The mission of the Cyber Security Summit is to provide a forum to discuss and share the latest in cyber security threats & solutions with renowned experts from around the globe. Below is content from our past Cyber Security Summit presentations and is updated monthly.
Security Content Sharing
Virtually Testing Workshop: Examining Cloud File Storage Incidents Organizational data is rapidly moving to the cloud, but it’s not always intentional. The shift from on-premise data storage to the cloud constitutes a significant challenge and risk to the modern enterprise. The use of cloud file storage applications is on the rise for both consumer and business ...
Read more >Security Content Sharing
How Coronavirus Helps Hackers Get Rich By David Balaban Download Whitepaper » COVID-19, SARS-CoV-2, the 2019 novel coronavirus (2019-nCoV) – these terms have suddenly supplemented everyone’s vocabulary because they all denote the terrifying respiratory illness that’s quickly accelerating around the world. With the total number of confirmed disease cases exceeding 1,450,000 at the time of writing, mankind ...
Read more >Security Content Sharing
Presented at the 2020 Atlanta Cyber Security Summit by Klint Walker, Cyber Security Advisor at the Cybersecurity and Infrastructure Security Agency, U.S. Department of Homeland Security
Read more >Security Content Sharing
Presented by Lee Psinakis, Cloud Security Specialist at Check Point Software Technologies during the Feb. 5th, 2020 Atlanta Cyber Security Summit.
Read more >Security Content Sharing
In looking at the future we must first look to the past. Without a doubt, there will be key cybersecurity focuses from the past five years that will continue into 2020 and beyond. This includes mitigating phishing and ransomware attacks, IoT vulnerabilities, mobile security threats, as well as increasing secure dev ops, and continued migration ...
Read more >Security Content Sharing
Each of the U.S. military services are reorganizing under a banner of information warfare, a subject area that often includes cyber, electronic warfare, signals intelligence and information operations. But, now, the Army’s cyber school is struggling to figure out how — and when — to teach those disciplines. “The big elephant in the room is how ...
Read more >Security Content Sharing
Leaders at U.S. Cyber Command have been working to ensure its staff has the tools and infrastructure necessary to conduct operations separately from the National Security Agency. While specificity surrounding desired and needed tools aren’t always available, contractors told Fifth Domain Cyber Command is pursuing tools to access targets and capabilities that enhance data integration. They ...
Read more >Security Content Sharing
By last October, the Pentagon’s Vulnerability Disclosure Program had processed thousands of loopholes in the Department of Defense’s websites. Then it received a report from Jack Cable. On Oct. 25, Cable, who worked for the Defense Digital Service and was a freshman at Stanford University, reported a problem to the department through the Pentagon’s HackerOne vulnerability disclosure ...
Read more >Security Content Sharing
Presented at the 2019 Charlotte Cyber Security Summit by Todd Rossin. Organizations process and store huge volumes of sensitive information that belong to their customers and employees – from financial information to medical records to personal identifiers, like social security numbers and birthdates. Inadequate controls in IAM processes and technology can lead to breach, involuntary ...
Read more >Security Content Sharing
After the Islamic Republic of Iran shot down an RQ-4 Global Hawk drone June 20, President Donald Trump opted against physical military strikes as retaliation. Instead, multiple news organizations reported the U.S. military quietly conducted cyber operations that targeted computer systems that control Iranian missiles launches and an intelligence organization associated with the Iranian Revolutionary ...
Read more >New York
March 23, 2023
Nashville
April 21, 2023
Dallas
May 2, 2023
Denver
May 18, 2023
Austin
May 25, 2023
Salt Lake City
June 7, 2023
Hartford
June 13, 2023
National Channel & MSSP Cyber Summit
June 15, 2023
Cyber Security Finance & Banking Summit
June 22, 2023
DC Metro
July 20, 2023
Pittsburgh
July 27, 2023
Detroit
August 17, 2023
Chicago
August 24, 2023
Philadelphia
September 13, 2023
Kansas City
September 28, 2023
Cyber Security Healthcare & Pharma Summit
September 29, 2023
Charlotte
October 4, 2023
Critical Infrastructure Cyber Security Summit
October 20, 2023
Columbus
October 27, 2023
Scottsdale
November 1, 2023
Dallas
November 10, 2023
Boston
November 14, 2023
New York
November 17, 2023
Los Angeles
November 30, 2023
Houston
December 7, 2023
Education Cyber Security Summit
December 8, 2023
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |