Director, Cybersecurity,
TVA
Upcoming Summits
Nationwide Virtual Conference
6 CPE/CEUs with full attendance
Virtual Summit
Thu, September 8, 2022
8:30AM - 3:05PM EDT
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The inaugural Critical Infrastructure Cyber Security Summit is a one-of-a-kind conference designed for exclusively invited Executives in charge of the protection of our Nation's critical infrastructure & data. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry's most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Ransomware Attacks on the Rise – How Do We Defend?
The economic impacts of ransomware attacks starting with the initial disruption and continuing with extended recovery, have proven challenging to the small business and to the large enterprise. Attacks on critical infrastructure present a clear and present danger to society and our nation as a whole.
The Inadvertent Insider Threat
Our lineup of Industry Experts will offer their insight on how to detect where and when your organization may be vulnerable to Insider Threat attacks and provide best-practices on addressing these risks.
Learn
Our conferences have been rated as one of The Top 5 InfoSec Conferences Worldwide for the last 4 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
9:00-9:30 EDT
9:30-10:05 EDT
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. The disruption caused by attacks can be particularly damaging in industrial environments, and in 2021, 25% of ransomware attacks targeted manufacturing companies. Join Brianna Leddy to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
10:05-10:15 EDT
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
10:15-11:10 EDT
11:10-11:30 EDT
Marty discusses the challenges that he has seen with lack of attention being paid to hardening operational technology and industrial control systems environments. Historically we have complained that we didn’t have the right technology – or we didn’t have enough properly trained people to address these challenges. Is that still true?
11:30-12:20 EDT
12:20-12:35 EDT
12:35-1:20 EDT
U.S. Critical Infrastructure organizations have become a prime target of threat actors, who attack by identifying & exploiting vulnerabilities within the organization. One of the most common vulnerabilities targeted are the employees themselves. Insider Threats, particularly Inadvertent Insider Threats or non-malicious Insiders, continue to pose a major risk to enterprises today.
Everyone does incident response, but given the implications Inadvertent Insiders have on our country’s critical infrastructure, business leaders need to examine their organization from within to identify where they’re vulnerable in order to better protect against these insider threats and mitigate the damage caused in the event of an insider breach.
Our lineup of Industry Experts will offer their insight on how to detect where and when your organization may be vulnerable to Insider Threat attacks and provide best-practices on addressing these risks.
Stacey Wright
VP of Cyber Resiliency Services
Cybercrime Support Network
MODERATOR
Christian Ohanian
Sr. Counsel, Cyber & Intelligence Solutions
Mastercard
Dr. Joseph DiNoto
Chairman of the Insider Threat Council on the National Board of Directors
InfraGard
KC Carnes
Director, Cybersecurity
TVA
Wolfgang Goerlich
Advisory CISO
Duo Security, now part of Cisco
1:20-1:40 EDT
As cyber incidents increase in both frequency and complexity, it’s clear that #CyberIsTheNewDisaster. In response, organizations are transforming from a posture of cybersecurity into one of cyber resilience – balancing the cybersecurity teams’ traditionally defensive strategies with the native disciplines & skills used by the data protection & business continuity environment.
This session provides insight into:
1:40-1:50 EDT
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
1:50-2:30 EDT
The Automotive Cybersecurity Training (ACT) program was designed in cooperation with the National Highway Traffic & Safety Administration to bridge the gap between traditional cybersecurity education and the needs of the Auto Industry. Join this session to learn about how the Automotive ISAC researched the needs of their industry to deliver this groundbreaking training across their sector.
2:30-3:05 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |