Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Upcoming Summits
Cyber Security Summit
8 CPE/CEUs with full attendance
In-Person & Virtual Summit
Fri, March 11, 2022
7:30AM - 6:30PM CST
Dallas Marriott Downtown
650 N Pearl St
Dallas, TX, 75201
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
An event access code will be emailed to all in-person attendees prior to the summit.
The Seventh Annual Dallas Cyber Security Summit returns In-Person and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Securing the Hybrid & Remote Workforce
This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our Industry Experts will discuss best-practices on how businesses and their IT Security Teams should address risks such as insider threat, phishing, unsecured devices and lack of training.
Securing the Cloud
This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.
Ransomware and Resiliency – To Trust or Not Trust?
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Our lineup of Industry Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting the latter can help companies stay resilient as ransomware threats continue to grow.
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 4 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Flexibility
Our mission is to bring the Cyber Summit experience to as many executives as possible. In 2022, all attendees have the option of attending either in-person to engage face-to-face with leading solution providers or virtually from the comfort of your own home/office. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:00 CST
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:00-8:30 CST
8:30-9:15 CST
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Director of Analysis, Brianna Leddy, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
· Topic for this session– Autonomous Response –
· Explore today’s threats and challenges
· How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
9:15-9:40 CST
GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
9:40-10:00 CST
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
10:00-10:45 CST
As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure.
This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.
Stacey Wright
VP of Cyber Resiliency Services
Cybercrime Support Network
MODERATOR
Richard Barretto
Chief Information Security Officer
Progress
James Christiansen
VP and CSO Cloud Strategy
Netskope
Adam Marget
Product Marketing
Unitrends
Andy Ellis
Advisory CISO
Orca Security
Joseph Carson
Chief Security Scientist & Advisory CISO
Delinea
Gary Kneeland
Senior Product Manager
Claroty
Thomas Keough
Solutions Engineer
Backupify
10:45-11:10 CST
10:45-11:10 CST
The Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
11:10-11:35 CST
Join 17 year veteran CISO Pete Nicoletti, now Check Point Software Technologies Field CISO of the America’s for this fast paced, lots of lesson’s learned deep dive. We’ll review the various tactical approaches traditionally used to solve the dozens of security challenges you and your team is confronted with each year with “best-of-breed” solutions. We’ll analyze and discuss the challenges of integration, incident response, training, deployment staff morale and support costs and other related variables. From there, we’ll look at the advantages of an integrated stack approach and the benefits and achievable improvements. We’ll wrap up the session with a detailed review of a Global Outage incident and how a Suite could have improved response or even prevented it.
Take-Away: Attendees will be able to walk from the presentation with an understanding of:
1. Best-of-breed approaches can solve tactical issues but are not current best practices for a long-term strategy and may bite you
2. How the single stack is extremely advantageous for incident response – this talk will include a walk-through of a real-life global outage incident
3. Awareness of various operational efficiencies and cost savings of an integrated stack approach
11:35-12:00 CST
The Shuttle Challenger tragedy was a major turning point in the NASA Space Program. What appeared at first to be a random accident quickly became a case study in how trivial amounts of risk acceptance can snowball into a disaster. What lessons can we as security professionals learn from this tragedy, and how do we apply them to our everyday lives?
12:00-12:35 CST
12:00-12:35 CST
12:35-1:00 CST
Companies, Government Agencies, Education, and other businesses all use the Cloud. But as the total increase in cybersecurity threats increase, are we utilizing the best possible tools to protect our predominately Cloud environments from intrusion? Join us as we have a discussion about the Cloud, and why Cloud Application Security is an important and often overlooked tool for keeping our data and our users safe.
12:35-1:00 CST
Companies, Government Agencies, Education, and other businesses all use the Cloud. But as the total increase in cybersecurity threats increase, are we utilizing the best possible tools to protect our predominately Cloud environments from intrusion? Join us as we have a discussion about the Cloud, and why Cloud Application Security is an important and often overlooked tool for keeping our data and our users safe.
1:00-1:25 CST
While it’s clear that the endpoint is the key cybersecurity battleground, there’s plenty of debate on how best to approach the problem. Minimizing the number of endpoint agents is an obvious approach. To that end, this talk will describe the broad list of risk management benefits of hardware-assisted isolation technology, as seen in actual deployments of the Bromium-developed hypervisor.
1:25-2:10 CST
Cloud innovations continue to drive the rapid adoption of cloud services, which offer numerous advantages such as increased flexibility, better scalability, cost savings, higher productivity, and resiliency. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches.
This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.
Mary Balogun
Lead, Dallas Chapter
Women’s Society of Cyberjutsu
MODERATOR
Jennifer Ayers
COO
DNSFilter
Jack Graziano
Sr. Systems Engineer
Iboss
Gavin Reid
CSO
Recorded Future
Dan Devane
Director of Sales, West
AppOmni
Chris Hass
Director of Information and Security Research
Automox
Jasmine Henry
Field Security Director
JupiterOne
Frank Leyva
Systems Engineer
Radware
2:10-2:25 CST
2:25-2:50 CST
Compliance is a required part of risk management. But are your compliance initiatives helping you bridge compliance and risk? Effective compliance is a catalyst for developing a proactive, risk management program by providing effective controls and tools that assess, manage, and monitor risk. Compliance isn’t about checking the box, it’s about proactively protecting your company and providing assurance so that others trust doing business with you. And, demonstrating trust will be the next market shaper.
2:50-3:15 CST
1.5 secs: Ransomware begins to spread, infect, and encrypt
3 secs: Malware has control and elevated privileges
1 minute: Avg time to detect unknown malware
We will examine the approaches to prevent and detect threats with AI, ML, and DL, and dive into how deep learning (DL) provides greater speed and accuracy to stop malware faster than ML. Learn more on the chronology of an unknown attack and why 20ms is the difference between security and a breach.
2:50-3:15 CST
We will examine the approaches to prevent and detect threats with AI, ML, and DL, and dive into how deep learning (DL) provides greater speed and accuracy to stop malware faster than ML. Learn more on the chronology of an unknown attack and why 20ms is the difference between security and a breach.
3:15-3:40 CST
Security threats online are everywhere these days. These threats come in many forms – from phishing scams to ransomware attacks, drive-by downloads to dropper malware – all of which IT security staff need to be vigilant in attempting to prevent. Many of these security threats can be prevented by focusing on the “boring” basics. There is no silver bullet for securing IT networks but maintaining a mindset of continually practicing the basics of IT hygiene and security is key. In this session, I will answer these questions and more:
3:40-4:05 CST
4:05-4:25 CST
4:05-4:25 CST
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
4:25-5:10 CST
While some things are difficult to predict, that is not the case with Ransomware, where attacks have been and continue to be accurately predicted to increase significantly in volume and severity. Last year we saw ransomware attacks on water treatment facilities, oil pipelines, and food distributors make national news. According to the FBI’s Internet Crime Complaint Center, from January to July of 2021 there was a 62% increase in ransomware complaints from year to year.
As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture. The other vector worth considering is the trusted application vector. If the applications on your perimeter allow attackers in via trojan or remote code execution, then you will be compromised, trust or no trust.
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security, Zero Trust and traditional AppSec and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.
5:10-5:35 CST
With so many different variables to consider when designing and implementing a security strategy for your cloud infrastructure, you need a clear plan for setting priorities and building a course of action. We created a lightweight and easy to understand framework to help you assess the maturity of your current cloud security practices and build a roadmap for continuous improvement.
In this session you will learn how to gain a clear picture of where your organization currently stands on its path to a secure cloud environment and design a cloud security strategy for your enterprise with clear and practical milestones. You’ll also learn about leveraging automated solutions to improve security across AWS, Azure and GCP.
5:10-5:35 CST
With so many different variables to consider when designing and implementing a security strategy for your cloud infrastructure, you need a clear plan for setting priorities and building a course of action. We created a lightweight and easy to understand framework to help you assess the maturity of your current cloud security practices and build a roadmap for continuous improvement.
In this session you will learn how to gain a clear picture of where your organization currently stands on its path to a secure cloud environment and design a cloud security strategy for your enterprise with clear and practical milestones. You’ll also learn about leveraging automated solutions to improve security across AWS, Azure and GCP.
5:35-6:05 CST
5:35-6:05 CST
6:05-6:30 CST
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance until 5:00PM. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Book at the summit venue or nearby location in the button below to secure a special reduced rate!
Book Now »Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |