Growth Technologies Evangelist,
Check Point Software Technologies
Upcoming Summits
Cybersecurity Summit
CPE/CEUs with full attendance
In-Person Summit
Fri, December 6, 2024
7:30AM - 5:30PM MST
The Phoenician
Ballroom DEFG
6000 E Camelback Rd
Scottsdale, AZ, 85251
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Nancy.Mathew@CybersecuritySummit.com
or call 212.655.4505 ext. 225
On-Site Parking will be available. Self-parking is complimentary in Lot 3. Please follow the directional signs towards Lot 3.
The Sixth Annual Scottsdale Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Nancy.Mathew@CybersecuritySummit.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30 MST
8:30-9:00 MST
9:00-9:35 MST
Join Keith, Secureworks’ CTU Sr. Security Researcher, as he unveils the blueprint for future-proofing cybersecurity in the face of relentless, opportunistic threat actors. In this keynote, we’ll explore the imperative for organizations to adapt, collaborate, and fortify their tech strategy against the ever-changing threat landscape. By delving into Keith’s expertise, discover how he bridges technical expertise with practical applications, recognizing that threat actors aren’t solely targeting specific industries but are strategically exploiting vulnerabilities in diverse technologies. Gain invaluable insights to empower your cybersecurity approach, ensuring resilience in a landscape where adaptability is not just an option but a necessity.
9:35-10:05 MST
Join Anthony “TonyP” Pillitiere, Co-founder of Horizon3.ai, for an engaging session on “Offense-Driven Defense.” TonyP will challenge conventional risk assessment practices and unveil how emphasizing real-world exploitability and impact can revolutionize your security approach. Drawing from over 80,000 autonomous pentests, he’ll share compelling stories and actionable insights that reveal how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and fortify your defenses against advanced threats. Don’t miss this chance to learn from a leading industry trailblazer on why it’s time to “go hack yourself” to build resilience in today’s borderless threat environment.
10:05-10:30 MST
10:30-11:10 MST
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
11:10-11:30 MST
The median size of internal breaches, measured in the number of compromised records, is much larger than that of their external counterparts. This makes insider threats an immense and pervasive challenge. In this session, we’ll explore how we can detect the personal and technical behavioral signs of an insider threat, how security teams can partner with the business to respond to suspected insider threats, both malicious and accidental, and the importance of a risk-aware culture.
11:30-11:50 MST
In any well sorted vulnerability management program we end up with a lot of data. A temptation is to simply then pass bits of that data along without much context, hoping that it will showcase our effectiveness. This talk is about firstly recognizing the inherent flaws in that approach and then secondly moving towards a better, larger conversation about how we can take that data and then perhaps present it in a more meaningful manner
11:50-12:10 MST
12:10-1:00 MST
1:00-1:30 MST
What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight?
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
1:30-1:50 MST
In this presentation, we will delve into the fascinating world of artificial intelligence (AI). Join me as we explore AI, examine its historical development, and current applications, and discuss the potential impact and ethical considerations of AI in the future.
Artificial intelligence has come a long way since its early beginnings. From the first AI programs in the 1950s to the development of expert systems in the 1980s, we will explore the breakthroughs that have shaped the field of AI. Discover how these advancements laid the foundation for the sophisticated AI technologies we use today. Hear how Check Point is, and has been, leveraging AI and the new tools we are developing to fight fire with fire.
AI technologies such as machine learning, natural language processing, and computer vision are constantly evolving. Learn about where to find the latest breakthroughs in AI research and development, including deep learning algorithms, neural networks, and robotics. These cutting-edge innovations in AI are changing the way we live and work.
The history of AI, the current state of the technology, and the potential future impact are all evidence of the incredible journey we are on. Join me for this fun, informative presentation.
1:50-2:10 MST
In the rapidly evolving landscape of data security, conventional wisdom has often focused on identifying and protecting only sensitive, private, or high-risk data. However, this approach, while adequate for data compliance, overlooks a crucial aspect of comprehensive data protection: the significance of low-risk data. Thales is at the forefront of redefining this paradigm, asserting the vital importance of safeguarding all data including that categorized as ‘low-risk.’
This counterintuitive strategy of prioritizing low-risk data protection is not just a wise allocation of resources, but a pivotal element in a more effective overall data security strategy. It is particularly crucial for safeguarding high-value and regulated data. In this session, we will explore potent, actionable strategies for successful data security programs. So join us to gain essential insights and tools that will revolutionize your approach to data security.
2:10-2:30 MST
In today’s rapidly evolving digital landscape, organizations are struggling with diverse methods of interaction with employees, customers, and partners through a multitude of technologies. This complexity often leads to a lack of control over Identity and Access Management (IAM), leaving organizations vulnerable to security threats and compliance issues. The cost of ignoring the risk can haunt you for years however, you cannot correct what you don’t know, so the first steps are assessing whether your organization is positioned for a successful implementation, migration or fix and, validating the organization is focused on the right path and/or issue they are looking to mitigate. Join us as we demonstrate a proven, 3 stage, IAM Strategic Assessment model that is NIST compliance driven answering the “what, where, when, why and how” surrounding both Workforce Identity & Access Management and Customer Identity & Access Management (CIAM) programs, projects and operations.
2:30-2:50 MST
2:50-3:20 MST
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it?
Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats. Can proper data governance, risk management (including managing 3rd party risk and supply chain risk) and compliance provide a framework to always being ready?
Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
Dara Gibson
President
InfraGard Arizona
MODERATOR
Chad Monteith
Principal Field Solutions Architect
Pure Storage
John Loya
VP Sales Engineering
Cyberhaven
Todd Rossin
CEO & Chief Strategist
TechDemocracy
Amy Chaney
Executive Risk Officer - Cybersecurity, Technology Infrastructure & Multi-Cloud Environments
Huntington National Bank
3:20-3:40 MST
The rapid evolution of cybersecurity threats—driven by global regulations, quantum computing advancements, and the increasing reliance on software—poses unprecedented challenges for organizations. This presentation explores the key forces reshaping the cryptographic landscape, including the pivotal role of the Web-PKI trust ecosystem, the far-reaching implications of regulatory frameworks like the EU Cyber Resilience Act, and the transformative potential of quantum computing.
Join Tim McAllister, Senior Director of Digital Trust at DigiCert, as he shares actionable insights and real-world examples to help organizations navigate these challenges. Topics include:
Learn how automation and proactive planning can enhance certificate management and strengthen your organization’s ability to address cryptographic risks.
3:40-4:00 MST
4:00-4:30 MST
4:30-5:30 MST
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Franki Rosenthal at Franki.Rosenthal@CyberRiskAlliance.com or call at (954) 560-7327.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |