Co-Founder and Senior Vice President of Products,
Xage Security
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
Virtual Summit
Fri, November 8, 2024
10:00AM - 3:45PM EST
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 225
The Critical Infrastructure Cybersecurity Summit is a one-of-a-kind conference designed for exclusively invited Executives in need of innovative solutions to protect their company’s critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Social Engineering Cyber Attacks on Critical Infrastructure in the United States
The United States’ critical infrastructure, encompassing sectors like energy, transportation, healthcare, and finance, is increasingly at risk from social engineering cyber attacks. These attacks target human operators and employees, manipulating them into unwittingly granting access to sensitive systems and information. Unlike traditional hacking, social engineering relies on deception and trust exploitation, bypassing technical security measures. Successful attacks on critical infrastructure can disrupt essential services, causing economic damage, public safety concerns, and national security risks. This session examines the vulnerabilities posed by social engineering to U.S. critical infrastructure, highlighting real-world incidents and discussing strategies to enhance human-centric defenses in safeguarding the nation’s essential services.
Interference in U.S. Elections by Rogue Nation Threat Actors Through Cyber Attacks
Rogue nation threat actors pose a significant risk to the integrity of U.S. elections through cyber attacks aimed at undermining democratic processes. These actors leverage tactics such as hacking voting systems, manipulating voter databases, and spreading disinformation through social media to sow discord and erode public trust in election outcomes. By targeting both election infrastructure and the information landscape, they can disrupt voting processes, influence voter behavior, and create chaos in post-election discourse. This session explores the methods rogue nations use to interfere with U.S. elections, examines the implications for national security and democracy, and discusses potential strategies for enhancing cybersecurity and resilience against these threats. This session explores the methods rogue nations use to interfere with U.S. elections, examines the implications for national security and democracy, and discusses potential strategies for enhancing cybersecurity and resilience against these threats.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
10:00-11:00 EST
11:00-11:20 EST
11:20-12:05 EST
The United States’ critical infrastructure, encompassing sectors like energy, transportation, healthcare, and finance, is increasingly at risk from social engineering cyber attacks. These attacks target human operators and employees, manipulating them into unwittingly granting access to sensitive systems and information. Unlike traditional hacking, social engineering relies on deception and trust exploitation, bypassing technical security measures. Successful attacks on critical infrastructure can disrupt essential services, causing economic damage, public safety concerns, and national security risks. This session examines the vulnerabilities posed by social engineering to U.S. critical infrastructure, highlighting real-world incidents and discussing strategies to enhance human-centric defenses in safeguarding the nation’s essential services.
12:05-12:45 EST
12:45-1:15 EST
Rogue nation threat actors pose a significant risk to the integrity of U.S. elections through cyber attacks aimed at undermining democratic processes. These actors leverage tactics such as hacking voting systems, manipulating voter databases, and spreading disinformation through social media to sow discord and erode public trust in election outcomes. By targeting both election infrastructure and the information landscape, they can disrupt voting processes, influence voter behavior, and create chaos in post-election discourse. The conversation will explore the methods rogue nations use to interfere with U.S. elections, examines the implications for national security and democracy, and discusses potential strategies for enhancing cybersecurity and resilience against these threats. This session explores the methods rogue nations use to interfere with U.S. elections, examines the implications for national security and democracy, and discusses potential strategies for enhancing cybersecurity and resilience against these threats.
1:15-1:35 EST
Join HID’s virtual session for an essential overview of credential management tailored for critical infrastructure operators and asset owners. Discover key regulatory drivers shaping credential security and gain actionable insights on deploying a successful credential management system. This session will provide a high-level overview of credential management, and guide attendees in safeguarding their critical assets with a robust, compliance-ready solution.
1:35-2:05 EST
Fidelis Security’s Vice President of Engineering, Rami Mizrahi walks through various types of AD attacks and the best practices to mitigate these threats.
2:05-2:25 EST
2:25-2:45 EST
2:45-3:15 EST
3:15-3:45 EST
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Franki Rosenthal at Franki.Rosenthal@CyberRiskAlliance.com or call at (954) 560-7327.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |