Assist. to the Special Agent in Charge, Electronic Crimes Task Force
US Secret Service, Denver Field Office
Upcoming Summits
Thursday, March 22, 2018 | 7:45AM to 6:00PM | Hyatt Regency Denver
The second annual Cyber Security Summit: Denver connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Thursday, March 22, 2018 | 7:45AM to 6:00PM | Hyatt Regency Denver
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
The Secret Service’s Electronic Crimes Task Forces combine the resources of academia; the private sector; and local, state, and federal law enforcement agencies to combat computer-based threats to our Nation's financial payment systems and critical infrastructures, as authorized by the Patriot Act to “prevent, detect and investigate various forms of electronic crimes, including potential terrorist attacks against critical infrastructure and financial payment systems.” The goal of the Electronic Crimes Task Forces is to establish, promote and continue a robust public/private partnership based on the U.S. Secret Service's historic strategic alliances with federal, state and local law enforcement agencies, private industry and academic institutions in order to respond, confront and suppress cybercrime, malicious uses of cyberspace and threats to cyber security that endanger the integrity of our Nation's financial payments systems and threats against our Nation's critical infrastructure.
All Artificial Intelligence is not the same. If A.I. mimics human behavior, what human do you mimic? @RISK presents the value of fusing human tradecraft, machine learning and big data to provide a real-time, quantified approach for managing enterprise wide cybersecurity and risk. @Risk’s application of A.I. and machine learning, fused with incident data, SIEM events, and threat intelligence results in a ‘new’ harmonized view of the network.
Specifically, “Network Consensus” synchronizes existing security products using: netflow and packet capture techniques, Dark Web Queries, and Attack Avenue testing in conjunction with IBM Watson’s Machine Learning and Cognitive Computing capabilities. The result is a real-time “situational awareness” for executives, managers and technical staff that provides a single view of the enterprise’s cyber security status and is measured through a balance scorecard.The benefits of automating Post Incident Digital Forensic Investigation (DFI) and its reuse for Pre-Incident Discovery will also be discussed. The objective of the session is to demonstrate how to transform an organization’s security and risk posture, to one that is predictive, preemptive and adaptive, in order to maximize cyber defenses and minimize risk.
Presented by Sean Brehm, President & CEO, @RISK Technologies, Inc.
Fact: A 2018 report researched by PwC interviewed 9,500 executives from 122 countries revealed that 54% do not have an incident response plan and 44% did not have an overall info security strategy. That indicates that the future of successful cyber attacks is inevitable. This panel discusses “Security Orchestration” which unites the security teams or “human element” with pre-existing automated tools and processes around security incidents. Effective alerts, automated incident response actions with solutions that integrate & communicate with each other can all assist in making sense of the breach and respond in an orchestrated fashion. A proper plan also includes a communication process incorporating the legal, law enforcement, insurance and public relations team. Today’s CISO needs to anticipate, and predict how the security challenges of the future may affect the business and be able to articulate that to the board along with eventually disseminating the breach to the media & public.
Moderated by Bill Swearingen, Director of Cyber Defense, CenturyLink
Competent CISOs are in high demand. How do you become appointed to the position of the CISO. The skills that got you to the CISO position will not keep you there for long. Successful CISOs know how to lead a security and risk management organization that is well regarded and proficient in a number of areas. Dealing with ever increasing and sophisticated attacks, oversight by the Board of Directors, balancing threats versus compliance requirements, thought leadership, enabling digital transformation strategies, and more. There is a way to not just survive but thrive.
Presented by Bill Swearingen, Director of Cyber Defense, CenturyLink
Since the modern day security executive is on the hot seat after a data breach, it’s critical that CISOs understand what the role of the company’s lawyer is and the right way to engage with Counsel and to get themselves some form of liability protection. The downside is that such protection could shield those who deserve the blame for an incident. The truth is that it does not matter that CISOs warn executives, often repeatedly, that certain cultural or technological issues were putting the company at risk, or that the CISO had a shoestring budget with too little or no staff. Chances are that the CISOs is going to be on the front lines facing lawyers at a deposition after an incident. This discussion will offer a conversation that offers strategies for CISOs to utilize when facing a lawyer in a deposition; What happens? Why does it happen? How should you dress? How to ultimately survive?
Presented by
Ransomware sales have increased by over 1,400% over the last two years. The impact of ransomware, destructive malware and related attacks is growing globally as the statistics illustrate. This panel addresses the question of whether your company should pay the cyber criminals with the fact that you may not retrieve your data regardless. Best practices including continually backing up your critical files to multiple locations including the cloud, the use of decryption tools when your assets are held for ransom, keeping your security software up to date and training the employees about the dangers of opening the wrong attachment or link.
Moderated by Daniel Garrie, Partner & CISO, Zeichner Ellman & Krause LLP, Managing Partner, Law & Forensics
With 90% of organizations feeling vulnerable to insider attacks and a majority of organizations confirming insider attacks against their organizations in the past 12 months, insider threat proves to be even more virulent than malicious attacks by actors beyond your network walls. On your payroll in one way or another, these dissatisfied employees, corporate spies and the like, have the means to harm your business. These insiders also have the ability to cause harm without meaning to! This panel will enlighten you on what insider threat & corporate espionage put at risk in your business. You will learn how identify threats inside your business (malicious and accidental) and leave with strong takeaways that will allow you to fortify your company defenses.
Moderated by Lt Col Robert Harder, Professor, Computer and Cyber Sciences Department, United States Air Force Academy
Thursday, March 22, 2018 | 7:45AM to 6:00PM | Hyatt Regency Denver
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
Thursday, March 22, 2018 | 7:45AM to 6:00PM | Hyatt Regency Denver
The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
Thursday, March 22, 2018 | 7:45AM to 6:00PM | Hyatt Regency Denver
The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Bradford Rand at BRand@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |