Director of Threat Management Services,
IBM Security
For Executives in the Greater Atlanta Area
Thursday,
February 11, 2021
8:00AM - 6:30PM EST
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 225
If you run into any issues registering, please try using a different browser.
The Sixth Annual Atlanta Cyber Security Summit goes virtual as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is just $95 giving you access to all Keynote Discussions, Interactive Panels and Product Demonstrations.
With full day attendance, you will earn 6 CPE/CEU Credits!
Insider Threats
Identifying & avoiding breaches and how remote work has impacted Insider Threats in today’s remote workforce age
The Future of Cloud Security
Best practices to mitigate cloud security threats and ways to minimize common misconfiguration errors
Ransomware on the Rise
Utilizing zero trust to avoid becoming a hostage to cyber criminals and what to do if you fall victim to an attack
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 3 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
QUESTIONS
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
8:00-8:30
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
By meeting with each Solution Provider, you will be automatically entered to win one of ten $100 Amazon gift cards!
8:30-9:15
Dan Fein
Director of Email Security Products, Americas
Darktrace
9:15-9:50
9:50-10:15
Shawn Taylor
Customer Evangelist and Senior Systems Engineer
ForeScout Technologies
The Forrester Wave™: Zero Trust eXtended Ecosystem report in October 2019 called IoT and OT device security, “one of the hardest problems to solve within the enterprise.” Join this webinar to learn how Forescout allows organizations to mitigate risk and embrace Zero Trust architecture for all managed, unmanaged, virtual or physical IP-connected systems across your extended enterprise.
This webinar will discuss how to:
10:15-10:40
John Velisaris
Director of Threat Management Services
IBM Security
10:40-11:25
Dr. Christine Izuakor
Founder and CEO
Cyber Pop-up
MODERATOR
Joseph Carson
Chief Security Scientist & Advisory CISO
Thycotic
Steven Martin
Solutions Engineer
Teleport
Brandon Hoffman
CISO
Netenrich
Nick Edwards
VP of Product Management
Menlo Security
Cyber Security Expert
Code42
Jeff Horne
CSO
Ordr
Insider Threat has become increasingly problematic to businesses as the frequency and cost of these threats have risen over the last several years. In a global study conducted by Ponemon Institute in September of 2019, there was a 31% increase in overall cost of Insider Threat and a 47% increase in the total number of Insider Incidents from 2018.
Today, Insider Threat poses an even greater risk to businesses in the wake of the COVID-19 pandemic. Forrester Research, Inc. reported that in 2020, a quarter of all security breaches were caused by an insider and estimates that in 2021, Insider Threats will account for 33% of security breaches.
This panel will discuss the various factors that contribute to this increase in Insider breaches, how remote work has impacted the malicious & non-malicious Insider Threats facing businesses, and the implications this has on enterprises today. Our lineup of Industry Experts will offer their insight & provide best-practices on how businesses and their IT Security Teams should address these risks and adapt in order to defend against Insider Threats.
11:25-11:50
11:50-12:15
Becca Petrin
Sr. Software Engineer
Cyral
12:15-12:40
12:50-1:15
John Grim
Head - Research, Development, Innovation | Verizon Threat Research Advisory Center
Verizon Enterprise Solutions
David Grady
Chief Security Evangelist
Verizon
Financially motivated data breaches are similar to and different from espionage motives data breaches. Dave Grady and John Grim will compare financially-motivated and espionage-motivated data breaches. Specifically Dave and John will cover the:
1:15-1:40
Track B1:40-2:05
2:05-2:50
Sean Atkinson
Chief Information Security Officer
Center for Internet Security
MODERATOR
Brian Brockway
Global CTO, Vice President
Commvault
Tim Mackey
Principal Security Strategist
Synopsys
Danny Jenkins
CEO
ThreatLocker
Josh Bregman
Chief Operating Officer
CyGlass
Cyber Security Expert
Armis Security
Cyber Security Expert
Morphisec
Keith Walsh
Solutions Architect
Armis Security
In 2020, there was an unprecedented growth in ransomware attacks and this trend shows no signs of slowing down. Rather, these attacks are evolving and becoming more harmful as cyber criminals become more organized and effective. It is predicted that in 2021, businesses will fall victim to a ransomware attack every 11 seconds with an estimated cost of over $20 billion – 57 times more than in 2015, making ransomware the fastest growing type of cybercrime.
As a result, companies are transitioning from the traditional “trust but verify” method and implementing a Zero Trust model, requiring all users to be authenticated and continually authorized in order to be granted access and maintain access to company data and applications. By leveraging various technologies & techniques such as multifactor authentication, IAM, least privilege access, and microsegmentation, the Zero Trust model reduces the risk of a ransomware attack and minimizes the potential damage from a breach.
This panel will highlight where enterprises are most vulnerable to becoming a victim of ransomware and how utilizing a Zero Trust model minimizes this risk. Industry experts will discuss best practices to avoid a ransomware attack including adapting the Zero Trust model, what to do if your company is being held for ransom, ways to mitigate the damage caused by an attack, and how to recover afterwards.
2:50-3:15
3:15-3:40
George Avetisov
CEO & Cofounder
HYPR
With the Passwordless Decade well underway, more and more organizations are asking the question: Why is now the right time to move beyond passwords?
George Avetisov, CEO of HYPR, will discuss the rise of organizations moving to the cloud, how the perimeter fades and the attack surface gets larger. Modern tools such as SNIPR and Modlishka make it easier for hackers to launch large-scale automated attacks, bringing credential re-use and two-factor-authentication attacks to record highs.
How did we get here, and will mainstream adoption of passwordless security have an impact? We will explore how the rise of virtual desktop infrastructure and a remote workforce has affected workstation login and review how the evolution of authentication has impacted organizations’ identity and access management systems.
In this session, you’ll learn:
3:40-4:05
4:05-4:30
Robert DeVito
Global Director, Customer & Partner Sales Engineering
Google
With the dramatic increase in distributed workforces and the growing adoption of cloud applications, companies face unprecedented levels of IP, data, and identity sprawl beyond the enterprise firewall. Every endpoint is an entry into your business, cybercriminals have more ways to break in than ever before, and human error on the inside is a constant risk. Historically, endpoint security has been a zero-sum game—with the odds inevitably stacked against IT. But rather than protect devices, what if you could just control the security of them?
In this presentation, see how Chrome OS and Chrome Browser are secure by design—embedding security into every workflow to provide proactive protection for users, devices, applications, and data, wherever work happens. This is cloud-first security control in the hands of the modern businesses that will thrive moving forward.
4:30-5:10
Dr. Christine Izuakor
Founder and CEO
Cyber Pop-up
MODERATOR
Peter Klimek
Director of Technology, Office of the CTO
Imperva
Scott Giordano
V.P., Data Protection
Spirion
Cyber Security Expert
Duo Security, now part of Cisco
Cyber Security Expert
Georgia Tech
Cyber Security Expert
Venafi
Over the past few years the number of organizations that have become reliant on cloud based systems has grown exponentially largely due to the pandemic. In turn this has forced cloud security to become an even larger threat posed at IT security executives & teams. The sheer number of cloud service based cyberattacks between January and October of 2020 increased 630% a report by McAffee states and shows no sign of slowing down in 2021.
According to a recent Gartner analysis the greatest threat to cloud security will be the “distributed cloud”. A distributed cloud is simply a hybrid cloud with a mix of business processes migrating to public & private cloud systems. While this allows for greater flexibility, lower cost and greater ROI it is posing as a significant threat to your organization’s cloud security. Cyber criminals look to focus on gaps in a cloud structure and misconfigurations, a significant concern for many who are adapting to a cloud-based workforce. This panel of industry experts will discuss the future of cloud security, best practices to mitigate cloud security threats, highlight areas where cloud systems are most vulnerable to an attack and ways to minimize common misconfiguration errors.
5:10-5:35
5:35-6:00
6:00-6:30
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle.