Upcoming Summits
Power Networking Breakfast
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
Morning Security Briefing
Morning Keynote Address by Arbor Network: Cyber Confidential: Adventures in the Security Industry Underbelly Keynote Address by Dan Holden, Chief Technology Strategist, Arbor Networks
Exhibitor Technology Showcase & Business Meetings / Networking
Roundtable Discussion hosted by Arbor Networks Attendance is limited, to RSVP to secure a seat at this intimate discussion, please email NMathew@TechExpoUSA.com.
PANEL 1: Protecting the Enterprise from the Growing Risk of Security Breaches as it Relates to the Internet of Things
The ubiquitous fear of securely managing an exponentially increasing number of connected, automated devices that communicate over the internet is quickly making its way to the forefront of business leaders minds from right on the factory floor to financial institutions, hospital mainframes, right down to the residential kitchen with a smart refrigerator.
According to updated market research forecasts the installed base of active wireless connected devices will reach nearly 6.5 billion in 2016, up 30% from 2015. This number of devices is expected to increase to an estimated forecast of 40 billion devices by 2020.
In todays discussion we will be taking a look at how to improve IOT security for a better connected future in this constantly growing threat landscape of organized cyber criminals.
Moderated by Don DeLoach, President & CEO, Infobright
Power Lunch Sponsored by TECHEXPO
PANEL 2: The Growing Cyber Threats to Big Data Analytics & Cloud Security
The vastly growing reliance on Big Data and the Cloud has increased enterprise productivity by allowing for more informed plans and decisions, newly discovered opportunities for optimization, as well as the delivery of breakthrough innovations across nearly every major industry. The benefits of Big Data along with the utilization of the Cloud are invaluable and therefore are a growing target for cyber criminals. The nature of the assets are boundless and range from personal data, payment information, intellectual property, health records, accessing critical infrastructure networks & beyond.
This panel will discuss from a managerial perspective, effective strategies to best protect your enterprise by taking proactive steps to roll out a comprehensive set of security measures that best protect your company’s sensitive data.
Moderated by David Cass, CISO, IBM
Exhibitor Technology Showcase & Business Meetings / Networking
Darktrace Roundtable Discussion – The Enterprise Immune System – Using Machine Learning To Detect Unknown Threats Discussion Lead by Sean O’Connor, Director of Sales – East, Darktrace Attendance is limited, to RSVP to secure a seat at this intimate discussion, please email NMathew@TechExpoUSA.com.
PANEL 3: Emerging Risks & Major Threats To The BFSI Sectors – What Are They & How Can We Stop Them?
The BFSI Sectors have been under a constant state of attack with daily attempts to steal assets, crash computer systems and disrupt capital markets. This panel will discuss ways to protect your organization through operational risk management & preventative measures as well as ways to recover from different attacks such as DDoS, Ghostware, Headless Worms, Two-Faced Malware, Drive-by Attacks, Blastware, Ransomware & more.
Recommendations on enhancing existing security strategies will be discussed including, but not limited to: multi-layered security practices, defensive and monitoring technologies that identify & prevent cyber-attacks, as well as the process of raising security awareness within one’s company.
Moderated by Chris Rothe, CTO & Co-Founder, Red Canary
Sponsor / Exhibitor Technology Showcase, Business Meetings & Cocktail Reception Sponsored by Cohiba Cigars
* Speakers subject to change
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |