Deputy Assistant Attorney General for the National Security Division,
U.S. Department of Justice
Upcoming Summits
The fourth annual Chicago Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Tuesday, August 27
7:45AM - 6:30PM
151 East Wacker Drive
Chicago, IL 60601
Discounted Rate with Cyber Summit!
Insider Threat
What the CISO and Every IT Security Management Team Must Face & Govern 24/7
Cloud INsecurity
Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them
Incident Response
What to do Before, During and After a Breach
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 3 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
5All Inclusive
During the summit, all of your meals, refreshments and snacks are included. We provide a catered breakfast, lunch & cocktail reception for all of the attending delegates for one low price. You may also indulge in complimentary cigars at the conclusion of each event.
CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 CPE Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
7Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
8Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment set within a luxury venue.
9Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
10Cyber Crime
Cyber Crime is the fastest growing threat to businesses globally. Secure your critical infrastructure before it’s too late!
QUESTIONS
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
VOLUNTEERING
Interested in volunteering at the Cyber Security Summit? Please email Lindsay Wess at LWess@CyberSummitUSA.com
Active Students Only
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:45-8:30
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:30-9:00
Adam Hickey
Deputy Assistant Attorney General for the National Security Division
U.S. Department of Justice
9:00-10:00
John Grim
Managing Principal – Americas, Verizon Threat Research Advisory Center
Verizon Enterprise Solutions
What’s the single most important component of an effective cyber-security program? Here’s a hint: It has nothing to do with technology. John Grim, Managing Principal, Verizon Threat Research Advisory Center, will discuss the importance of stakeholder engagement in cyber-security. Drawing on his 9 years as a Verizon data breach investigative responder and a his previous 12-year career with the U.S. Army as an counterintelligence investigator, Grim will explore how better communication between security teams and the business lines, executives and customers they support can make for a more effective security program. Better still, effective stakeholder engagement can reduce security-practitioner burnout and contribute to their professional growth.
10:15-10:45
Deric Gales
Chrome Sales Specialist
Google Cloud
With enterprises more targeted by malicious attacks than ever before, IT needs to ensure they are using the right tools to keep their company's data secure. In this session, attendees will learn about the many differentiating features of Chromebooks around security, and what really helps Chromebooks stand out from the pack.
10:45-11:30
Steve Gold
Vice President of Cybersecurity Solutions
Center for Internet Security
MODERATOR
Chris Hazelton
Director of Product Marketing
Lookout
Gaurav Kulkarni
Vice President Field Engineering
ReliaQuest
Brandon Meyer
Senior Solutions Architect
enSilo
Mark Morrison
Senior Vice President & CISO
OCC
Doug Shepherd
Chief Security Officer
Nisos
Sam Tompsett
Systems Engineer
Code42
Ira Winkler
Security Evangelist
Nyotron
Today 86% of organizations are in the process of building or already have an existing system in place to prevent/defend against insider attacks; if this statistic proves anything it is that more and more business are coming to terms with the hostilities of our world. Expected or unexpected, an employee with access to company-wide systems, no matter their intentions is a great threat to any organization. An employee with malicious intentions is dangerous, but according to a recent IBM survey, 95% of all breaches involved someone making a mistake. The Insider Threat panel at the Cyber Security Summit will show you how your organization is at risk, as well as showing you innovative & necessary steps to take in order to prevent attacks and increasing your defense systems.
11:30-12:00
Justin Fier
Director of Cyber Intelligence & Analytics
Darktrace
Nowhere do the awe-inspiring capabilities of modern computers enable greater harm than in the hands of today’s online threat actors, who range from nation states to nefarious corporations to organized cyber-criminals. Their increasingly sophisticated attacks strike at an increasingly breakneck pace, and the reality is that human incident responders cannot stop these machine speed threats: it’s simply an unfair fight. With legacy tools flagging thousands of false positives every day, the threats that these tools manage to detect are often lost within mountains of other alerts, while insider threats bypass such outward-looking defenses altogether. Neither companies nor governments can afford to rely on traditional approaches to cyber security — not at a time when fast-acting malware like the WannaCry ransomware attack are costing the world billions of dollars apiece.
As the first proven, enterprise-grade autonomous response technology available on the market, Darktrace Antigena uses self-learning cyber AI to give incident responders a chance to repel such attacks by fighting automated threats with machine-speed action. The technology is anchored in a constantly evolving understanding of a user or device’s typical ‘pattern of life’ in relation to its past and its wider network, an understanding that reduces security alerting by orders of magnitude compared to traditional approaches. Once it identifies a threat, Darktrace Antigena works by surgically intervening to confine a device to that ‘pattern of life,’ containing the suspicious behaviour until a security team can investigate without interrupting workflow. Such autonomous response technologies have finally turned the tide in the battle for online security, a battle which can only be won by confronting fast-moving cyber-attacks with self-learning cyber AI.
In this session, you’ll discover:
Where cyber-criminals have found weaknesses in legacy approaches to security
Why humans cannot stop threats 24/7, particularly when bombarded with false positives
How Darktrace Antigena enables incident responders to counter machine speed attacks
12:00-12:30
12:30-1:00
Matt Cauthorn
VP of Security
ExtraHop Networks
Ask any analyst, reporter, or financial observer, and they’ll tell you that the security market is ripe for consolidation. For years, security vendors have proliferated, buoyed by high valuations and ever-expanding enterprise security budgets. While this rush to innovate has resulted in better and more sophisticated threat defenses, it has also created a complex web of tools which already overworked, overwhelmed, and understaffed security teams must manage.
This tool sprawl is one reason that so many in and around the security industry believe that an era of consolidation is coming. According to ESG Research, 66 percent of businesses are actively working to consolidate their security portfolio. For many in the security industry, a security platform that essentially puts your “SOC-in-a-box” is an ideal solution to the tool sprawl problem.
But this approach is not without peril. If the security industry consolidates to the point that there are just a few platform solutions, this will not only stifle innovation, it will result in a monoculture – and monocultures are notoriously susceptible to disease. If every organization uses an identical or nearly identical set of security tools, breaking into one means breaking into them all. And once threat actors figure out how to break in once, they’ll have the keys to every organization. Just like the world banana population – itself a monoculture – is currently being wiped out by a fungus to which is has no natural resistance, a single cyber threat could take down a vast number of organizations.
In the case of cybersecurity, heterogeneity of defense systems is itself a defense, so security teams need to approach consolidation differently. In this session, attendees will learn:
1:00-1:30
Chris Cronin
Partner & Principal Consultant
HALOCK Security Labs
If you are breached and your case goes to litigation, you will likely be asked to demonstrate “due care” and that your controls were “reasonable.” Many are surprised to learn that a breach by itself often does not constitute negligence. Judges will ask a set of questions to determine whether your controls were reasonable. These questions bear a close resemblance to information security risk assessments; they both try to balance the likelihood and impact of foreseeable threats against the burden of safeguards. This presentation will explain judicial balancing tests, how they relate to regulatory definitions of “reasonable” risk, and how to conduct risk assessments that prepare you to answer the tough questions before you need to be asked.
What Attendees Will Learn:
1:45-2:15
Todd Rossin
CEO & Chief Strategist
IDMWORKS
Organizations process and store huge volumes of sensitive information that belong to their customers and employees – from financial information to medical records to personal identifiers, like social security numbers and birthdates. Inadequate controls in IAM processes and technology can lead to breach, involuntary exposure of this data, and non-compliance issues.
But you cannot correct what you don't know, so the first step in any IAM program is assessment.
IDMWORKS CEO & Chief Strategist, Todd Rossin, will address the most common questions around IAM Assessments & Roadmaps - Why Should We Assess? What Should We Assess? and When Should We Reassess?
2:15-2:45
Steve Gold
Vice President of Cybersecurity Solutions
Center for Internet Security
MODERATOR
Srini Nimmagadda
Director, Product Management - Cloud Security
Juniper Networks
John McClurg
Vice President, Ambassador-At-Large
Blackberry Cylance
Sarah Reeser
CEO and Founder
Analytical Intel LLC
For many organizations they are looking at over half of their IT spending being related to cloud, whether infrastructure, services or other tools in the near future. As a CISO, this movement to the cloud can fill you with dread. Furthermore, one of the risks corporate boards understand best is third party risk, and now your entire network is in someone else’s hands. This transition is the subject of a lot of concern and a lot of mixed signals. It doesn’t have to be that way though, especially as moving to the cloud can be a security improvement, if managed appropriately. This panel will talk about the security issues CISO’s and IT leaders need to be aware of as they move further and further over to the cloud, what best practices and services they should consider or utilize, and how they can fully leverage the cloud resources to bring their organization to the next level of security.
2:45-3:15
Kurt Van Etten
SVP, Security Strategy
RedSeal
At a time when security professionals fuel business enablement and enhance bottom-line value, CISOs have never had a more vital business role. But in order to get the board buy-in they need for their programs, they need to be trusted. In the age of the breach, this is easier said than done.
In this session, you’ll learn how to:
3:30-4:00
Kirk Hayes
Senior Security Consultant
Nettitude
Chris Oakley
VP Technical Services, Americas
Nettitude
What are the tactics, techniques and procedures used by today’s most advanced hackers, and how are they changing? In this talk, the heads of Nettitude’s offensive and defensive security teams will discuss the most common practices of today’s best hackers, and how organizations can defend themselves against each of them, including live demonstrations.
4:00-4:30
Matilda McVann
Global Head of Cyber Response
Zurich Insurance
MODERATOR
Dan Allen
VP, Customer Success
Bromium
Bryan Geraldo
VP, Services Consulting & Business Development
Fidelis Cybersecurity
Chris Goodman
Director Of Technical Integrations and Alliances
SentinelOne
Shane Harsch
Senior Solutions Principal
RSA
Steven Rubenstein
Privacy Consultant
OneTrust
Itay Yanovski
Co-Founder & VP Strategy
CyberInt
A common phrase in information security is: “It is a matter of when you will be breached, not if.” As the headlines provide real-life examples from Marriot, to Equifax, to FedEx, this seems more true than ever before. But what should you do to prepare, respond and recover from it? What tools and tactics will make it easier to detect a breach (either as it happens or after the fact), what do you say to key stake holders about what is happening and how do you pivot from “How did this happen” to “How can we make sure it doesn’t happen again”. Few things in IT can be as high visibility and high stakes as a breach and this panel will equip the audience with what they need to know to better handle when a breach happens.
4:45-5:15
5:15-5:45
Kory Bakken
Supervisory Special Agent, Criminal Cyber Squad
FBI Chicago
5:45-6:30
To be eligible to earn your Full 6 CPE Credits, delegates must be in attendance until 5:45PM. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Hyatt Regency Chicago
151 East Wacker Drive
Chicago, IL 60601
Embassy Suites by Hilton Chicago Downtown
600 North State Street, Chicago, Illinois
Use Group Code: CYB for a discounted rate!
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |