The mission of the Cyber Security Summit is to provide a forum to discuss and share the latest in cyber security threats & solutions with renowned experts from around the globe. Below is content from our past Cyber Security Summit presentations and is updated monthly.
Security Content Sharing
Extenua CEO, Steve Visconti, told us, “The recent ransomware attack on the city of Atlanta is an ominous development. 2018 looks like it is, unfortunately, going to be THE year of ransomware.” “The blockchain world is also coming to grips with a shocking revelation that could potentially threaten the very existence of the world’s foremost cryptocurrency Bitcoin. Researchers from ...
Read more >Security Content Sharing
Presented at the Cyber Security Summit Atlanta – February 28, 2018 Although fundamentally intertwined, security teams and the rest of the business often struggle to communicate, especially when the topic is risk. Security teams measure this as technical risk, “how vulnerable are we?” The rest of the organization measures this as a business risk, “what will our ...
Read more >Security Content Sharing
Don’t miss Tal Liberman, the enSilo Security Research Team Leader who found AtomBombing, and Eugene Kogan, enSilo Principal Development lead, in “Lost in Transaction: Process Doppelgänging”
Read more >Security Content Sharing
enSilo, the company that protects endpoints pre- and post-infection and stops data breaches in real time, today released high-profile cybersecurity research at Black Hat Europe revealing how cybercriminals can take advantage of Microsoft Windows features to slip malicious ransomware and other threats past most updated, market-leading AV and NGAV security products protecting corporate laptops, servers ...
Read more >Security Content Sharing
enSilo, the company that provides unified endpoint security with NGAV and automated EDR for real-time pre- and post-infection protection, today announced a free audit that will help enterprises determine whether their deployed security products can defeat “Process Doppelgänging” evasions taking advantage of Microsoft Windows features to slip malicious ransomware and other threats past updated, market-leading ...
Read more >Security Content Sharing
Las Vegas was a terrible tragedy and does trigger additional discussion on security, especially for protection of people and saving lives. There is no doubt in my mind more screening in public and private physical entrances and exits will be required and mandated. Other countries, enterprises and communities outside North America are already taking the ...
Read more >Security Content Sharing
Presented at the Cyber Security Summit Boston – November 8, 2017. Brinqa customers are creating a new breed of cyber risk intelligence programs by making vulnerability management a central focus of their efforts. These programs take vulnerability management effectiveness to a new level, by introducing automation at every step of the process – whether it is integration ...
Read more >Security Content Sharing
Presented at the Cyber Security Summit Boston – November 8, 2017. Highly targeted, low volume spear phishing – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today. This is not news. But what may come as a surprise is that ...
Read more >Security Content Sharing
For decades, and as a best practice, companies have purchased point security products in the name of prevention. Today’s growing threat surfaces coupled with the sophistication of attacks has, however, led us to a point where breaches are now inevitable. From the boardroom to the security operations team, organizations must change their mindset away from ...
Read more >Security Content Sharing
Presented at the Cyber Security Summit Boston – November 8, 2017. You have lots of security-related data, and it’s not all created equal. Effective threat hunting and incident response require you to pivot quickly and efficiently between the low- and high-fidelity data that exists across firewalls, intrusion prevention systems, security information event management platforms, flow collectors, ...
Read more >Tampa
March 18, 2021
San Diego
April 7, 2021
Denver
April 14, 2021
Nashville
May 6, 2021
Dallas
May 13, 2021
Silicon Valley
June 9, 2021
Seattle / Portland
June 23, 2021
Philadelphia
June 29, 2021
St Louis / Oklahoma City
July 7, 2021
Detroit
July 14, 2021
DC Metro
July 21, 2021
Chicago
August 24, 2021
Miami / South Florida
September 16, 2021
Charlotte
September 23, 2021
Columbus
September 30, 2021
Scottsdale
October 13, 2021
New York
October 20, 2021
Los Angeles
October 27, 2021
Boston
November 17, 2021
Houston / San Antonio
December 2, 2021
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.