Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Upcoming Summits
Cyber Security Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Fri, November 10, 2023
7:30AM - 4:00PM CST
Sheraton Dallas Hotel
Dallas Ballroom C-D
400 North Olive Street
Dallas, TX 75201
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852
The 9th Edition of the Dallas Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
To become an official strategic marketing partner, contact MHutton@CyberSecuritySummit.com or call 212.655.4505 ext. 241
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
7:30-8:30 CST
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:30-9:00 CST
9:00-9:45 CST
As we near the end of the year, join John Hendley, IBM X-Force Head of Strategy, as he delivers the Cyber State of the Union, where he will discuss this year’s most prominent threats, who they’ve targeted, how much it’s costing various industries and geographies, and what we can expect from emerging threats on the horizon.
9:45-10:20 CST
It’s important to recognize that cybersecurity is rooted in more than zero trust, and compliance mandates. The core to all cybersecurity is protecting TRUST. Unfortunately, the TRUST component has been pushed aside to chase trends and compliance. It’s time we earn back TRUST before we become lost in a new cyber-revolution.
10:20-10:55 CST
This discussion will review Dell Data Protection Suite, a comprehensive software solution to protect workloads across multiple environments spanning from edge to core to cloud. This session will review:
10:55-11:20 CST
11:20-11:50 CST
“Pay Up, or Else”. The number of organizations who have been faced with this scenario has been steadily increasing over the past several years as ransomware attacks continue to rise — both in numbers and the size of payouts.
The clear and present danger of a ransomware attack looms large among cyber executives and business leaders as the number of vulnerabilities increases daily. According to a 2022 CRA Business Intelligence survey, nearly one in four respondents reported that their organization experienced one or more ransomware attacks in the past 12 months, and almost one out of three of these organizations said the attacker succeeded in gaining access to their systems, encrypting files, and demanding a ransom
According to this survey, many believe that the worst is yet to come and that they are at a significantly higher risk of a cyberattack than ever before – it’s not a matter of “if,” but “when.”
Preparing for the inevitable and defending against the threat of a ransomware attack requires constant evaluation and assessment, and then making the necessary adjustments.
On this panel, our lineup of industry experts will discuss the key security measures enterprises must take, going beyond backup and recovery and anti-malware/anti-virus solutions to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption, and cloud security software.
11:50-12:15 CST
The cost of data breaches continues to grow—topping $4.5 million on average. But what if breaches could become harmless?
There is a paradigm shift in security: Traditional approaches to cybersecurity, focusing on network and device security, have proven insufficient due to evolving threats and third-party access. We’ll explore how enterprises can shift to a data-centric security model to mitigate the impact of inevitable cybersecurity breaches.
12:15-1:00 CST
1:00-1:25 CST
Malware-enabled credential theft has grown in parallel to the similar but more pervasive phishing-based attacks over the last decade. A large underground economy has emerged from the secondary sale of credentials and sensitive data stolen by the infostealer class of malware. Increasingly the Secureworks CTU has observed these credentials being acquired by ransomware groups that target the networks of large organizations. This presentation will explore the mechanics of this ecosystem and how network defenders can adapt.
1:25-1:50 CST
Having responded to countless data breaches, Jennifer Beckage, Esq., CIPP/US, CIPP/E, named one of the Top 50 Data Breach Lawyers in the US 6 years in a row, has identified some of the top things any organization can do in a data breach to minimize risk. Lawyers quarterback a data breach response to help preserve privilege and issue spot risk issues, compliance matters, and to help meet legal obligations. Incident response involves numerous teams and quick response. In this session you will hear practical advice and steps your organization, and you can take to reduce risk in order to be better prepared for a data breach.
1:50-2:25 CST
Use of the cloud is continuously growing, not surprisingly so due to its perceived lower costs, greater agility, and ability to increase computing power with increased demand & continuously deploy new applications and software features.
Despite the appeal of cloud, there are many security risks and vulnerabilities and managing these risks has proven to be a big challenge as cyber criminals shift their tactics to cloud data and systems in responses to this increased use of the cloud. According to a CRA Business Intelligence’s September 2022 Cloud Security Survey, misconfigurations, lack of oversight, and little visibility across the organization are among their chief concerns regarding cloud deployments.
If organizations are going to successfully adopt/transition to the cloud, they must ensure security is part of their program. An effective cloud security program includes various process and technology capabilities to effectively keep up with the current threat landscape and vulnerabilities.
Justin Brown
Cybersecurity Engineer with the Benchmark Development Team
Center for Internet Security (CIS)
MODERATOR
Clea Ostendorf
Field CISO
Code42
Fernando Cardoso
Director, Product Manager of Vision One - Cloud Security
Trend Micro
Mike Jordan
Senior Solutions Architect
Thales
Sam Quakenbush
Senior Director, Field Innovation & Strategy
Mend
Jim Sill
PHD Researcher
University of Tulsa
2:25-2:45 CST
2:45-3:15 CST
3:15-4:00 CST
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance for the full day. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Thank you for registering for the Cyber Security Summit. Our networking breakfast will start promptly at 7:30 AM. To receive your full CEU / CPE credits, you must attend for the entire day. We look forward to seeing you soon!
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |