Upcoming Summits
By Invitation Only
Admission is for C-Suite Senior Level Executives.
Sales/Marketing Professionals & Students are not permitted.
Admission is non-transferable without permission.
Complimentary Admission
To speak or sponsor at an upcoming Power Hour, contact BRand@CyberSummitUSA.com
Senior Level Executives are invited to participate in the Virtual Cyber Summit Power Hour West Edition. During these unprecedented times, it is more important than ever for business leaders to have a clear and well thought-out cyber security battle plan. Join us and learn from Leading Industry Experts from U.S. DHS, Duo Security and Check Point Software Technologies as they discuss how to navigate the latest security challenges in today’s threat landscape and solutions to implement to protect your company from attacks. Live Q&A will follow each presentation.
Lee Psinakis
Cloud Security Sales Specialist
lpsinaki@checkpoint.comCybersecurity and Infrastructure Security Agency
CyberAdvisor@cisa.dhs.govKristin Judge
CEO/President
Cybercrime Support Network
Grant Asplund
Chief Cyber Security Evangelist
Check Point Software Technologies
Ron Ford
Regional Cybersecurity Advisor, New England, Cybersecurity and Infrastructure Security Agency
U.S. Department of Homeland Security
The impact of cybercrime on the economy, personal lives, and our critical infrastructure is growing exponentially each year. Loss estimates are in the trillions worldwide. Two questions are not being addressed on a national level in the U.S. First, where does a consumer or small business call to report a crime and get help? And, what coordinated resources are available from federal, state and local law enforcement and consumer protection agencies? The Cybercrime Support Network (CSN) is providing a voice for the victims and building a national program to improve victim services and response for consumers and small businesses.
Kristin Judge
CEO/President, Cybercrime Support Network
Washtenaw County Commissioner;
Former Director of Government Affairs, National Cyber Security Alliance
Security breaches pervade the headlines. What was seen as a rare instance just 5 years ago now seems to occupy the daily news cycle. A lot of these data breaches are made possible due to missteps and misconfigurations. There are many security issues that are introduced into website authentication mechanisms that further compound the security issues in addition to enforcing bad behavior by the end users. Security debt is a real problem for the vast majority of organizations in the world today and the attackers will utilize this to their advantage. In addition to keeping system hygiene at front of mind defenders need to focus on proper network zone segmentation or, as it more popular term these days, zero trust networks. The old conceptual style of a castle wall and moat to defend a network was deprecated several years ago. As a result of the dissolution of the traditional perimeter a stronger focus has to be placed on the strength of authentication, authorization and trust models for the users.
The antiquated notion of an information security practitioner running through the office brandishing their flaming sword of justice above their heads screaming “thou shall not pass” has at long last reached the denouement. Whether you are responsible for the security in a financial organization or one that makes teddy bears it is necessary to adapt and learn to trust but, verify.
Dave Lewis
Advisory CISO, Global
Duo Security, now part of Cisco
Using public clouds for enterprise datacenters is now mainstream; the advantages are significant and the gained agility undisputable. However, the number of services and options being offered is daunting. And, with these choices come consequences; one misconfiguration can put your entire organization at risk…or worse.
Another reality you will face as you scale is the challenge of using a ‘one-size-fits-all’ interface. Imagine scrolling through lists of assets when the numbers are in the hundreds or even thousands. Just imagine trying to find a misconfigured or exposed S3 bucket when you have thousands; it’s finding a needle in a stack of needles.
And, if you’re like most enterprises, you have a resource gap and don’t have the experienced, trained security professionals maintaining your cloud environment(s). This gap exacerbates risks. The cloud environments available today are extremely comprehensive and powerful, but in unskilled hands, one fat-finger can have dire consequences. And, as you implement ephemeral cloud-native services like Lambda functions and other cloud-native platform components, new challenges will arise when conducting threat-detection and attribution.
In this session you’ll see your future and what to expect managing your public cloud-based datacenter. You’ll learn why Gartner says, “Through 2023, at least 99% of cloud security failures will be the customer’s fault.” We will highlight the top challenges you will face and show you what you should prepare for before you scale. We will also detail recommended best practices for securing and maintaining compliance in your public cloud data center.
Grant Asplund
Chief Cyber Security Evangelist
Check Point Software Technologies
Ron Ford
Regional Cybersecurity Advisor, New England, Cybersecurity and Infrastructure Security Agency
U.S. Department of Homeland Security
QUESTIONS
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223
Privacy: Your contact information is kept confidential and will not be shared with any third parties. By participating in this Power Hour you agree that you may be contacted by just the two cyber companies presenting their research & expertise. If you would not like to receive any follow up correspondence from the webcast’s presenters, simply email NMathew@CyberSummitUSA.com or call her at 212.655.4505 ext 225 and we will remove your information. We look forward to having you join us.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |