VP of Cyber Risk and Compliance,
Darktrace
Upcoming Summits
Cyber Security Summit
8 CPE/CEUs with full attendance
In-Person Summit
Fri, February 10, 2023
7:30AM - 6:30PM EST
Grand Hyatt Atlanta
3300 Peachtree Rd NE
Atlanta, GA, 30305
Parking is limited at the hotel, we encourage public transportation or ride-share.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The 8th Edition of the Atlanta Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
Explore sessions, connect with experts, build your customized schedule and much more!
To become an official strategic marketing partner with the Cyber Security Summit, contact MHutton@CyberSecuritySummit.com or call 212.655.4505 ext. 241
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:00 EST
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:00-8:30 EST
8:30-9:15 EST
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
9:15-9:50 EST
Threat management programs aiming to establish visibility, detection, investigation and response are becoming more complex as infrastructure and workforces expand and adapt. This not only makes threat management more challenging but can also dramatically increase our exposure to attack. So how can we do a better job of proactively understanding and reducing the risks and exposures associated with this disparate environment, while simultaneously significantly reducing the stress on our threat management systems and teams?
Join us to hear what we have learned from thousands of engagements in this developing field, which we are referring to as Exposure Management. This approach has the goal helping organizations reduce risk and inefficiencies and get the most out of the tools, processes and people that they have. All while enabling the business to evolve and thrive.
9:50-10:15 EST
10:15-10:35 EST
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
10:35-11:20 EST
“Pay Up, or Else”. The number of organizations who have been faced with this scenario has been steadily increasing over the past several years as ransomware attacks continue to rise — both in numbers and the size of payouts.
The clear and present danger of a ransomware attack looms large among cyber executives and business leaders as the number of vulnerabilities increases daily. According to a 2022 CRA Business Intelligence survey, nearly one in four respondents reported that their organization experienced one or more ransomware attacks in the past 12 months, and almost one out of three of these organizations said the attacker succeeded in gaining access to their systems, encrypting files, and demanding a ransom
According to this survey, many believe that the worst is yet to come and that they are at a significantly higher risk of a cyberattack than ever before – it’s not a matter of “if,” but “when.”
Preparing for the inevitable and defending against the threat of a ransomware attack requires constant evaluation and assessment, and then making the necessary adjustments.
On this panel, our lineup of industry experts will discuss the key security measures enterprises must take, going beyond backup and recovery and anti-malware/anti-virus solutions to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption, and cloud security software.
James Stanger
Chief Technology Evangelist
CompTIA
MODERATOR
Andy Bryan
Global Sales Engineering Director
Morphisec
Mike Wronski
Principle Product Manager for Platform Security
Rubrik
Denis Barry
Senior Services Sales Account Manager
BlackBerry
Jason Kikta
CISO
Automox
Neil Karnik
Senior Product Manager
Delinea
Marc Puverel
VP, Customer Success
Axiad
Jason Rice
Vice President, Sales
Forcepoint
11:20-11:45 EST
Companies that are solely relying on intelligence and third-party feeds – are like people getting all their news from one source – both scenarios feed into cognitive biases that shape our view of the world and in this case – can affect cybersecurity decisions. To prevent these biases from taking over, we need to better understand the threat landscape and how the actors are operating – from a variety of different lenses. In this session we’ll teach you to prevent and prep for what you can, how to recognize the biases and how to prevent them from impacting security decisions.
11:45-12:10 EST
During the past 10 years I’ve participated in many security incidents, received confidential readouts of other company incidents, collaborated with top well-known incident response firms as well as government agencies. It’s with these experiences and learnings I’ve applied an overlay of Zero Trust to the problem. Having also delivered Zero Trust strategies at two globally-recognized enterprises we can speak to the reality of the problem and solution.
In 2022 I presented how my Enterprise Security teams delivered Zero Trust at Adobe and Cisco. So, let’s talk about why we prioritized the initiative; a forward thinking strategy that really defended against the attacks we were seeing. During this session we’ll discuss some high-profile security incidents from the past year, reviewing the themes, kill chain, and how or where a Zero Trust strategy might help prevent the attack, slow them down, or reduce risk.
As an example, many high profile hacks all started similarly. Related to an employee or contractor credential theft (or purchase) and an MFA fatigue or bypass. These are NOT highly sophisticated attacks and there are strategies that can save your bacon.
12:10-12:35 EST
We all have been talking about “cloud” for a number of years. We migrated to the cloud and working in and with multi-cloud environments. However, security teams in many organizations have a hard time keeping up. Cloud environments and technologies are fundamentally different than traditional on-prem environments, with different challenges, new risks (as well as opportunities), threats and tools unique to the cloud. Trying to move security teams to consider the cloud environment NOT as an extension or as an evolution of the on-prem environment is not easy and many fail trying to adopt similar methodologies and techniques embedding security into the cloud as they did on prem. In this session we will talk about why and where it is so different, focusing on how organizations and security teams should act differently when addressing security concerns in the cloud.
12:35-1:10 EST
1:10-1:55 EST
Use of the cloud is continuously growing, not surprisingly so due to its perceived lower costs, greater agility, and ability to increase computing power with increased demand & continuously deploy new applications and software features.
Despite the appeal of cloud, there are many security risks and vulnerabilities and managing these risks has proven to be a big challenge as cyber criminals shift their tactics to cloud data and systems in responses to this increased use of the cloud. According to a CRA Business Intelligence’s September 2022 Cloud Security Survey, misconfigurations, lack of oversight, and little visibility across the organization are among their chief concerns regarding cloud deployments.
If organizations are going to successfully adopt/transition to the cloud, they must ensure security is part of their program. An effective cloud security program includes various process and technology capabilities to effectively keep up with the current threat landscape and vulnerabilities.
Bradford Rand
President & Founder
Official Cyber Security Summit
MODERATOR
Scott Gillis
Director
Exabeam
Keith Garred
Systems Engineer, Sr.
Code42
Mike Thompson
Security Architect Manager
Varonis
Sasha Gilenson
CEO & Co-Founder
Evolven
Grant Asplund
Growth Technologies Evangelist
Check Point Software Technologies
David Bullas
Director of Solutions Engineering
Authomize
1:55-2:20 EST
Most of us know, articulating security requirements to business partners in simple risk language is instrumental to the success of today’s CISO/Security role. A key question to ask yourself is, are you getting to “win win” with your business partners and an enabler of digital innovation for organizational success, or are you seen as a hindrance to progress? In this talk/workshop, Pam Lindemoen, will explore this concept to transform your existing security model to allow weighing the possibilities for risk tolerance (monitoring capabilities as compensating controls). These concepts allow the modern day CISO/security professional, like yourself, to focus on what matters most and be seen as the differentiator for the business – not a barrier.
2:20-2:45 EST
2:45-3:10 EST
As an InfoSec leader, your world has dramatically changed in just the last couple of years, and the door for risk has swung wide open. Attackers are smart, stealthy and focused on profiting from your high value information and ransomware payments. And they’re usually a few steps ahead of you.
With cybersecurity top of mind for your Executives and the Board, you need to anticipate questions and be ready with answers. Unfortunately, the conversation we’ve been having around cyber security is ineffective. The right conversation is centered on business priorities and the company’s appetite for risk so the value of investment choices is clear and informed decisions can be made. The goal is to choose the right level of spend to defensibly protect your company as it operates, grows and expands.
Attend this session and learn:
3:10-3:25 EST
3:25-4:00 EST
Despite having distinct differences, data privacy and compliance are deeply intertwined with cyber security. As focus on data privacy and compliance increases, business leaders can expect to see vast changes related to how consumer data is managed, shared, and secured. Policy & laws on data privacy and compliance continue to expand and become increasingly stringent, so it is important for companies and their respective business leaders to consider these areas as they develop & evaluate their cyber security strategies. For instance, last year the SEC proposed amendments to its rules on cyber security, risk management, strategy, governance, and incident disclosure by public companies.
At a more granular level, there are various initiatives to protect specific consumer data and ensure enterprises are compliant in doing so – particularly health data and children’s personal information. The American Data Privacy and Protection Act (ADPPA) if passed could greatly impact health data beyond the scope of HIPAA by establishing a national framework to protect & preserve the privacy of consumer data collected by entities not covered by HIPAA. In an American Medical Association survey, about 75% of surveyed patients expressed concern and confusion related to the privacy of their health data and how it is handled. The ADPPA could help clear up some of this confusion by establishing clear expectations. Another critical area is the collection of personal information of children. The Children’s Online Privacy Protection Act (COPPA) helps put parents in control of how their children’s data is handled and ensures that all entities in possession of this data sustain its confidentiality, security, and integrity.
Maintaining strong data privacy and compliance practices is imperative in preventing sensitive personal data from becoming compromised. This information is extremely valuable to cyber criminals, who seek to utilize compromised data to steal others’ identities or resell such PII.
This panel will look at the latest data privacy policies and implications for what this means for business leaders in the future. Our lineup of experts will lend their insights and offer best practices relating to privacy, compliance, and identity protection.
4:00-4:25 EST
Now more than ever, security has to be top of mind for IT and security teams. Cybercrime is up 600% due to the COVID-19 pandemic, and remote work has increased the average cost of a data breach by $137,000. IT teams need to make sure every piece of their tech stack helps support their security needs. And that starts with the browser, a key component of end user productivity. Hear from the Chrome team on how to improve your security posture with Chrome.
4:25-4:50 EST
At this point in the technology evolution, it has become almost impossible for security not to be top of mind with most companies in America. But amidst the investment in security teams, infrastructure, monitoring and defense tools would it be surprising to hear that most breaches aren’t the result of advanced, complicated security threats. Instead, they’re down to poor identity and access management (IAM) on the customer side. This issue is so prevalent that Gartner believes, by 2025, 99% of cloud security failures will be the customer’s fault – and a huge 75% of those failures will occur due to poor IAM. Let’s discuss the role of the IAM and where it should sit within the broader organization, as this is no longer a basic function of onboarding and offboarding that used to sit with the HR department in the 90s.
4:50-5:20 EST
5:20-6:30 EST
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance until 5:00PM. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Thank you for registering for the Cyber Security Summit. Please bring a copy of your confirmation email with you. Our networking breakfast will start promptly at 7:30 AM. To receive your full 8 CEU / CPE credits, you must attend for the entire day. We look forward to seeing you soon!
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |