The mission of the Cyber Security Summit is to provide a forum to discuss and share the latest in cyber security threats & solutions with renowned experts from around the globe. Below is content from our past Cyber Security Summit presentations and is updated monthly.
Security Content Sharing
Just about everyone knows about Google’s file sharing options. Google Drive, Google Docs, and Gmail have become mainstays of the industry with millions of users across their sharing apps, and for a good reason. Google’s offerings are simple-to-use, reliable, and make getting your files to recipients for instant collaboration a breeze.
Read more >Security Content Sharing
Loosely defined, the Internet of Things (IoT) refers to the general idea of things that are readable, recognizable, locatable, addressable, and/or controllable via the Internet. It encompasses devices, sensors, people, data, and machines. As broad as the definition of IoT are the cybersecurity challenges that pose a threat to anything and everyone connected. A well ...
Read more >Security Content Sharing
The Cyber Security Summit is partnering with the Journal of Law and Cyber Warfare to offer 60% off the current issue of the Journal.
Read more >Security Content Sharing
Ironically Warren Buffet recently stated that “I don’t know that much about cyber, but I do think that’s the number one problem with mankind.” He is right. Cybersecurity is a preeminent threat. What is being called the largest ransomware attack is being described as a real wakeup call y many cybersecurity experts and government officials. The ...
Read more >Security Content Sharing
Phishing and spoofing are somewhat synonymous in that they refer to forged or faked electronic documents. Spoofing generally refers to the dissemination of email which is forged to appear as though it was sent by someone other than the actual source. Phishing, often utilized in conjunction with a spoofed email, is the act of sending ...
Read more >Security Content Sharing
Ransomware is a form of malware that targets both human and technical weaknesses in organizations and individual networks in an effort to deny the availability of critical data and systems. Ransomware is frequently delivered through spear phishing e-mails to end users. When the victim organization determines they are no longer able to access their data, ...
Read more >Security Content Sharing
Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The E-mail Account Compromise (EAC) component of BEC targets individuals that perform wire transfer payments.
Read more >Security Content Sharing
By Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint. Presented at the Cyber Security Summit: Dallas – May 5, 2017
Read more >Security Content Sharing
By Arlette Hart, CISO, FBI. Presented at the Cyber Security Summit: Atlanta – April 6, 2017
Read more >Security Content Sharing
Interview with Samir Shah, CEO, Cyberinc. We formed Cyberinc by combining Aurionpro’s Enterprise Security Division, that focused on providing IAM solutions with Spikes Security, a Silicon Valley startup that created first web malware isolation product. Combined subsidiary, Cyberinc, thus helps address two key challenges that CIOs today face – 1. Who has access to what at ...
Read more >Tampa
March 18, 2021
San Diego
April 7, 2021
Denver
April 14, 2021
Nashville
May 6, 2021
Dallas
May 13, 2021
Silicon Valley
June 9, 2021
Seattle / Portland
June 23, 2021
Philadelphia
June 29, 2021
St Louis / Oklahoma City
July 7, 2021
Detroit
July 14, 2021
DC Metro
July 21, 2021
Chicago
August 24, 2021
Miami / South Florida
September 16, 2021
Charlotte
September 23, 2021
Columbus
September 30, 2021
Scottsdale
October 13, 2021
New York
October 20, 2021
Los Angeles
October 27, 2021
Boston
November 17, 2021
Houston / San Antonio
December 2, 2021
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.