Global Investigations Manager, Investigative Response
Verizon
Tuesday, October 16, 2018 | 7:45AM to 6:00PM | Renaissance Phoenix Downtown
The inaugural Cyber Security Summit: Phoenix connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Tuesday, October 16, 2018 | 7:45AM to 6:00PM | Renaissance Phoenix Downtown
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
Presented by Martin Hellmer, Supervisory Special Agent, The FBI
Enterprises are navigating the perfect storm of digital convergence, struggling to enable digitization across every area of their business while also maintaining a secure environment. The attack surface has expanded, increasing internal/external pressure and security program complexity, while making it nearly impossible to prove return on investment or effectively quantify actual mitigation of risk.
Presented by David Ostertag, Global Investigations Manager, Investigative Response, Verizon
Security experts agree that you can never achieve zero risk, so in a world of limited resources there are always tradeoffs to be made. In today’s world the key question is not, do we have a security program. It’s do we have a security program that actually reduces our risk? For example, can I link my SOC activity back to my business risks? Learn what other questions you should be asking, and hear why risk quantification and threat modeling are critical components of your multi-layered security strategy. We’ll also discuss the journey to cyber resilience in the age of FUD.
Presented by Bindu Sundaresan, Strategic Security Solutions Practice Lead, AT&T Cybersecurity Solutions
Specifically, “Network Consensus” synchronizes existing security products using: netflow and packet capture techniques, Dark Web Queries, and Attack Avenue testing in conjunction with IBM Watson’s Machine Learning and Cognitive Computing capabilities. The result is a real-time “situational awareness” for executives, managers and technical staff that provides a single view of the enterprise’s cyber security status and is measured through a balance scorecard.The benefits of automating Post Incident Digital Forensic Investigation (DFI) and its reuse for Pre-Incident Discovery will also be discussed. The objective of the session is to demonstrate how to transform an organization’s security and risk posture, to one that is predictive, preemptive and adaptive, in order to maximize cyber defenses and minimize risk.
Fact: A 2018 report researched by PwC interviewed 9,500 executives from 122 countries revealed that 54% do not have an incident response plan and 44% did not have an overall info security strategy. That indicates that the future of successful cyber attacks is inevitable. This panel discusses “Security Orchestration” which unites the security teams or “human element” with pre-existing automated tools and processes around security incidents. Effective alerts, automated incident response actions with solutions that integrate & communicate with each other can all assist in making sense of the breach and respond in an orchestrated fashion. A proper plan also includes a communication process incorporating the legal, law enforcement, insurance and public relations team. Today’s CISO needs to anticipate, and predict how the security challenges of the future may affect the business and be able to articulate that to the board along with eventually disseminating the breach to the media & public.
Moderated by Mike Smith, Senior Director, Security Solutions, CenturyLink
Cyber threats are becoming more pervasive, invasive, and sophisticated. While traditional risk management practices are vitally important, new tools and techniques can greatly improve the efficacy of risk assessments and the treatment of risks they identify. One rapidly evolving capability is the use of threat intelligence tools to identify at-risk systems and networks. But not all threat intelligence tools are the same. In his discussion, Mike describes how to turn tactical threat data into a powerful threat management capability.
Presented by Mike Smith, Senior Director, Security Solutions, CenturyLink
Ransomware sales have increased by over 1,400% over the last two years. The impact of ransomware, destructive malware and related attacks is growing globally as the statistics illustrate. This panel addresses the question of whether your company should pay the cyber criminals with the fact that you may not retrieve your data regardless. Best practices including continually backing up your critical files to multiple locations including the cloud, the use of decryption tools when your assets are held for ransom, keeping your security software up to date and training the employees about the dangers of opening the wrong attachment or link.
Moderated by Ryan Spelman, Senior Director, Center for Internet Security
The cyber-threat landscape is changing. In addition to high-speed attacks, today’s most sophisticated threat-actors are playing a longer game – one that is silent and stealthy. Their objective is to disrupt operations, undermine trust, or simply learn trade secrets by going undetected inside networks.
Digital environments are changing too. Increasing digitization, the surge of IoT devices, and the cloud mean that network boundaries are more porous than ever. Securing the perimeter simply isn’t possible.
To defend against threats that are continually evolving, tomorrow’s cyber security must go beyond looking for yesterday’s attacker – it must find what it doesn’t know to look for. AI technologies have led to the emergence of self-learning, self-defending networks that achieve this – detecting and autonomously responding to in-progress attacks in real time. These cyber immune systems enable the security team to focus on high-value tasks, can counter even machine-speed threats, and work in all environments, including the cloud.
In this session, learn about:
Presented by Tommy Nguyen, Cyber Security Executive, Darktrace
With 90% of organizations feeling vulnerable to insider attacks and a majority of organizations confirming insider attacks against their organizations in the past 12 months, insider threat proves to be even more virulent than malicious attacks by actors beyond your network walls. On your payroll in one way or another, these dissatisfied employees, corporate spies and the like, have the means to harm your business. These insiders also have the ability to cause harm without meaning to! This panel will enlighten you on what insider threat & corporate espionage put at risk in your business. You will learn how identify threats inside your business (malicious and accidental) and leave with strong takeaways that will allow you to fortify your company defenses.
Moderated by Kent Warren, Senior Vice President, @RISK Technologies
Tuesday, October 16, 2018 | 7:45AM to 6:00PM | Renaissance Phoenix Downtown
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
Tuesday, October 16, 2018 | 7:45AM to 6:00PM | Renaissance Phoenix Downtown
The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
Tuesday, October 16, 2018 | 7:45AM to 6:00PM | Renaissance Phoenix Downtown
The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Bradford Rand at BRand@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |