The Official Cyber Security Summit

Connecting Sr. Executives with Leading Cyber Solution Providers

Upcoming Summits

Apr 21 Nashville

May 2 Dallas

May 18 Denver

May 25 Austin

Jun 7 Salt Lake City

Jun 13 Hartford

Jun 15 Channel/MSSP

Jun 22 Finance

Jul 20 DC Metro

View All Events
2016-08-25
 
The Official Cyber Security Summit
  • Summits
      • 2023 Cyber Security Summits

      • Tampa
        Jan 27, 2023

      • Atlanta
        Feb 10, 2023

      • Silicon Valley
        Feb 22, 2023

      • San Diego
        Mar 3, 2023

      • Seattle
        Mar 8, 2023

      • Huntsville
        Mar 10, 2023

      • Miami
        Mar 17, 2023

      • New York
        Mar 23, 2023

      • Nashville
        Apr 21, 2023

      • Dallas
        May 2, 2023

      • Denver
        May 18, 2023

      • Austin
        May 25, 2023

      • Salt Lake City
        Jun 7, 2023

      • Hartford
        Jun 13, 2023

      • Channel/MSSP
        (Chicago)
        Jun 15, 2023

      • Finance
        Jun 22, 2023

      • DC Metro
        Jul 20, 2023

      • Pittsburgh
        Jul 27, 2023

      • Detroit
        Aug 17, 2023

      • Chicago
        Aug 24, 2023

      • Atlanta
        Sept, 2023

      • Philadelphia
        Sep 13, 2023

      • Kansas City
        Sep 28, 2023

      • Healthcare
        Sep 29, 2023

      • Charlotte
        Oct 4, 2023

      • Columbus
        Oct 27, 2023

      • Infrastructure
        Oct 20, 2023

      • Scottsdale
        Nov 1, 2023

      • Dallas
        Nov 10, 2023

      • Boston
        Nov 14, 2023

      • New York
        Nov 17, 2023

      • Los Angeles
        Nov 30, 2023

      • Houston
        Dec 7, 2023

      • Education
        Dec 8, 2023

      • View All Summits
  • Speakers
  • Solution Providers
  • Partners
  • About
    • About Us
    • Contact Us
    • Official Press Releases
    • Our Delegates
    • Business Development Opportunities
    • Request Speaking Opportunity
    • Earn CEU / CPE Credits
    • Photos
    • Testimonials
  • Content Sharing
  • Resources
    • Trainings & Certifications
    • Career Advancement Tools
    • Diversity & Inclusion in Cyber
    • Special Offers
    • Career Opportunities
  • Jobs
  • Register Now
REGISTER NOW
REGISTER NOW

Charlotte 19

Charlotte 2019

The Westin Charlotte
Tuesday, September 17 | 7:45AM – 6:00PM

CharlotteAgendaSpeakersSponsorsPartnersAccommodationsPhotos

The inaugural Charlotte Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.

Tuesday, September 17
7:45AM - 6:00PM

[wpcdt-countdown id="9505"]
The Westin Charlotte

601 South College St
Charlotte, NC 28202

Book Now »

*Book by Aug 16 for a discounted rate

Reduced Self Parking is available for attendees at the rate of $15 per day. You will receive a voucher at registration to receive this rate.

Subject Matter Experts

Klint Walker

Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), US DHS

David Cass

Vice President - Cyber & IT Risk,
Federal Reserve Bank of New York

Sean Brehm

Co-founder,
CrowdPoint Technologies

All Speakers »

Interactive Discussions

Insider Threat
What the CISO and Every IT Security Management Team Must Face & Govern 24/7

Cloud INsecurity
Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them

Incident Response
What to do Before, During and After a Breach

Full Agenda »

Top 10 Reasons to attend the Cyber Security Summit

1

Learn

Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 3 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.

2

Evaluate Demonstrations

Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.

3

Time, Travel & Money

Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.

4

Engage, Network, Socialize & Share

Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.

5

All Inclusive

During the summit, all of your meals, refreshments and snacks are included. We provide a catered breakfast, lunch & cocktail reception for all of the attending delegates for one low price. You may also indulge in complimentary cigars at the conclusion of each event.

6

CEUs

By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day. 

7

Investment

By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.

8

Atmosphere

Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment set within a luxury venue.

9

Reality Check

Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.

10

Cyber Crime

Cyber Crime is the fastest growing threat to businesses globally. Secure your critical infrastructure before it’s too late!

QUESTIONS

For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225

VOLUNTEERING

Interested in volunteering at the Cyber Security Summit? Please email Lindsay Wess at LWess@CyberSummitUSA.com
Active Students Only

SPONSOR

To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223

Agenda

This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.

7:45-9:00

Networking Breakfast

Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.

9:00-9:45

ExtraHop Presentation: Defense in Diversification - Improving cybersecurity through smart consolidation

John Smith
Principal Security Engineer
ExtraHop Networks

Ask any analyst, reporter, or financial observer, and they’ll tell you that the security market is ripe for consolidation. For years, security vendors have proliferated, buoyed by high valuations and ever-expanding enterprise security budgets. While this rush to innovate has resulted in better and more sophisticated threat defenses, it has also created a complex web of tools which already overworked, overwhelmed, and understaffed security teams must manage.

This tool sprawl is one reason that so many in and around the security industry believe that an era of consolidation is coming. According to ESG Research, 66 percent of businesses are actively working to consolidate their security portfolio. For many in the security industry, a security platform that essentially puts your “SOC-in-a-box” is an ideal solution to the tool sprawl problem.

But this approach is not without peril. If the security industry consolidates to the point that there are just a few platform solutions, this will not only stifle innovation, it will result in a monoculture – and monocultures are notoriously susceptible to disease. If every organization uses an identical or nearly identical set of security tools, breaking into one means breaking into them all. And once threat actors figure out how to break in once, they’ll have the keys to every organization. Just like the world banana population – itself a monoculture – is currently being wiped out by a fungus to which is has no natural resistance, a single cyber threat could take down a vast number of organizations.

In the case of cybersecurity, heterogeneity of defense systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn:

  • How a data-first approach to security architectures can illuminate natural consolidation points
  • How collaboration with other parts of the IT organization can actually improve security posture and reduce tool sprawl.
  • How this collaborative approach also creates opportunity to leverage other parts of the organization to improve security posture through smarter processes and practices.
Presentation Details
Presentation Details

9:45-10:15

Darktrace Presentation: Cyber AI in Action: Regaining the Advantage

Marcus Fowler
Director of Strategic Threat
Darktrace

In a world that is increasingly digital, cyber-attack has become the most significant risk confronting today’s businesses, smart cities, and critical infrastructure. Online crime cost the world more than half a trillion dollars last year, while recent attacks have managed to influence the U.S. presidential election and disrupt the Ukrainian power supply. This troubling state of affairs is the product of several fundamental weaknesses with the traditional approach to cyber defense, which relies on predefining what threats look like at a time when criminals launch never-before-seen attacks on a daily basis. Moreover, these attacks increasingly strike at machine-speed, preventing security professionals from responding before their damage is done.

As a fundamentally unique approach to security, cyber AI systems need not predict tomorrow’s attacks based on yesterday’s threats. Powered by recent advances in artificial intelligence, the latest cyber AI security systems instead continuously refine their defenses by learning ‘on the job’ to differentiate between normal and abnormal behaviour in an enterprise, enabling them to flag even subtly malicious activity. Thus, whereas traditional cyber security technologies are blind to unknown threats, self-learning cyber AI systems detect such novel attacks by spontaneously drawing connections that human programmers can’t see. And as ready-to-deploy exploit kits and advanced malware packages spawn new cyber-threats around the world, the challenge of securing the digital realm can only be met with AI security systems that can learn, evolve, and fight back.

In this session, you will learn:

  • Where cyber-criminals have found weaknesses in legacy approaches to security
  • Why only self-learning AI can detect and stop never-before-seen attacks
  • How to protect your network from machine-speed attacks
  • What gaining 100% network visibility of your entire digital estate — including cloud environments and IoT devices — can reveal the latent vulnerabilities that advanced attackers are targeting today
Presentation Details
Presentation Details

10:45-11:30

PANEL 1: Insider Threat - What the CISO and Every IT Security Management Team Must Face & Govern 24/7
/div>

Daniel Garrie
Partner & CISO, Zeichner Ellman & Krause LLP;
Managing Partner, Law & Forensics
MODERATOR

Riley Bruce
Technical Product Marketing Manager
Code42

Matt Kavanaugh
Manager, Solutions Architecture
ReliaQuest

Bo Mendenhall
Cloud Security Solutions Architect
Proofpoint

Franco Negri
Senior Solutions Architect
Securonix

Julie Walleshauser
Engineer
Mimecast

Today 86% of organizations are in the process of building or already have an existing system in place to prevent/defend against insider attacks; if this statistic proves anything it is that more and more business are coming to terms with the hostilities of our world. Expected or unexpected, an employee with access to company-wide systems, no matter their intentions is a great threat to any organization. An employee with malicious intentions is dangerous, but according to a recent IBM survey, 95% of all breaches involved someone making a mistake. The Insider Threat panel at the Cyber Security Summit will show you how your organization is at risk, as well as showing you innovative & necessary steps to take in order to prevent attacks and increasing your defense systems.

Panel Details
Panel Details

11:30-12:00

IBM Interactive Discussion: The Security Implications of Moving to the Cloud

David Cass
CISO
IBM

12:00-1:00

Networking Lunch sponsored by ReliaQuest

1:00-1:30

IDMWORKS & SailPoint Presentation: Best Practices for IAM Assessments, Blueprints & Roadmaps

Todd Rossin
CEO & Chief Strategist
IDMWORKS

View Presentation

Organizations process and store huge volumes of sensitive information that belong to their customers and employees – from financial information to medical records to personal identifiers, like social security numbers and birthdates. Inadequate controls in IAM processes and technology can lead to breach, involuntary exposure of this data, and non-compliance issues.

But you cannot correct what you don't know, so the first step in any IAM program is assessment.

IDMWORKS CEO & Chief Strategist, Todd Rossin, will address the most common questions around IAM Assessments & Roadmaps - Why Should We Assess? What Should We Assess? and When Should We Reassess?

Presentation Details
Presentation Details

1:30-2:15

PANEL 2: Cloud INsecurity - Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them
/div>

Daniel Garrie
Partner & CISO, Zeichner Ellman & Krause LLP;
Managing Partner, Law & Forensics
MODERATOR

David Cass
CISO
IBM

Glen Deskin
Head of Engineering – Mid Atlantic & Federal, Office of the CTO
Check Point Software Technologies

Andy Olpin
Engineer
Lookout

Khizar Sultan
Director, Solution Engineering
OneLogin

Mark Thames
Americas Security Partner Leader
Juniper Networks

Jon Vaught
Director - Solutions Engineering
Alert Logic

For many organizations they are looking at over half of their IT spending being related to cloud, whether infrastructure, services or other tools in the near future. As a CISO, this movement to the cloud can fill you with dread. Furthermore, one of the risks corporate boards understand best is third party risk, and now your entire network is in someone else’s hands. This transition is the subject of a lot of concern and a lot of mixed signals. It doesn’t have to be that way though, especially as moving to the cloud can be a security improvement, if managed appropriately. This panel will talk about the security issues CISO’s and IT leaders need to be aware of as they move further and further over to the cloud, what best practices and services they should consider or utilize, and how they can fully leverage the cloud resources to bring their organization to the next level of security.

Panel Details
Panel Details

2:15-2:45

@RISK Technologies Presentation: Using Artificial Intelligence to Thwart Cyber Threats and Proactively Protect the Enterprise

Sean Brehm
Chairman and CEO
@RISK Technologies, Inc.

All Artificial Intelligence is not the same. If A.I. mimics human behavior, what human do you mimic? @RISK presents the value of fusing human tradecraft, machine learning and big data to provide a real-time, quantified approach for managing enterprise wide cybersecurity and risk. @Risk’s application of A.I. and machine learning, fused with incident data, SIEM events, and threat intelligence results in a ‘new’ harmonized view of the network.

Specifically, “Network Consensus” synchronizes existing security products using: netflow and packet capture techniques, Dark Web Queries, and Attack Avenue testing in conjunction with IBM Watson’s Machine Learning and Cognitive Computing capabilities. The result is a real-time “situational awareness” for executives, managers and technical staff that provides a single view of the enterprise’s cyber security status and is measured through a balance scorecard.The benefits of automating Post Incident Digital Forensic Investigation (DFI) and its reuse for Pre-Incident Discovery will also be discussed. The objective of the session is to demonstrate how to transform an organization’s security and risk posture, to one that is predictive, preemptive and adaptive, in order to maximize cyber defenses and minimize risk.

Presentation Details
Presentation Details

3:30-4:15

PANEL 3: Incident Response - What to do Before, During and After a Breach

John McClurg
Vice President, Ambassador-At-Large
Blackberry Cylance
MODERATOR

Danny Akacki
Senior Technical Account Manager
Gigamon

Lucas Chumley
Sr. Solution Engineer
SentinelOne

Michael Leighty
Solutions Architect - Cortex XD
Palo Alto Networks

Zoe Lindsey
Security Strategist
Duo Security, Now a Cisco Company

Justin Smigiel
Security Strategist
Carbon Black

Lee Wilson
Sr. Consulting Engineer
NETSCOUT

A common phrase in information security is: “It is a matter of when you will be breached, not if.” As the headlines provide real-life examples from Marriot, to Equifax, to FedEx, this seems more true than ever before. But what should you do to prepare, respond and recover from it? What tools and tactics will make it easier to detect a breach (either as it happens or after the fact), what do you say to key stake holders about what is happening and how do you pivot from “How did this happen” to “How can we make sure it doesn’t happen again”. Few things in IT can be as high visibility and high stakes as a breach and this panel will equip the audience with what they need to know to better handle when a breach happens.

Panel Details
Panel Details

4:15-4:45

Closing Keynote with the U.S. Department of Homeland Security

Klint Walker
Cyber Security Advisor Region IV, Cybersecurity and Infrastructure Security Agency
U.S. Department of Homeland Security

4:45-6:00

Cocktail & Cigar Reception and Raffle Prize Winner Announcements From Our Sponsors

Speakers

Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.

Danny Akacki

Senior Technical Account Manager,
Gigamon

Sean Brehm

Co-founder,
CrowdPoint Technologies

Riley Bruce

Technical Product Marketing Manager,
Code42

David Cass

Vice President - Cyber & IT Risk,
Federal Reserve Bank of New York

Lucas Chumley

Sr. Solution Engineer,
SentinelOne

Glen Deskin

Head of Engineering – Mid Atlantic & Federal, Office of the CTO,
Check Point Software Technologies

Marcus Fowler

CEO,
Darktrace Federal

Daniel Garrie

Co-Founder,
Law & Forensics

Matt Kavanaugh

Manager, Solutions Architecture,
ReliaQuest

Michael Leighty

Solutions Architect - Cortex XD,
Palo Alto Networks

Zoe Lindsey

Security Strategist,
Duo Security, Now a Cisco Company

John McClurg

Vice President, Ambassador-At-Large,
BlackBerry Cylance

Bo Mendenhall

Cloud Security Solutions Architect,
Proofpoint

Franco Negri

Senior Solutions Architect,
Securonix

Andy Olpin

Engineer,
Lookout

Todd Rossin

CEO & Chief Strategist,
CyberSolve

Justin Smigiel

Security Strategist,
Carbon Black

John Smith

Principal Security Engineer,
ExtraHop Networks

Khizar Sultan

Director, Solution Engineering,
OneLogin

Mark Thames

Americas Security Partner Leader,
Juniper Networks

Jon Vaught

Director - Solutions Engineering,
Alert Logic

Klint Walker

Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), US DHS

Julie Walleshauser

Engineer,
Mimecast

Lee Wilson

Sr. Consulting Engineer,
NETSCOUT

To speak at an upcoming summit, contact Bradford Rand at BRand@CyberSummitUSA.com »

Sponsors

The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.

Title Sponsor

ExtraHop
 

Platinum Sponsors

Darktrace
IBM
IDMWorks & Sailpoint
@Risk Technologies
 

Gold Sponsors

Alert Logic
Carbon Black
Check Point Software Technologies
Code42
DUO Security
Gigamon
Juniper Networks
Lookout
Mimecast
NETSCOUT
OneLogin
Palo Alto Networks
Proofpoint
ReliaQuest
SentinelOne
 

Silver Sponsors

Arctic Wolf Networks
Awake Security
BitSight
Dataminr
MediaPRO
Mitchell Martin
Normshield
SecurEnds
Securonix
 
To sponsor at an upcoming summit, contact Bradford Rand at BRand@CyberSummitUSA.com »

Partners

The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSummitUSA.com or call at 212.655.4505 ext 241.

ACFE Charlotte Chapter / Association of Certified Fraud Examiners
AFCEA
AITP Charlotte
ALPFA Charlotte
ARMA Charlotte Piedmont
ASIS Greater Charlotte Chapter
Ballantyne IT Professionals
Business North Carolina
Carolina Women In Tech
CATC
Center for Internet Security (CIS)
Charlotte Business Journal
Charlotte Business Owners
Charlotte Internet of Things / Charlotte IoT
Charlotte Regional Business Alliance
Chief Information Officer (CIO) Network
CITPG
Cloud Security Alliance Carolinas Chapter
CompTIA
Cyber Defense Magazine
CyberSecurity Non-Profit (CSNP)
FENG – The Financial Executives Network Group
Fifth Domain Cyber
GeekMeet
InfoSec-Conferences.com
International Consortium of Minority Cybersecurity Professionals
ISACA Charlotte
(ISC)2 Raleigh Durham Chapter
ISSA Charlotte
ISSA Raleigh
ITSP Magazine
Lake Norman IT Professionals
Loss Prevention Magazine
National CyberWatch Center
NC TECH
OWASP Charlotte
RIOT
The Cyber Security Place
WITI
 
To partner at an upcoming Summit, contact Megan Hutton at MHutton@CyberSummitUSA.com »

Accommodations

Discounted Rate / Summit Location

The Westin Charlotte
601 South College St, Charlotte, NC 28202

Book Now »

Book now for a discounted rate of 219 USD per night

Discounted Rate

Hilton Charlotte Center City
222 East Third Street, Charlotte, NC 28202

Book Now »

sponsor

Sponsor Events

Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.

View Prospectus >

Stay Connected!
Follow Us on Social Media:

@CyberSummitUSA

  • Don't miss our Fourth Annual #Nashville #CyberSecurity Summit on April 21st. Earn up to 8 CPE or CEU credits by att… https://t.co/waqksTCuAz
    about 21 hours ago
  • Attention #Dallas business leaders, c-suite executives and entrepreneurs! Our Annual #CyberSecurity Summit is back… https://t.co/Eb2RiXK1H4
    7 days ago
  • Great turnout at the 11th Edition of the New York Cyber Security Summit. Thank you to all of the speakers, sponsors… https://t.co/Z4MVoh80Qi
    7 days ago

Follow @cybersummitusa

An Inside Look

video

© 2023 Cyber Security Summit - All Rights Reserved

 
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL cookies.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT