Upcoming Summits
The mission of the Cyber Security Summit is to provide a forum to discuss and share the latest in cyber security threats & solutions with renowned experts from around the globe. Below is content from our past Cyber Security Summit presentations and is updated monthly.
Security Content Sharing
Leveraging our experience built over the years and our technological capabilities, Oracle is committed to help customers implement a strategy designed to address GDPR security compliance. This whitepaper explains how Oracle Security solutions can be used to help implement a security framework that addresses GDPR.
Read more >Security Content Sharing
Data science is an encompassing category. It includes big data, advanced analytics and predictive computing, and knowledge management, along with information-sharing via convergence to common smart platforms. Collaborative investment and information-sharing between government and private stakeholders will exponentially benefit innovation and data informatics in many key areas including homeland/national security, health and human services, public ...
Read more >Security Content Sharing
Just about everyone knows about Google’s file sharing options. Google Drive, Google Docs, and Gmail have become mainstays of the industry with millions of users across their sharing apps, and for a good reason. Google’s offerings are simple-to-use, reliable, and make getting your files to recipients for instant collaboration a breeze.
Read more >Security Content Sharing
Loosely defined, the Internet of Things (IoT) refers to the general idea of things that are readable, recognizable, locatable, addressable, and/or controllable via the Internet. It encompasses devices, sensors, people, data, and machines. As broad as the definition of IoT are the cybersecurity challenges that pose a threat to anything and everyone connected. A well ...
Read more >Security Content Sharing
The Cyber Security Summit is partnering with the Journal of Law and Cyber Warfare to offer 60% off the current issue of the Journal.
Read more >Security Content Sharing
Ironically Warren Buffet recently stated that “I don’t know that much about cyber, but I do think that’s the number one problem with mankind.” He is right. Cybersecurity is a preeminent threat. What is being called the largest ransomware attack is being described as a real wakeup call y many cybersecurity experts and government officials. The ...
Read more >Security Content Sharing
Phishing and spoofing are somewhat synonymous in that they refer to forged or faked electronic documents. Spoofing generally refers to the dissemination of email which is forged to appear as though it was sent by someone other than the actual source. Phishing, often utilized in conjunction with a spoofed email, is the act of sending ...
Read more >Security Content Sharing
Ransomware is a form of malware that targets both human and technical weaknesses in organizations and individual networks in an effort to deny the availability of critical data and systems. Ransomware is frequently delivered through spear phishing e-mails to end users. When the victim organization determines they are no longer able to access their data, ...
Read more >Security Content Sharing
Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The E-mail Account Compromise (EAC) component of BEC targets individuals that perform wire transfer payments.
Read more >Security Content Sharing
By Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint. Presented at the Cyber Security Summit: Dallas – May 5, 2017
Read more >Charlotte
October 4, 2023
Cyber Security Healthcare & Pharma Summit
October 20, 2023
Columbus
October 27, 2023
Scottsdale
November 1, 2023
Dallas
November 10, 2023
Boston
November 14, 2023
New York
November 17, 2023
Critical Infrastructure Cyber Security Summit
November 28, 2023
Los Angeles
November 30, 2023
Jacksonville
December 6, 2023
Houston
December 7, 2023
Finance & Risk Summit
December 13, 2023
Tampa
January 26, 2024
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |