017. Your organization is valuable, and the cyber criminals know it. Malicious actors constantly attempt to exploit users for privileged access to your enterprise network. Recognizing the anomalous network behavior that occurs when threats breach traditional security architecture is very difficult. Flow and metadata collection from your existing network coupled with Network Traffic Analytics delivers powerful and actionable insight into network and security incidents.
The Cyber Security Summit is partnering with the Journal of Law and Cyber Warfare to offer 60% off the current issue of the Journal. Preview the first two chapters:North Korea: The Cyber Wild Card 2.0 by Rhea Siers
Cyber Enhanced Sanction Stratégies: Do Options Exist? By Mark Peters

Identity
March 11, 2026
Philadelphia
April 15, 2026


FinSec
April 22, 2026


Salt Lake City
April 23, 2026


Baltimore
April 28, 2026


South Florida
April 30, 2026


Denver
May 5, 2026


Boston
May 6, 2026


Nashville
May 13, 2026


Toronto
May 19, 2026


AppSec
May 27, 2026


Milwaukee
June 2, 2026


Hartford
June 3, 2026


St. Louis
June 9, 2026


Austin
June 11, 2026


Pittsburgh
June 23, 2026


AI for Next-Gen SOC
June 24, 2026


Minneapolis
June 30, 2026


Raleigh
July 15, 2026


DC Metro
July 23, 2026


State of Vulnerability Management
July 29, 2026


Detroit
August 18, 2026


Portland, OR
August 19, 2026


Threat Intelligence
August 26, 2026


Atlanta
September 1, 2026


Silicon Valley
September 1, 2026


Columbus
September 2, 2026


San Diego
September 10, 2026


Chicago
September 15, 2026


Attack Surface Management
September 16, 2026



Philadelphia
September 17, 2026


Identity
September 30, 2026


Scottsdale
October 1, 2026


Seattle/Bellevue
October 1, 2026


Boston
October 8, 2026


FinSec
October 14, 2026


Charlotte
October 20, 2026


Network Security
October 28, 2026


Dallas
October 29, 2026


Los Angeles
November 2, 2026


CSS Mega-Summit
November 4, 2026


Houston
November 12, 2026


New York
November 17, 2026


Government Security
November 18, 2026


Vancouver
November 19, 2026


Jacksonville
December 1, 2026


Cloud Security
December 2, 2026


GRC
December 16, 2026









































































































































































Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |









