Power Networking Breakfast
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
Morning Security Briefing by the FBI New York Regional Office Briefing by Richard T. Jacobs, Assistant Special Agent in-Charge of the Cyber Branch, FBI - New York
Morning Keynote by Darktrace: Unsupervised Machine Learning: A New Approach to Cyber Defense
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and investigate these threats that are already inside the network - before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on unsupervised machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why unsupervised machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
Exhibitor Technology Showcase & Business Meetings / Networking
Darktrace Roundtable Discussion: The Machine Fights Back – Self-Defending Networks Are Here Location: Speaker Ballroom
Cyber defense has become an arms race. Automated attacks that use artificial intelligence to hide inside networks and emulate user behaviors are difficult to spot. This roundtable will examine how threats like ransomware are caught and discuss the future of information security – self-defending systems based on unsupervised machine learning.Attendance is limited, to RSVP to secure a seat at this intimate discussion, please email LWess@TechExpoUSA.com.
Arbor Networks Roundtable Discussion: The Human Factor in the Age of Cyber Conflict Location: Technology Showcase Ballroom With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders to assess each as well in an ever-escalating arms race. But this can cause an over-dependence on technology and an under-appreciation of the human nature and behavior of adversaries. The desire for waves of more and more machine-generated data to consume and assess is in fact boggling minds and breaking team and process effectiveness. As human defenders realize this, they shift strategies to proactive approaches, to focus on fundamentals that truly uncover meaningful threats, and force multipliers that dramatically accelerate threat investigation and disruption. Discussion Lead by Paul Bowen, Principal Security Technologist, Arbor Networks Attendance is limited, to RSVP to secure a seat at this intimate discussion, please email LWess@TechExpoUSA.com.
PANEL 1: Protecting the Enterprise from the Growing Risk of Security Breaches as it Relates to the Internet of Things
The ubiquitous fear of securely managing an exponentially increasing number of connected, automated devices that communicate over the internet is quickly making its way to the forefront of business leaders minds from right on the factory floor to financial institutions, hospital mainframes, right down to the residential kitchen with a smart refrigerator.
According to updated market research forecasts the installed base of active wireless connected devices will reach nearly 6.5 billion in 2016, up 30% from 2015. This number of devices is expected to increase to an estimated forecast of 40 billion devices by 2020.
In todays discussion we will be taking a look at how to improve IOT security for a better connected future in this constantly growing threat landscape of organized cyber criminals.
Moderated by Kenneth F. Belva, New York City Chapter Leader, OWASP Foundation
Power Lunch Sponsored by SiteLock
Lunch Security Briefing: How Can a Corporation Respond to a Cyber Attack? A discussion with Daniel Garrie, Partner and Head of the Worldwide Cyber Security Practice at Zeichner Ellman & Krause LLP; Arbitrator, Neutral, and Technical Special Master at JAMS; and Editor-in-Chief of the Journal of Law & Cyber Warfare & David Cass, CISO, IBM
PANEL 2: The Growing Cyber Threats to Big Data Analytics & Cloud Security
The vastly growing reliance on Big Data and the Cloud has increased enterprise productivity by allowing for more informed plans and decisions, newly discovered opportunities for optimization, as well as the delivery of breakthrough innovations across nearly every major industry. The benefits of Big Data along with the utilization of the Cloud are invaluable and therefore are a growing target for cyber criminals. The nature of the assets are boundless and range from personal data, payment information, intellectual property, health records, accessing critical infrastructure networks & beyond.
This panel will discuss from a managerial perspective, effective strategies to best protect your enterprise by taking proactive steps to roll out a comprehensive set of security measures that best protect your company's sensitive data.
Moderated by David Cass, CISO, IBM
Exhibitor Technology Showcase & Business Meetings / Networking
Sumo Logic Roundtable Discussion: Advanced Security Analytics: How to Protect your Company's Critical Applications in the Cloud
Are you creating new digital initiatives in the cloud, but concerned about getting the necessary visibility to mitigate operational and security risks? This educational and informational Partner Roundtable Discussion will focus on how to leverage next-gen security analytics solutions to enhance compromise detection (MTTI) and accelerate post-incident response and forensics (MTTR).
Attendance is limited, to RSVP to secure a seat at this intimate discussion, please email LWess@TechExpoUSA.com.
PANEL 3: Emerging Risks & Major Threats To The BFSI Sectors – What Are They & How Can We Stop Them?
The BFSI Sectors have been under a constant state of attack with daily attempts to steal assets, crash computer systems and disrupt capital markets. This panel will discuss ways to protect your organization through operational risk management & preventative measures as well as ways to recover from different attacks such as DDoS, Ghostware, Headless Worms, Two-Faced Malware, Drive-by Attacks, Blastware, Ransomware & more.
Recommendations on enhancing existing security strategies will be discussed including, but not limited to: multi-layered security practices, defensive and monitoring technologies that identify & prevent cyber-attacks, as well as the process of raising security awareness within one's company.
Moderated by Joseph Steinberg, CEO, SecureMySocial
Sponsor / Exhibitor Technology Showcase, Business Meetings & Cocktail Reception Sponsored by Nation-E Cocktail Reception Briefing by James Woolsey, Former Director, CIA
Sponsor / Exhibitor Technology Showcase, Business Meetings & Cocktail Reception Sponsored by Nation-E
Cocktail Reception Briefing by James Woolsey, Former Director, CIA
* Speakers subject to change
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|