Growth Technologies Evangelist,
Check Point Software Technologies
Upcoming Summits
Cyber Security Summit
8 CPE/CEUs with full attendance
In-Person & Virtual Summit
Tue, July 19, 2022
7:30AM - 6:00PM EDT
Marriott Philadelphia Downtown
Grand Ballroom
1201 Market St
Philadelphia, PA, 19107
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The Fourth Annual Philadelphia Cyber Security Summit returns In-Person and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Securing the Hybrid & Remote Workforce
This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our Industry Experts will discuss best-practices on how businesses and their IT Security Teams should address risks such as insider threat, phishing, unsecured devices and lack of training.
Securing the Cloud
This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.
Ransomware and Resiliency – To Trust or Not Trust?
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Our lineup of Industry Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting the latter can help companies stay resilient as ransomware threats continue to grow.
Learn
Our conferences have been rated as one of The Top 5 InfoSec Conferences Worldwide for the last 4 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Flexibility
Our mission is to bring the Cyber Summit experience to as many executives as possible. In 2022, all attendees have the option of attending either in-person to engage face-to-face with leading solution providers or virtually from the comfort of your own home/office. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:00 EDT
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:00-8:30 EDT
The session will discuss the state of cybersecurity in 2022, an overview of cybersecurity resilience, and suggested first steps for achieving cyber resilience in your organization
The world is becoming progressively digital and interconnected, contributing to a nation that is increasingly vulnerable to cyberattacks and cyber disruptions. While you can never fully predict exactly when an cyber incident might occur or how it will impact our nation, we can better anticipate, identify, and contain those incidents. The way forward is shifting the focus from cybersecurity to cyber resiliency. This session will outline the voluntarily and no-cost services offered by CISA to critical infrastructure owners and operators.
8:30-9:15 EDT
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Chris Thomas to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
8:30-9:15 EDT
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Director of Analysis, Brianna Leddy, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
· Topic for this session– Autonomous Response –
· Explore today’s threats and challenges
· How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
9:15-9:50 EDT
Now more than ever, security has to be top of mind for IT and security teams. Cybercrime is up 600% due to the COVID-19 pandemic, and remote work has increased the average cost of a data breach by $137,000. IT teams need to make sure every piece of their tech stack helps support their security needs. And that starts with the browser, a key component of end user productivity. Hear from the Chrome team on how to improve your security posture with Chrome.
9:50-10:15 EDT
9:50-10:15 EDT
Let’s face it: cyberattackers have the advantage. The recent string of advanced campaigns, including those launched against SolarWinds, Colonial Pipeline, and JBL, have made this reality painfully clear for most enterprises. With threats persisting inside the network for months, security teams need a new plan. In this session, we will discuss strategies, including revising existing mental models and incident response processes, to build resilience and reclaim the advantage in the fight against advanced threats.
10:15-10:35 EDT
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
10:35-10:55 EDT
Hacking is a business opportunity and “business is good.” Cybersecurity is everywhere, so how do the hackers continue being successful? It’s because hackers have evolved into a full-time industry – one with supply chains, processes, and goals. In this session, we’ll stop thinking like defenders and put on our hacker hats. We will spend some time learning about the hacking “industry” and an unlikely source to help build your defenses.
10:55-11:40 EDT
Cloud innovations continue to drive the rapid adoption of cloud services, which offer numerous advantages such as increased flexibility, better scalability, cost savings, higher productivity, and resiliency. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches.
This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.
Cheryl Flannery
Security Operations Product Owner & Programs Head
Cloud Security Alliance (CSA) Delaware Valley Chapter
MODERATOR
Arick Goomanovsky
Co-Founder and Chief Business Officer
Ermetic
Brad Dausses
Enterprise Solutions Engineer
Wiz
Jasmine Henry
Field Security Director
JupiterOne
Jason Meurer
Cloud Security Specialist
SentinelOne
Tim Woods
VP Technology Alliances
Firemon
Mike Lefebvre
Cybersecurity Director
SEI Sphere
11:40-12:05 EDT
Security operations have, like so many things in the security industry, moved into what many consider to be a commoditized, outsourced model in order to combat cost, staffing shortages, and an increased focus on business-driven functions by internal security teams. That said, the basics of content, capability, and prioritized response still matter, but communicating and operating around those topics with partners can be incredibly difficult. Without them, any outsourced programs become one-size-fits-all approaches of dubious value.
In this discussion, we will review the five pillars of crucial capabilities that organizations should pursue to drive differentiation while improving security operations
12:05-12:30 EDT
The connections and dependencies between organizations and their employees, partners, suppliers and customers, creates significant opportunities for risk blind spots. Faced with supply chain disruptions and increasing cyber threats, businesses are re-assessing how they select, evaluate and monitor their third party relationships and the risk they introduce. According to a recent study by KPMG, third-party risk management is a strategic priority for 85 percent of businesses.
How you identify and manage the risks of working with third parties is critical because your compliance, revenue, and company reputation are dependent on all parties fulfilling their contractual, security and privacy obligations. Yet, traditional approaches are inadequate and gaining the right visibility to effectively manage risk is increasingly challenging.
Join Reciprocity experts as we share and discuss with you:
You will leave this session with a clear understanding of steps you can take to better avoid, manage and mitigate third party risk to protect your operations, reputation and revenue.
12:30-1:05 EDT
1:05-1:30 EDT
1:30-1:55 EDT
The latest Malwarebytes threat research reveals how hackers breach hybrid workforces and perpetrate ransomware attacks every 11 seconds, using a combo attack of phishing, brute force attacks, and vulnerability exploits. In this presentation, our Head of Malwarebytes Labs details the latest attack vectors and trends, shares how to survive the hackers and threats, while also addressing employees’ “fear fatigue.”
1:30-1:55 EDT
The latest Malwarebytes threat research reveals how hackers breach hybrid workforces and perpetrate ransomware attacks every 11 seconds, using a combo attack of phishing, brute force attacks, and vulnerability exploits. In this presentation, our Head of Malwarebytes Labs details the latest attack vectors and trends, shares how to survive the hackers and threats, while also addressing employees’ “fear fatigue.”
1:55-2:20 EDT
2:20-3:05 EDT
As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture.
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.
Stacey Wright
VP of Cyber Resiliency Services
Cybercrime Support Network
MODERATOR
Justin Baryza
Channel Sales Engineering & Technical Enablement - North America
Pentera
Allan Liska
Solutions Architect
Recorded Future
Romanus Prabhu
Head of Global Support
ManageEngine UEM
Sig Murphy
Senior Director, Professional Services
BlackBerry
Jay Spann
Security Automation Evangelist
Swimlane
Brian Vecci
Field CTO
Varonis
3:05-3:20 EDT
3:20-3:45 EDT
Cybersecurity can be a complex operation, but at its core, it’s made up of two components: people and technology. Although we’ve seen incredible advances in the technology side of things, we need to ensure that that technology acquisition doesn’t amount to another ‘shiny thing’ but empowers the people that operate it. Join Lumu’s Jeffrey Wheat as he shares his vision of what makes up an ideal cybersecurity operation.
3:45-4:10 EDT
3:45-4:10 EDT
What are the top security challenges companies experience when migrating, developing and running applications in the public cloud? Our session will review this along with Gartner’s defense-in-depth model for developing a secure cloud architecture.
According to Gartner, through 2025:
99% of cloud security failures will be human error (misconfigurations being most common).
90% of organizations that fail to control public cloud use will inadvertently leak sensitive data.
If you don’t want to be part of these predictions, join us for our presentation. We will help you gain an understanding of best practices for implementing a comprehensive cloud security posture management program and a proven methodology to get there.
4:10-4:55 EDT
As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure.
This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.
Peter Beasley
Executive Director
BUiLT
MODERATOR
Steve Pressman
President & CTO
Alpine Cyber Solutions
Stephen O’Connor
Principal Solution Architect
Thales Cloud Security
John Davies
Principal Pre-Sales Systems Engineer
Arctic Wolf
Jeffrey Carpenter
Director of Product Solutions
ForgeRock
Rob Smith
Cybersecurity Advisor
Proofpoint
Tommy Todd
Vice President of Security
Code42
Nathan Wenzler
Chief Security Strategist
Tenable, Inc.
4:55-5:20 EDT
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.
5:20-6:00 EDT
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance until 5:00PM. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |