Resident Agent in Charge, San Jose,
U.S. Secret Service
The second annual Silicon Valley Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Thursday, January 24
7:45AM - 5:30PM
2050 Gateway Pl,
San Jose, CA 95110
*Discounted Rate with the Cyber Summit
The CISO and Senior Leadership’s Best Approach to Cyber Defense
To Pay or Not Pay - That is the Question!
Protecting Your Enterprise from Corporate Espionage
Learn from renowned security experts from around the globe on how to protect your business from cyber attacks during interactive Panels & Round Table discussions.2
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.3
Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.4
Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.5
During the summit, all of your meals, refreshments and snacks are included. We provide a catered breakfast, lunch & cocktail reception for all of the attending delegates for one low price. You may also indulge in complimentary cigars at the conclusion of each event.
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 CPE Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.7
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.8
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment set within a luxury venue.9
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.10
Cyber Crime is the fastest growing threat to businesses globally. Secure your critical infrastructure before it’s too late!
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
Interested in volunteering at the Cyber Security Summit? Please email Lindsay Wess at LWess@CyberSummitUSA.com
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
Agent Bradstreet will discuss the current threat landscape, various criminal case studies of recent breaches, and best practices for your enterprise.
Resident Agent in Charge, San Jose
U.S. Secret Service
AI is sometimes spoken about as something that will, in the future, secure companies’ networks. However, cyber AI has already been deployed by thousands of companies to detect and fight back against increasingly advanced, fast-moving, and stealthy threats. This session will unpack the benefits and challenges of cyber AI. By exploring the advantages of different machine learning approaches and talking about the potential barriers to adoption, this session aims to arm attendees with the knowledge they need to evaluate AI cyber defense for their own organizations.
In this session, learn about:
• AI approaches and algorithms for detecting and responding to threats
• How human teams adopt (or resist) automated defense
• Threats contained by cyber AI, including hacked IoT devices, insider threat, and machine-speed attacks
In this session, expand your understanding of the advantages of cyber AI with a deep dive into real world use cases. Learn how companies are using AI for cyber due diligence, cyber risk insurance, and policy compliance. This session will also include a live demonstration of Darktrace’s Threat Visualizer. Attendees will get to see cyber AI in action and visualize the data breaches and ransomware attacks making headlines.
Principal Client Partner
Verizon Enterprise Solutions
Taking a “best practices” approach to cybersecurity may help you “check the box,” but key stakeholders - - the Board, business unit leaders, customers, regulators, partners and customers -- are demanding more. Companies must now demonstrate a whole new level of cyber-diligence, which means establishing and maintaining true visibility of their security posture and the likelihood of breach. This discussion will explore the intersection of security and enterprise risk, and will reveal how data drives better decision-making about security priorities.
Center for Internet Security
Vice President, Industry Solutions
Director of Product Marketing
Infosec Management Consultant
Sr. Director, Product Management
Chief Technology Officer
Fact: A 2018 report researched by PwC interviewed 9,500 executives from 122 countries revealed that 54% do not have an incident response plan and 44% did not have an overall info security strategy. That indicates that the future of successful cyber attacks is inevitable. This panel discusses “Security Orchestration” which unites the security teams or “human element” with pre-existing automated tools and processes around security incidents. Effective alerts, automated incident response actions with solutions that integrate & communicate with each other can all assist in making sense of the breach and respond in an orchestrated fashion. A proper plan also includes a communication process incorporating the legal, law enforcement, insurance and public relations team along with non-stop internal security training of the entire organization. Today’s CISO needs to anticipate, and predict how the security challenges of the future may affect the business and be able to articulate that to the board along with eventually disseminating the breach to the media & public.
Security leaders have to delicately balance the needs of the Boardroom / C-Suite with the things you need to do as a practitioner to get the job done. Several effective, pragmatic strategies help embed operational efficiency into security operations. Conscious structuring and communication of these efforts will help CISOs and security leads gain support for risk avoidance, risk management, and frugal resource management.
Supervisory Special Agent
Guardian Insight Group
Supervisory Special Agent
Vice President, Product
Check Point Software Technologies
Head of Juniper Threat Labs
SecOps Consulting Engineer
Palo Alto Networks
Ransomware sales have increased by over 1,400% over the last two years. The impact of ransomware, destructive malware and related attacks is growing globally as the statistics illustrate. This panel addresses the question of whether your company should pay the cyber criminals with the fact that you may not retrieve your data regardless. Best practices including continually backing up your critical files to multiple locations including the cloud, the use of decryption tools when your assets are held for ransom, keeping your security software up to date and training the employees about the dangers of opening the wrong attachment or link.
Center for Internet Security
Head of Security & Compliance
Senior Manager InfoSec Training & Awareness
VP of Marketing
Presales Systems Engineer
Sr. Systems Engineer
With 90% of organizations feeling vulnerable to insider attacks and a majority of organizations confirming insider attacks against their organizations in the past 12 months, insider threat proves to be even more virulent than malicious attacks by actors beyond your network walls. On your payroll in one way or another, these dissatisfied employees, corporate spies and the like, have the means to harm your business. These insiders also have the ability to cause harm without meaning to! This panel will enlighten you on what insider threat & corporate espionage put at risk in your business. You will learn how identify threats inside your business (malicious and accidental) and leave with strong takeaways that will allow you to fortify your company defenses.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|