Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Upcoming Summits
The Fifth Annual Atlanta Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
February 5, 2020
7:30AM - 6:30PM
3300 Peachtree Rd NE
Atlanta, GA 30305
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 3 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
5All Inclusive
During the summit, all of your meals, refreshments and snacks are included. We provide a catered breakfast, lunch & cocktail reception for all of the attending delegates for one low price. You may also indulge in complimentary cigars at the conclusion of each event.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
7Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
8Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment set within a luxury venue.
9Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
10Cyber Crime
Cyber Crime is the fastest growing threat to businesses globally. Secure your critical infrastructure before it’s too late!
QUESTIONS
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
VOLUNTEERING
Interested in volunteering at the Cyber Summit? Please email Samantha@CyberSummitUSA.com
Active Students Only
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:30-9:00
Alan Davis
Special Agent, Electronic Crimes Task Force
U.S. Secret Service, Atlanta Field Office
Todd Renner
Supervisory Special Agent
FBI Atlanta
9:00-9:45
Curtis Walters
Vice President of North America Enterprise Sales
ExtraHop
As enterprises have become increasingly reliant on technology for every aspect of operations, technical executives like CIOs and CISOs have found themselves in a completely new operations center: the boardroom. This shift is more recent for CISOs, who increasingly must demonstrate security and compliance at a board level. This move can present a significant challenge. Board members are often not well-versed in technology or security best practices, let alone jargon. At the same time, CISOs (and CIOs) often lack the business experience to speak in terms that the board can understand, defaulting to technical discussions that the board can’t parse.
This breakdown in communication can have a cascade effect. The board might fail to fully understand the security risks posed by a certain initiative. Or, with the growing number of costly and embarrassing security breaches, they might overemphasize caution and risk mitigation at the expense of implementing important technical advancements.
In this session, attendees will learn strategies for discussing security and technology priorities at the board level.
In addition to providing board-conversation strategies, attendees will also learn how shifting board composition is changing the dynamics on cybersecurity and technology conversations.
10:15-10:40
Dan Fein
Director of Email Security Products
Darktrace
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session.
10:40-11:05
Bobby Conway
Area Director
Centrify
Nick Hunt
Oracle Practice Director
IDMWORKS
Digital business demands seamless user experiences, interoperability among a diverse set of platforms, and near instant access to the right resources at the right time. To accomplish this, digital initiatives rely on a mature, scalable IAM organization for success. This session will arm you with the knowledge you need to deliver identity solutions that are agile and adaptable enough to support new business initiatives and safeguard against new threats as they arise.
11:05-11:35
Sean Atkinson
Chief Information Security Officer
Center for Internet Security
MODERATOR
Eyal Elyashiv
Founder & CEO
Cynamics
Patrick Vowles
North America Product Marketing Manager - Security
IBM Security
Dan Webber
Vice Chairman
SIM Atlanta
Security teams today are being overwhelmed by the massive amounts of data collected by their various protection tools and in most cases, these security teams do not have the budget to hire external Security Operations Center (SOC) analysts. As such, companies are looking to implement an automated response system by using SOAR (Security Orchestration, Automation and Response) tools in an effort to relieve some of the burden on their already understaffed security teams and increase efficiency.
In a recent survey of more than 1,400 IT security professionals, 79% reported that their organization has existing automation tools and platforms in place (29%) or are planning to implement them within the next six months to three years (50%). However, this is not a simple solution for many companies as the successful implementation of automation requires a well-trained and educated team. In fact, 56% of organizations from this same survey indicated that they don’t currently have the in-house expertise required to effectively use these tools. This presents a problem as the shortage of gap between workforce demands and skilled cyber security professionals in the field is larger than ever and steadily increasing. According to another report, it is projected that by 2021, 3.5 million cyber security jobs will be unfilled; that’s a 350% increase in open positions from 2013 to 2021.
This panel will provide an understanding on SOAR tools, the importance on training your security team to understand and leverage these tools to more rapidly detect and respond to threats, and ways to attract and retain talent.
11:35-12:00
Francisco Najera
Principal Security Architect
Blue Hexagon
The collective efforts of attackers have fundamentally changed the cyberdefense game. Today, adversaries are sophisticated, creative and tenacious — launching attacks at unprecedented rates and volumes. Blue Hexagon Chief Strategist Danelle Au will dive into the threat landscape including new attack vectors and how they are delivered. She will present a new approach to detect network threats using deep learning. Deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time. In this session, hear about why advances are possible today and how organizations worldwide are harnessing deep learning address the modern threat landscape.
12:00-12:45
12:45-1:10
David Grady
Security Evangelist
Verizon
Emerging regulations, transformative technologies and a global security-talent shortage is putting extraordinary pressure on security leaders and their teams. It’s hard enough to just keep the “security lights” on,never mind keeping up with – and getting ahead of — all the new security challenges that come with digital transformation. If you can’t do it all, what should you do? This presentation will examine how the ever-expanding role of the CISO is driving the need for better prioritization of available resources, and will help audience-members take a more strategic approach to evaluating alternatives like outsourcing.
1:10-1:35
Patrick Vowles
North America Product Marketing Manager - Security
IBM Security
1:35-2:05
Sean Atkinson
Chief Information Security Officer
Center for Internet Security
MODERATOR
Joe Bennett
Director
Kudelski Security
John Cook
Sr. Pre-Sales Systems Engineer
Arctic Wolf
David Pearson
Head of Threat Research
Awake Security
Achint Sehgal
Global Head of Solutions Engineering
OneTrust Vendorpedia
Brad Tompkins
Solutions Architect
ReliaQuest
Nick Yokum
Sr. Systems Engineer
Code42
According to a recent survey, last year 69% of organizations suffered a data breach caused by an Insider Threat, even with a data loss prevention (DLP) solution in place. While malicious users are a legitimate threat to an organization’s security, another study found that 64% of incidents were a result of human error made by an employee. In fact, 78% of Chief Security Officers confessed that even they have clicked on suspicious links.
These statistics demonstrate that having a DLP solution in place with a centralized IT Security team is not sufficient in protecting company assets. Organizations must also address the human element and provide effective ongoing training and education to all employees within the organization.
This panel will discuss the importance of understanding and detecting the various types of Insider Threats that put your organization at risk, as well as provide insight on how to prepare a prevention and defense strategy against an insider breach.
2:35-3:00
Loren Hudziak
Chrome Customer Engineer
Google
3:00-3:25
Lee Psinakis
Cloud Security Specialist
Check Point Software
Using public clouds for enterprise datacenters has become mainstream and hybrid multi-cloud is the new norm. The advantages of public cloud are significant and the gained agility undisputable. However, securing cloud environments is different from securing traditional data centers and endpoints. One misconfiguration can put your entire organization at risk…or worse. According to Gartner, “Through 2022, at least 95% of cloud security failures will be the customer’s fault.”
The dynamic nature of the cloud requires continuous assessment and automation to avoid misconfigurations, compromises and breaches. It is also difficult to maintain complete visibility of cloud assets across rapidly changing environments, limiting your ability to enforce security standards at scale. On top of these challenges, cloud governance is critical for maintaining corporate and regulatory compliance and security policies as they evolve.
This session will investigate those challenges, and present “6-Steps to Cloud Compliance Automation” that can be used to develop your Cloud Security Posture Management framework, and highlight a Check Point customer who has successfully implemented a more secure and compliant hybrid cloud infrastructure.
3:25-3:50
Scott Giordano
V.P., Data Protection
Spirion
On October 10, 2019, the California Attorney General published regulations for implementing the California Consumer Privacy Act of 2018. While the 24 pages of regulations have provided clarity in several areas, this is very much a work in progress. Just some of the information security areas addressed include verifying consumer requests, transmitting consumer data securely, and use of self-service portals. In this interactive presentation, a data protection industry veteran will offer perspective on the regulations and what they mean for your information security program. Takeaways include:
4:20-4:45
Sukesh Garg
Vice President, Products
RedSeal
Most breaches are caused by exploiting oversights in basic cybersecurity hygiene. But complex networks often make basic cybersecurity hygiene very challenging. This session will review the challenges we face and explore some solutions. We’ll cover techniques to help you get control over your cybersecurity fundamentals so you can protect your organization from the inevitable attack vectors and reduce your cyber risk.
5:10-5:40
5:40-6:30
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |