Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Cyber Security Summit
8 CPE/CEUs with full attendance
Tue, May 2, 2023
7:30AM - 6:30PM CDT
Sheraton Dallas Hotel
400 North Olive Street
Dallas, TX, 75201
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
or call 212.655.4505 ext. 247
The 8th Edition of the Dallas Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Supervisory Cybersecurity Advisor, Region VI
Cybersecurity & Infrastructure Security Agency, U.S. DHS
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.2
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.3
Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.4
Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.6
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.7
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.8
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
Modern AI is an essential component of an effective Cybersecurity defense, one capable of addressing the scale and severity of novel threats facing SOC teams. Unfortunately, the promises made by the marketing departments of most vendors have failed to materialize, and caused confusion and skepticism.
This keynote will help to explain why the type of technology adopted for threat detection is critical, where most solutions fall short, and what that means for the next wave of AI in Cybersecurity.
It is time to start focusing on business outcomes and results over buzzwords. This talk will include real-world scenarios from MixMode AI’s platform.
1. State of the Market
4. Solutions and Resources
Legacy SOAR (Security Orchestration, Automation and Response) technology promised to revolutionize the practice of security operations. Unfortunately, the first generation of these platforms have gained a reputation for rigid playbooks that require extensive development resources, poor case management features, and limited use cases. That’s why Swimlane developed a more modern and extensible approach to security automation.
“Pay Up, or Else”. The number of organizations who have been faced with this scenario has been steadily increasing over the past several years as ransomware attacks continue to rise — both in numbers and the size of payouts.
The clear and present danger of a ransomware attack looms large among cyber executives and business leaders as the number of vulnerabilities increases daily. According to a 2022 CRA Business Intelligence survey, nearly one in four respondents reported that their organization experienced one or more ransomware attacks in the past 12 months, and almost one out of three of these organizations said the attacker succeeded in gaining access to their systems, encrypting files, and demanding a ransom
According to this survey, many believe that the worst is yet to come and that they are at a significantly higher risk of a cyberattack than ever before – it’s not a matter of “if,” but “when.”
Preparing for the inevitable and defending against the threat of a ransomware attack requires constant evaluation and assessment, and then making the necessary adjustments.
On this panel, our lineup of industry experts will discuss the key security measures enterprises must take, going beyond backup and recovery and anti-malware/anti-virus solutions to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption, and cloud security software.
Cybersecurity Engineer with the Benchmark Development Team
Center for Internet Security (CIS)
Principal Sales Engineer
Red Team Practice Director
Senior Solutions Architect
As organizations face the growing threat of ransomware and data exfiltration, many are reevaluating their preparedness for a large-scale data loss event. The problem is that legacy backup systems, which were designed to protect against hardware failure or natural disasters, are now being targeted by cybercriminals as their first point of attack. In this session, we will discuss why traditional backup systems and cyber recovery solutions are fundamentally different capabilities. We will also explore the steps that organizations can take to prepare for and recover from a cyber-attack, including implementing a modern cyber recovery tool like Rubrik.
During the past 10 years I’ve participated in many security incidents, received confidential readouts of other company incidents, collaborated with top well-known incident response firms as well as government agencies. It’s with these experiences and learnings I’ve applied an overlay of Zero Trust to the problem. Having also delivered Zero Trust strategies at two globally-recognized enterprises we can speak to the reality of the problem and solution.
In 2022 I presented how my Enterprise Security teams delivered Zero Trust at Adobe and Cisco. So, let’s talk about why we prioritized the initiative; a forward thinking strategy that really defended against the attacks we were seeing. During this session we’ll discuss some high-profile security incidents from the past year, reviewing the themes, kill chain, and how or where a Zero Trust strategy might help prevent the attack, slow them down, or reduce risk.
As an example, many high profile hacks all started similarly. Related to an employee or contractor credential theft (or purchase) and an MFA fatigue or bypass. These are NOT highly sophisticated attacks and there are strategies that can save your bacon.
Threat-informed defense is a strategic approach to cybersecurity that combines threat intelligence with traditional security measures and threat analysis. During this presentation you’ll learn how to form a strategy that can proactively identify threats before they can cause damage or disruption.
Use of the cloud is continuously growing, not surprisingly so due to its perceived lower costs, greater agility, and ability to increase computing power with increased demand & continuously deploy new applications and software features.
Despite the appeal of cloud, there are many security risks and vulnerabilities and managing these risks has proven to be a big challenge as cyber criminals shift their tactics to cloud data and systems in responses to this increased use of the cloud. According to a CRA Business Intelligence’s September 2022 Cloud Security Survey, misconfigurations, lack of oversight, and little visibility across the organization are among their chief concerns regarding cloud deployments.
If organizations are going to successfully adopt/transition to the cloud, they must ensure security is part of their program. An effective cloud security program includes various process and technology capabilities to effectively keep up with the current threat landscape and vulnerabilities.
Enterprise Solutions Engineer
Cloud Security Field Engineer
Director of Solutions Engineering
Insider Risk Technical Specialist
CSO, Prisma Cloud
Palo Alto Networks
Vice President, Global Solution Engineering
Sr. Sales Engineer
Organizations process and store huge volumes of sensitive information. Inadequate controls in IAM processes and technology can lead to breach, involuntary exposure of data, and non-compliance issues.
Join us as we demonstrate a proven Zero-Trust driven assessment, architecture and executable roadmap process that answers the most common questions about CyberSolve implementations: How do we determine what we COULD do vs. what we SHOULD do? What’s this going to cost us? How do we maintain our IAM once it is implemented? What is different when addressing Workforce IAM vs Customer IAM (CIAM)?
Today, more than any other time in history, we are digitally connected. And, with a continuous rise in mobile-related attacks, and an ever-increasing use of mobile devices to perform business tasks, protecting your organization from Mobile threats is more critical than ever. And, despite our best efforts, threats and breaches continue to increase. Join Grant Asplund for this insightful presentation to learn about the latest mobile and user protection including Check Point’s Harmony suite for securing users and access. Today’s mobile security needs to prevent the download of malicious files to mobile devices, not just from the web and email but also collaboration tools like Teams and Slack and others. Learn out how you can achieve 99.7% efficacy against zero-day threats across your entire enterprise leveraging ThreatCloud, the best threat intelligence solution in the industry.
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Despite having distinct differences, data privacy and compliance are deeply intertwined with cyber security. As focus on data privacy and compliance increases, business leaders can expect to see vast changes related to how consumer data is managed, shared, and secured. Policy & laws on data privacy and compliance continue to expand and become increasingly stringent, so it is important for companies and their respective business leaders to consider these areas as they develop & evaluate their cyber security strategies. For instance, last year the SEC proposed amendments to its rules on cyber security, risk management, strategy, governance, and incident disclosure by public companies.
At a more granular level, there are various initiatives to protect specific consumer data and ensure enterprises are compliant in doing so – particularly health data and children’s personal information. The American Data Privacy and Protection Act (ADPPA) if passed could greatly impact health data beyond the scope of HIPAA by establishing a national framework to protect & preserve the privacy of consumer data collected by entities not covered by HIPAA. In an American Medical Association survey, about 75% of surveyed patients expressed concern and confusion related to the privacy of their health data and how it is handled. The ADPPA could help clear up some of this confusion by establishing clear expectations. Another critical area is the collection of personal information of children. The Children’s Online Privacy Protection Act (COPPA) helps put parents in control of how their children’s data is handled and ensures that all entities in possession of this data sustain its confidentiality, security, and integrity.
Maintaining strong data privacy and compliance practices is imperative in preventing sensitive personal data from becoming compromised. This information is extremely valuable to cyber criminals, who seek to utilize compromised data to steal others’ identities or resell such PII.
This panel will look at the latest data privacy policies and implications for what this means for business leaders in the future. Our lineup of experts will lend their insights and offer best practices relating to privacy, compliance, and identity protection.
The consolidation of networking and security is driven by the adage “less is more,” but the opposite seems to be true for cybercriminals in 2023. Their mantra is “more is more,” leading to increasingly sophisticated threats of all kinds. To shed light on this issue, Aamir Lakhani, also known as “Dr. Chaos,” a Senior Threat Researcher with FortiGuard Labs, will provide insights into the top threat trends observed by FortiGuard Labs thus far in 2023.
During this session, Aamir will delve into the following topics:
• The most prevalent threats detected by FortiGuard Labs in 2023, including new and emerging threat trends
• The convergence of cybercrime with advanced persistent threat methods, giving cybercriminals the ability to “weaponize” at scale
• Preemptive measures that CISOs and IT/operational technology security leaders should take now to brace themselves for the future.
About FortiGuard Labs
FortiGuard Labs is the threat intelligence and research team at Fortinet. The team is comprised of very experienced threat hunters, researchers, analysts, engineers, and data scientists. Using telemetry gathered from millions of Fortinet sensors (5.6M+ devices deployed globally), giving visibility into the actual real-world threats our customers face and covering threats found in the network, endpoint, IoT devices, emails, applications, and web threat vectors. Using this information, FortiGuard Labs enables Fortinet security products with the best threat identification and protection information available, including the latest threats, campaigns, bad actors, and trends. This extensive, global, continuous threat research allows Fortinet customers to take proactive measures to better secure their organizations.
The network security team is tasked with safeguarding company data while still enabling new business applications to be deployed. However, modern applications are built in the cloud, and cloud teams are focused on delivering them quickly to drive business outcomes. This creates a natural conflict between security and speed, as security measures can slow down the application deployment process. During this session, we will cover the enterprise challenge and discuss how NetSec and CloudSec are better together.
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance for the full day. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Cybersecurity Engineer with the Benchmark Development Team,
Center for Internet Security (CIS)
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Thank you for registering for the Cyber Security Summit. Please bring a copy of your confirmation email with you. Our networking breakfast will start promptly at 7:30 AM. To receive your full 8 CEU / CPE credits, you must attend for the entire day. We look forward to seeing you soon!