Growth Technologies Evangelist,
Check Point Software Technologies
Upcoming Summits
Cybersecurity Summit
CPE/CEUs with full attendance
In-Person Summit
Fri, November 15, 2024
8:00AM - 6:00PM EST
Sheraton New York Times Square Hotel
Metropolitan Ballroom
811 7th Ave 53rd Street
New York, NY, 10019
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 225
On-Site Parking will be available in a garage connected to the hotel for $85 a day. The parking garage location is 140-166 W 53rd Street and W 52nd Street Lower rates may be available at nearby lots by prepurchasing on SpotHero.com
The 14th Edition of the New York Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
8:00-9:00 EST
9:00-9:35 EST
As organizations deal with the proliferation, misuse and breach of sensitive data, they must classify and govern access to data within their environment, while automatically remediating risks of data exposure and exfiltration.
In this session, we will review a comprehensive approach to strengthening organizational data security posture, and tenets for a sound enterprise AI implementation. Ensure you know what sensitive data you are protecting and proactively manage its access and retention as part of your zero trust journey.
9:35-10:05 EST
Artificial Intelligence (AI) introduces novel security challenges, including adversarial attacks and model vulnerabilities. Also, there is the issue of whether you can trust the AI you have. This session will cover six different types of AI attacks in order to provide a better understanding of the threatscape along with some suggestions for securing the data, the model, the usage and the infrastructure. Also, a glimpse into the future of how generative AI can be leveraged to improve cybersecurity will be discussed.
10:05-10:35 EST
Is compliance a friend or foe? We rely on cybersecurity compliance and regulatory requirements to be the lighthouse that guides us through the fog that is risk exposure. Unfortunately, companies that meet compliance frameworks still get breached. These requirements are structured to be a foundation, but they’ve become so complex that there’s not enough time, money and resource to build the rest of the house—leaving gaping holes in a company’s overall cybersecurity strategy.
10:35-11:00 EST
11:00-11:30 EST
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
11:30-11:50 EST
Insider threats are often the hidden dangers in cybersecurity — an elusive risk that, due to their inherent complexity, can cause substantial harm to any organization. It takes a combination AI disciplines; Machine Learning UEBA, Pattern Matching correlation rules, NLP search capabilities, orchestration and automation; for a modern security analyst to get a complete vision of internal and external threats. This demo provides a view of the new Threat Center and AI-powered Search, demonstrating how events are grouped and organized into cases, scored by risk, with generative AI descriptions of what happened and what to do about it.
Attend this demo to learn:
11:50-12:10 EST
As we step into 2024, it’s clear that Software Bill of Materials (SBOMs) are finally evolving beyond a buzzword, becoming indispensable for security and legal compliance in software development. The U.S. government and regulatory bodies around the globe have incorporated SBOMs into new cybersecurity legislation and software supply chain protections – and with good reason. Without an SBOM, companies risk being blind to known-vulnerable open source components being shipped in their software applications, and much like Equifax did in 2017, will struggle to respond to new zero day vulnerability disclosures in open source components. Join Sonatype as we explore how SBOMs can enhance resilience in the face of evolving threats, discuss best practices for effective SBOM management, and provide guidance for easily integrating SBOMs into your workflow.
12:10-12:30 EST
While artificial intelligence, as a catch-all, is the current industry breakthrough darling, there are historical parallels that trace previous technologies that can help businesses understand the evolving threat landscape around AI. In this session, we will examine those previous technologies, and how businesses look to adopt them, to build a foundation of key security concepts that can guide security of both present and future AI projects.
12:30-1:20 EST
1:20-1:55 EST
What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight?
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Wayne Selk
VP, Cybersecurity Programs & Executive Director
CompTIA
MODERATOR
Eric Bang
Senior Sales Engineer
Ionix
Christopher Hills
Chief Security Strategist
BeyondTrust
Stefan Nobbe
Sales Engineering Director, PLS
Rubrik
Gregory Lewis
VP of Sales, East
Stellar Cyber
James Ravenell
Senior Solutions Architect / Active Directory Engineer
Semperis
1:55-2:15 EST
In this presentation, we will delve into the fascinating world of artificial intelligence (AI). Join me as we explore AI, examine its historical development, and current applications, and discuss the potential impact and ethical considerations of AI in the future.
Artificial intelligence has come a long way since its early beginnings. From the first AI programs in the 1950s to the development of expert systems in the 1980s, we will explore the breakthroughs that have shaped the field of AI. Discover how these advancements laid the foundation for the sophisticated AI technologies we use today. Hear how Check Point is, and has been, leveraging AI and the new tools we are developing to fight fire with fire.
AI technologies such as machine learning, natural language processing, and computer vision are constantly evolving. Learn about where to find the latest breakthroughs in AI research and development, including deep learning algorithms, neural networks, and robotics. These cutting-edge innovations in AI are changing the way we live and work.
The history of AI, the current state of the technology, and the potential future impact are all evidence of the incredible journey we are on. Join me for this fun, informative presentation.
2:15-2:35 EST
This session will offer an in-depth look into optimizing offensive security practices, drawing on insights gathered from over 80,000 pentests conducted through the NodeZero™ platform. Offensive security is essential for proactively identifying vulnerabilities, yet experience shows that traditional approaches often leave organizations with gaps that impact assessment accuracy and risk prioritization. Exploring these recurring gaps, sharing strategies to enhance security programs, and leveraging real-world data from NodeZero’s extensive pentesting scenarios, we will illustrate how shifting from basic vulnerability detection to a data-driven, proof-based approach can deliver more actionable insights into an organization’s security posture.
2:35-2:55 EST
Hear from Jordan Benzing about how to secure your environment from third party software threats. This session will provide interesting statistics on the current threat landscape and demo an efficient methodology for your team to start remediating vulnerabilities rapidly.
2:55-3:20 EST
3:20-3:50 EST
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it?
Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats. Can proper data governance, risk management (including managing 3rd party risk and supply chain risk) and compliance provide a framework to always being ready?
Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
3:50-4:10 EST
Hughes’ Global Director Cybersecurity Operations, Dave Henning, will delve into 5G security and IOT device protection for organizations of every size, to include multi-site locations.
4:10-4:30 EST
In the cloud era, time is security’s ultimate adversary. Your developers, IAM specialists and security teams face a relentless challenge – only minutes each day to manage a continuous flood of risk exposures and investigate and respond to a deluge of potential threats. Fragmented and siloed security tools leave teams in the dark, lacking the visibility and context needed to focus on what truly matters. Combining data from these disparate tools to gain crucial insights is both complex and time-consuming. Join us to see how a unified approach to cloud security can dramatically increase effectiveness and deliver exceptional results. Discover how runtime visibility empowers teams to prioritize vulnerabilities more effectively. Uncover why user activity is key to reducing identity risk quickly. Learn what security teams need to rapidly assess the impact of active threats, and how everyone can make the biggest security impact in the shortest amount of time.
4:30-4:50 EST
Cyber risk isn’t just a technical problem but a strategic one. Through Cyber Risk Quantification CISO’s are enabled to quantify the financial benefit of their cyber security strategy and are empowered to communicate with the Executive Board on eye-level and get the buy-in that you need. Join this session to learn how other companies are finally getting full transparency on their cyber exposure, ensuring not only they’re making the right investments in cyber security but also getting the right ROI of such investments.
Key Takeaways:
4:50-5:20 EST
5:20-6:00 EST
The Cybersecurity Summit will be giving away an InfoSec world VIP pass during the cocktail reception to one lucky winner (a $2,400 value).
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Franki Rosenthal at Franki.Rosenthal@CyberRiskAlliance.com or call at (954) 560-7327.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |