Upcoming Summits
The mission of the Cybersecurity Summit is to provide a forum to discuss and share the latest in cyber security threats & solutions with renowned experts from around the globe. Below is content from our past Cybersecurity Summit presentations and is updated monthly.
Security Content Sharing
enSilo, the company that protects endpoints pre- and post-infection and stops data breaches in real time, today released high-profile cybersecurity research at Black Hat Europe revealing how cybercriminals can take advantage of Microsoft Windows features to slip malicious ransomware and other threats past most updated, market-leading AV and NGAV security products protecting corporate laptops, servers ...
Read more >Security Content Sharing
enSilo, the company that provides unified endpoint security with NGAV and automated EDR for real-time pre- and post-infection protection, today announced a free audit that will help enterprises determine whether their deployed security products can defeat “Process Doppelgänging” evasions taking advantage of Microsoft Windows features to slip malicious ransomware and other threats past updated, market-leading ...
Read more >Security Content Sharing
Presented at the Cyber Security Summit Boston – November 8, 2017. Brinqa customers are creating a new breed of cyber risk intelligence programs by making vulnerability management a central focus of their efforts. These programs take vulnerability management effectiveness to a new level, by introducing automation at every step of the process – whether it is integration ...
Read more >Security Content Sharing
Presented at the Cyber Security Summit Boston – November 8, 2017. Highly targeted, low volume spear phishing – or business email compromise (BEC) – attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organizations face today. This is not news. But what may come as a surprise is that ...
Read more >Security Content Sharing
For decades, and as a best practice, companies have purchased point security products in the name of prevention. Today’s growing threat surfaces coupled with the sophistication of attacks has, however, led us to a point where breaches are now inevitable. From the boardroom to the security operations team, organizations must change their mindset away from ...
Read more >Security Content Sharing
Presented at the Cyber Security Summit Boston – November 8, 2017. You have lots of security-related data, and it’s not all created equal. Effective threat hunting and incident response require you to pivot quickly and efficiently between the low- and high-fidelity data that exists across firewalls, intrusion prevention systems, security information event management platforms, flow collectors, ...
Read more >Security Content Sharing
Presented at the Cyber Security Summit Boston – November 8, 2017. Your organization is valuable, and the cyber criminals know it. Malicious actors constantly attempt to exploit users for privileged access to your enterprise network. Recognizing the anomalous network behavior that occurs when threats breach traditional security architecture is very difficult. Flow and metadata collection from ...
Read more >Security Content Sharing
Cybersecurity is one of the top issues on the minds of management and boards in nearly every company in the world — large and small, public and private. Managing this business issue is especially challenging because even an organization with a highly mature cybersecurity risk management program still has a residual risk that a material ...
Read more >Security Content Sharing
The Cyber Security Summit is partnering with the Journal of Law and Cyber Warfare to offer 60% off the current issue of the Journal. Preview the first two chapters: North Korea: The Cyber Wild Card 2.0 by Rhea Siers Cyber Enhanced Sanction Stratégies: Do Options Exist? By Mark Peters
Read more >Security Content Sharing
Striim enables businesses to achieve a comprehensive view of their potential internal and external vulnerabilities, and deliver a more timely and effective response to real threats.
Read more >Finance & Risk
April 26, 2024
Milwaukee
May 2, 2024
Austin
May 17, 2024
Denver
May 17, 2024
Salt Lake City
June 6, 2024
Healthcare & Pharma
June 13, 2024
Oklahoma City
June 14, 2024
Hartford
June 25, 2024
Pittsburgh
June 27, 2024
Raleigh-Durham
July 16, 2024
DC Metro
July 18, 2024
Toronto
July 25, 2024
St. Louis
August 1, 2024
Detroit
August 20, 2024
Portland
August 22, 2024
San Antonio
August 27, 2024
Chicago
September 6, 2024
Atlanta
September 17, 2024
New York/Wall Street
September 19, 2024
Columbus
September 26, 2024
Philadelphia
September 27, 2024
Charlotte
October 1, 2024
Houston
October 18, 2024
Indianapolis
October 22, 2024
Silicon Valley
October 25, 2024
Boston
October 29, 2024
Critical Infrastructure
November 8, 2024
New York
November 15, 2024
Scottsdale
December 6, 2024
Finance & Risk
December 11, 2024
Jacksonville
December 12, 2024
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |