Supervisory Special Agent
The FBI
Upcoming Summits
Tuesday, September 25, 2018 | 7:45AM to 6:00PM | New York Hilton Midtown
The annual Cyber Security Summit: New York connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Tuesday, September 25, 2018 | 7:45AM to 6:00PM | New York Hilton Midtown
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
Presented by Stephen Fullington, Supervisory Special Agent, The FBI
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch so much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to these threats that are already inside the network - before they turn into a full-blown crisis.
Self-learning systems represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world, and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life,’. They can therefore spot abnormal activity as it emerges and even take precise, measured actions to automatically curb the threat.
Discover why autonomous response and machine learning is the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
In this session, learn:
Presented by Andrew Tsonchev, Director of Technology, Darktrace
Powered by unsupervised machine learning and AI algorithms, Enterprise Immune System technology is capable of learning the ‘self’ of an organization, by building a ‘pattern of life’ for every device, user, and network. This self-configuring, self-learning system detects and responds to emerging threats as they arise, regardless of threat vector, and without rules, signatures, or prior assumptions about what ‘bad’ is.
From IoT compromises and ransomware, to trust attacks and targeted campaigns, the Enterprise Immune System identifies all types of anomalous activities, across the enterprise, cloud, network, or industrial control systems – in real time. Discover real-world examples from Darktrace’s Enterprise Immune System.
Presented by Andrew Tsonchev, Director of Technology, Darktrace
There is no shortage of high profile, well-funded brands that have become victims of cyber-attacks. As long as network and security teams operate as independent silos with separate workflows, bad actors will have the upper hand. Although NetOps and SecOps share responsibility for user experience, business alignment, and risk management, they rarely share data in real time. This session will explore how creating a unified network and security intelligence data lake will lower operational expense, reduce product overlap, and identify threats much earlier in the kill chain process.
Presented by Bob Noel, Director Strategic Partnerships, Plixer
Fact: A 2018 report researched by PwC interviewed 9,500 executives from 122 countries revealed that 54% do not have an incident response plan and 44% did not have an overall info security strategy. That indicates that the future of successful cyber attacks is inevitable. This panel discusses “Security Orchestration” which unites the security teams or “human element” with pre-existing automated tools and processes around security incidents. Effective alerts, automated incident response actions with solutions that integrate & communicate with each other can all assist in making sense of the breach and respond in an orchestrated fashion. A proper plan also includes a communication process incorporating the legal, law enforcement, insurance and public relations team. Today’s CISO needs to anticipate, and predict how the security challenges of the future may affect the business and be able to articulate that to the board along with eventually disseminating the breach to the media & public.
Moderated by Kathryn Condello, Sr. Director, National Security / Emergency Preparedness, CenturyLinkCompetent CISOs are in high demand. How do you become appointed to the position of the CISO. The skills that got you to the CISO position will not keep you there for long. Successful CISOs know how to lead a security and risk management organization that is well regarded and proficient in a number of areas. Dealing with ever increasing and sophisticated attacks, oversight by the Board of Directors, balancing threats versus compliance requirements, thought leadership, enabling digital transformation strategies, and more. There is a way to not just survive but thrive.
Presented by Kathryn Condello, Sr. Director, National Security / Emergency Preparedness, CenturyLink
Cyber criminals are constantly upgrading their technology to perform more sophisticated, widespread attacks. Preventing breaches and account takeover begins with understanding how criminals operate. This presentation will guide guests through the criminal’s timeline and methods, as well as explain why existing prevention products aren’t providing the protection organizations think. Learn how law enforcement hunts threat actors and how their tactics can be applied to corporate protection.
Presented by Ted Ross, CEO, SpyCloud
The transition from legacy data centers to hybrid environments brings an array of usability, visibility and protection challenges as users connect to applications and resources across network, cloud and SaaS domains. With accelerated demands to support a mobile workforce and consumerization of IT, “trust but verify” controls are crucial to mitigate malware, data privacy, breach and IoT threats. How can anytime, anywhere access be seamless while ensuring consistent policy and protection capabilities. Whether your business is fully cloud invested or going on a per app and business case, this session will explore:
Presented by Scott Gordon, CMO, Pulse Secure
Ransomware sales have increased by over 1,400% over the last two years. The impact of ransomware, destructive malware and related attacks is growing globally as the statistics illustrate. This panel addresses the question of whether your company should pay the cyber criminals with the fact that you may not retrieve your data regardless. Best practices including continually backing up your critical files to multiple locations including the cloud, the use of decryption tools when your assets are held for ransom, keeping your security software up to date and training the employees about the dangers of opening the wrong attachment or link.
Moderated by Erik Tomasi, President, SIM NY Metro Chapter; Chief Operating Officer DTG Consulting Solutions
Work smart and stay safe with proactive protections, granular policy controls and continuous vulnerability management from Google Chrome Enterprise. Chrome OS, browser and devices work together to reinforce security, while system-wide auto-updates future-proof your business.
Presented by Jeff Jagoda, Solutions Consultant, Google
With 90% of organizations feeling vulnerable to insider attacks and a majority of organizations confirming insider attacks against their organizations in the past 12 months, insider threat proves to be even more virulent than malicious attacks by actors beyond your network walls. On your payroll in one way or another, these dissatisfied employees, corporate spies and the like, have the means to harm your business. These insiders also have the ability to cause harm without meaning to! This panel will enlighten you on what insider threat & corporate espionage put at risk in your business. You will learn how identify threats inside your business (malicious and accidental) and leave with strong takeaways that will allow you to fortify your company defenses.
Moderated by Sean Brehm, President & CEO, @RISK Technologies, Inc.
Presented by Matt Lemon, Partner, IBM Security
Tuesday, September 25, 2018 | 7:45AM to 6:00PM | New York Hilton Midtown
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
Tuesday, September 25, 2018 | 7:45AM to 6:00PM | New York Hilton Midtown
The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
Tuesday, September 25, 2018 | 7:45AM to 6:00PM | New York Hilton Midtown
The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Bradford Rand at BRand@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |