Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Upcoming Summits
Cybersecurity Summit
8 CPE/CEUs with full attendance
In-Person Summit
Fri, April 12, 2024
7:30AM - 6:30PM CDT
Sheraton Dallas Hotel
Dallas Ballroom
400 North Olive Street
Dallas, TX, 75201
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852
The 10th Edition of the Dallas Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 852
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30 CDT
8:30-9:00 CDT
9:00-9:35 CDT
9:35-10:05 CDT
10:05-10:35 CDT
We rely on cybersecurity compliance and regulatory requirements to be the lighthouse that guides us through the fog that is risk exposure. This presentation asks the question. Is compliance our biggest threat?
10:35-11:00 CDT
11:00-11:35 CDT
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it?
Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats. Can proper data governance, risk management (including managing 3rd party risk and supply chain risk) and compliance provide a framework to always being ready?
Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
11:35-11:50 CDT
In this informative session, we will step into the eye of the cybersecurity storm in a session that exposes the profound shift in the cyber battleground brought by Generative AI. Last year witnessed record losses to phishing and ransomware attacks, but as they say in show business, “you ain’t seen nothing yet!” Learn how the incredible power of Generative AI, that helps fortify cybersecurity defenses, is also arming cybercriminals with formidable new capabilities. This transformation will make them much more dangerous digital adversaries increasing the threat to every type and size of organization across every industry. Attendees will see the tools that cybercriminals use, and they will gain an understanding of the impact of generative AI on the most dangerous and destructive attack methods. The session will also present the next-generation defense strategies that will become necessary.
11:50-12:10 CDT
AI has been used in cybersecurity for nearly 20 years, but we are seeing a renewed interest from both adversaries and defenders due to the more advanced use of generative AI (GAI). In this session, we’ll look at the history of AI in cybersecurity, the latest uses by adversaries and defenders, and the inevitable impact it’ll have on the future.
12:10-12:30 CDT
Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster and more accurately. In this talk, we’ll show some examples of how AI can help predict risk, cut through complexity when making risk decisions and even help to retain senior staff while keeping them focused on the tasks that matter most.
12:30-12:50 CDT
Legacy SOAR platforms: overhyped, under-delivered. Rigid playbooks, clunky case management, and limited scope left security teams drowning in complexity Break free from these limitations with a modern, extensible approach to automation that empowers analysts, scales effortlessly, and tackles your toughest security challenges head-on.
12:50-1:50 CDT
1:50-2:35 CDT
What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight?
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Chet Bojarski
President
ACP North Texas
MODERATOR
Yasser Fuentes
Principal Solutions Architect (Cloud Security SME)
Bitdefender
Luke Fritz
Director of Product
Stellar Cyber
Brian Robison
Chief Evangelist
Corellium
Brock Bauer
Security Architect, Incident Response
Varonis
Adam Fisher
Sr. Account Executive
Perception Point
Maurice Côté
VP Products
Devolutions
Priyadarshi (PD) Prasad
Co-founder and Chief Product Officer
LightBeam.ai
2:35-2:55 CDT
In this presentation, we will delve into the fascinating world of artificial intelligence (AI). Join me as we explore AI, examine its historical development, and current applications, and discuss the potential impact and ethical considerations of AI in the future.
Artificial intelligence has come a long way since its early beginnings. From the first AI programs in the 1950s to the development of expert systems in the 1980s, we will explore the breakthroughs that have shaped the field of AI. Discover how these advancements laid the foundation for the sophisticated AI technologies we use today. Hear how Check Point is, and has been, leveraging AI and the new tools we are developing to fight fire with fire.
AI technologies such as machine learning, natural language processing, and computer vision are constantly evolving. Learn about where to find the latest breakthroughs in AI research and development, including deep learning algorithms, neural networks, and robotics. These cutting-edge innovations in AI are changing the way we live and work.
The history of AI, the current state of the technology, and the potential future impact are all evidence of the incredible journey we are on. Join me for this fun, informative presentation.
2:55-3:15 CDT
In this engaging presentation, we will explore the powerful intersection of artificial intelligence (AI) and video analytics in enhancing the physical security of cyber systems. With the increasing prevalence of cyber threats, it has become imperative for organizations to adopt innovative approaches to protect their physical infrastructure, which often serves as a gateway to their digital assets.
During the presentation, we will delve into best practices, compliance requirements (PCI-DSS, HIPAA, FNRA, etc.) for protecting physical assets of cyber systems, and how AI-based video analytics technologies can revolutionize physical security by providing proactive and intelligent monitoring capabilities. We will also discuss how these technologies leverage computer vision, machine learning, and deep neural networks to analyze video feeds, detect potential security incidents, and provide qualified alerts in real-time.
3:15-3:35 CDT
In today’s digital landscape, cyber resiliency and defensible data practices are paramount for organizations striving to protect their most valuable asset—data. This session explores strategies to fortify your organization’s defenses while enhancing operational efficiency. Discover how advanced technologies empower proactive cyber resiliency, ensuring data integrity and availability in the face of evolving threats.
In our session, we will explore the concept of defensible data practices, encompassing automated governance and immutable backup solutions that mitigate risks and ensure compliance with regulatory mandates. Learn how adopting a unified data management approach streamlines operations, while reducing complexity and providing continuous compliance monitoring. Finally, we will delve into the realm of Intelligent Data Insights, where advanced analytics and machine learning algorithms offer actionable insights into your data environment, enabling informed decision-making and enhancing overall data defensibility.
Join us as we discover how to uncover practical approaches to navigating today’s data landscape, fortifying your organization’s cyber resiliency, and instilling confidence in your data-driven initiatives.
3:35-4:00 CDT
4:00-4:45 CDT
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Wayne Selk
VP, Cybersecurity Programs & Executive Director
CompTIA
MODERATOR
Jessica Maas
Domain Sales Specialist
SUSE
Khizer Karim
Prisma Cloud Solutions Architect
Palo Alto Networks
Ammar Ahmed
Senior Solutions Engineer
Cloudflare
Rick Bosworth
Director of Cloud Marketing
SentinelOne
Corey Marshall
Director of Solutions Engineering
F5 Networks
Jason Rice
Vice President, Sales
Forcepoint
Mike Jordan
Senior Solutions Architect
Thales
4:45-5:05 CDT
Data protection has evolved to become something far more nuanced and powerful than simply data backup and restore.
5:05-5:30 CDT
5:30-6:30 CDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |