Chief Information Security Officer,
Center for Internet Security
Upcoming Summits
Cyber Security Summit
8 CPE/CEUs with full attendance
In-Person & Virtual Summit
Tue, February 15, 2022
7:30AM - 6:00PM EST
Hilton Tampa Downtown
211 N Tampa St
Tampa, FL, 33602
An event access code will be emailed to all in-person attendees prior to the summit.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The Third Annual Tampa Cyber Security Summit returns In-Person and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Securing the Hybrid & Remote Workforce
This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our Industry Experts will discuss best-practices on how businesses and their IT Security Teams should address risks such as insider threat, phishing, unsecured devices and lack of training.
AI & Machine Learning: What it Means for Today & the Future
This panel will discuss how AI and Machine Learning can be implemented to combat cyber attacks. Our lineup of experts will offer their insight on how AI & Machine learning will continue to advance as well as what this means for the future.
Ransomware and Resiliency – To Trust or Not Trust?
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Our lineup of Industry Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting the latter can help companies stay resilient as ransomware threats continue to grow.
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 4 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Flexibility
Our mission is to bring the Cyber Summit experience to as many executives as possible. In 2022, all attendees have the option of attending either in-person to engage face-to-face with leading solution providers or virtually from the comfort of your own home/office. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:00 EST
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:00-8:30 EST
Cybersecurity has been important since the invention of the internet. In today’s society, with so many people working from home, cybersecurity is even more important. This presentation details recent trends in the world of cybersecurity, including new tactics and techniques bad actors are using, how to identify or recognize cyber attacks, and most importantly how to protect against those attacks.
8:30-9:15 EST
New strains of ransomware are leaving organizations vulnerable – too often, security teams lack the ability to respond proportionately to an attack, leading to cyber disruption across the organization.
Join Brianna Leddy, Darktrace’s Director of Analysis, as she unpacks some of today’s most advanced ransomware threats. Learn how Self-Learning AI understands the organization to reveal every stage of a ransomware attack – and takes targeted, autonomous action to stop the threat in its tracks.
This presentation will discuss:
9:15-9:50 EST
Nothing in security ever stays still, and Zero Trust is no different. While many organizations have begun their journey to zero trust, the elements and opportunities are changing. In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero trust of the future.
9:50-10:15 EST
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
10:15-10:40 EST
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
10:15-10:40 EST
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
10:40-11:25 EST
As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure.
This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.
11:25-11:50 EST
Attacks on Active Directory will continue in 2022, maybe with even more vigor. Now is the time to dig into your AD environment and secure it to withstand these attacks. This means that you must dig deep and wide, to harden AD for even the most advanced attacks. Derek will guide you through what needs to be done immediately, so you can leave this session and get started securing AD. Attackers know what to enumerate AD and what to look for, so Derek will show you exactly what needs to be done ASAP! In this session you will learn:
11:50-12:15 EST
5G is already transforming how businesses operate, from enabling more efficient automation to enhancing product innovation. As business leaders and IT managers evaluate the competitive possibilities of 5G, what do security leaders need to know about this emerging technology? This talk offers some ideas on where to start understanding how security changes in a 5G world.
12:15-12:40 EST
What are the top security challenges companies experience when migrating, developing and running applications in the public cloud? Our session will review this along with Gartner’s defense-in-depth model for developing a secure cloud architecture.
According to Gartner, through 2025:
If you don’t want to be part of these predictions, join us for our presentation. We will help you gain an understanding of best practices for implementing a comprehensive cloud security posture management program and a proven methodology to get there.
12:40-1:25 EST
1:25-1:50 EST
We will examine the approaches to prevent and detect threats with AI, ML, and DL, and dive into how deep learning (DL) provides greater speed and accuracy to stop malware faster than ML. Learn more on the chronology of an unknown attack and why 20ms is the difference between security and a breach.
1:50-2:15 EST
What is XDR, how is it different, and can it actually stop today’s malicious operations? In this special session, Teall Rist, Cybereason Security Engineer will share insights on the latest attacks organizations face, top security operations challenges, and why XDR delivers on the most important metric: Time.
Learn how adversaries have adapted to today’s IT & security stack, as well as key integration points for threat detection and incident response. Includes a look at Cybereason XDR powered by Google Chronicle.
2:15-3:00 EST
Between limited cyber security talent and the sheer amount of data that cyber security teams are responsible for managing, AI & Machine Learning have become vital tools that many businesses have implemented as part of their cyber security plan. Tasks previously done manually by employees can be automated & accomplished without any time constraints, analysis of data amounting far beyond human capability can be done in a matter of seconds, and patterns that may have been missed previously or taken much longer to find can be identified quickly and accurately. This is invaluable in helping detect & respond to attacks, especially as threats continuously change and new threats regularly appear. Offering so many benefits, AI is commonly the first line of defense against cyber attacks.
With its many benefits come certain implications as Artificial Intelligence and Machine Learning continue to become more advanced. What will happen when Artificial Intelligence surpasses that of human intelligence? How are cybercriminals already adapting AL and ML to use for malicious means?
This panel of experts will discuss how AI and Machine Learning can be implemented to predict and combat cybercrime along with its increasing detriments and affects on employment, in addition to these tools advancing beyond human control.
Kathleen Moriarty
Chief Technology Officer
Center for Internet Security
MODERATOR
Ravi Guntur
Head of Machine Learning & Artificial Intelligence
Traceable AI
Justin Fier
Director of Cyber Intelligence & Analytics
Darktrace
Dennis Ross
Assoc. Group Leader in the AI Technology and Systems Group
MIT Lincoln Laboratory
3:00-3:20 EST
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
3:20-3:45 EST
Modern ransomware is not like ransomware of the past. In fact, it’s not even ransomware until it’s too late to prevent significant business impact. The good news is that seeing ransomware before it starts IS both possible and your best line of defense. Please join me as I share how ransomware has changed, how to see it before it starts, and what I predict ransomware will exploit next.
3:45-4:30 EST
As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture.
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.
Sean Atkinson
Chief Information Security Officer
Center for Internet Security
MODERATOR
Andy Stone
CTO - Americas
Pure Storage
Erich Kron
Security Awareness Advocate
KnowBe4
Jason Rivera
Director – Strategic Threat Advisory Group, Global
CrowdStrike
Archana Ragothaman
Sales Engineering Director
ExtraHop
Chris Hass
Director of Information and Security Research
Automox
4:30-5:00 EST
Richard Dean of the U.S. Secret Service will have an interactive discussion covering topics such as the latest trends and threats facing business leadership today.
5:00-6:00 EST
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance until 5:00PM. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |