Director, Global Solution Leads,
Cyber Security Summit
8 CPE/CEUs with full attendance
Thu, July 20, 2023
7:30AM - 6:25PM EDT
The Ritz-Carlton, Tysons Corner
Salons I, II & III
1700 Tysons Blvd
McLean, VA, 22102
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
or call 212.655.4505 ext. 247
The Tenth Annual DC Metro Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Supervisory Special Agent
U.S. Secret Service, Criminal Investigative Division Cyber Outreach Program
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.2
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.3
Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.4
Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.6
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.7
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.8
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
This presentation explores the emerging challenges posed by hallucinating chatbots, deep fakes, and the need for quantum-safe cryptography. We examine the proliferation of AI-driven chatbots and their potential for misinformation, the increasing threat of realistic deep fakes, and the urgency to develop cryptographic systems resilient against quantum attacks. Join us as we delve into the implications of these advancements, their impact on various domains, and potential approaches to address these challenges for governments and private sector in the evolving landscape of technology.
Legacy SOAR (Security Orchestration, Automation and Response) technology promised to revolutionize the practice of security operations. Unfortunately, the first generation of these platforms have gained a reputation for rigid playbooks that require extensive development resources, poor case management features, and limited use cases. That’s why Swimlane developed a more modern and extensible approach to security automation.
Use of the cloud is continuously growing, not surprisingly so due to its perceived lower costs, greater agility, and ability to increase computing power with increased demand & continuously deploy new applications and software features.
Despite the appeal of cloud, there are many security risks and vulnerabilities and managing these risks has proven to be a big challenge as cyber criminals shift their tactics to cloud data and systems in responses to this increased use of the cloud. According to a CRA Business Intelligence’s September 2022 Cloud Security Survey, misconfigurations, lack of oversight, and little visibility across the organization are among their chief concerns regarding cloud deployments.
If organizations are going to successfully adopt/transition to the cloud, they must ensure security is part of their program. An effective cloud security program includes various process and technology capabilities to effectively keep up with the current threat landscape and vulnerabilities.
Security leaders face intense budget scrutiny during normal business cycles, and that intensity is only magnified during periods of economic uncertainty. How can cyber security leaders navigate budget and investment decisions during economic headwinds while still responsibly managing cyber risk? Will recent advancements in Artificial Intelligence (AI) and Large Language Models (LLM) be our saving grace or harm our efforts?
This session will address leadership, expert guidance, tools for resilience (Isolation, Immutability and Intelligence), where to begin the resilience journey and how Dell Technologies can help.
What are the top factors that move businesses from the bottom 10% to the top 10% of SASE deployments? In this session, Advisory CISO Wolfgang Goerlich will look at the latest data from Cisco’s Security Outcomes Report to analyze current trends in SASE strategy. From access management to data protection to how to manage it all, Wolfgang will discuss where to focus first in your strategies and how to build strong relationships that position your SASE pivot a success!
Despite having distinct differences, data privacy and compliance are deeply intertwined with cyber security. As focus on data privacy and compliance increases, business leaders can expect to see vast changes related to how consumer data is managed, shared, and secured. Policy & laws on data privacy and compliance continue to expand and become increasingly stringent, so it is important for companies and their respective business leaders to consider these areas as they develop & evaluate their cyber security strategies. For instance, last year the SEC proposed amendments to its rules on cyber security, risk management, strategy, governance, and incident disclosure by public companies.
At a more granular level, there are various initiatives to protect specific consumer data and ensure enterprises are compliant in doing so – particularly health data and children’s personal information. The American Data Privacy and Protection Act (ADPPA) if passed could greatly impact health data beyond the scope of HIPAA by establishing a national framework to protect & preserve the privacy of consumer data collected by entities not covered by HIPAA. In an American Medical Association survey, about 75% of surveyed patients expressed concern and confusion related to the privacy of their health data and how it is handled. The ADPPA could help clear up some of this confusion by establishing clear expectations. Another critical area is the collection of personal information of children. The Children’s Online Privacy Protection Act (COPPA) helps put parents in control of how their children’s data is handled and ensures that all entities in possession of this data sustain its confidentiality, security, and integrity.
Maintaining strong data privacy and compliance practices is imperative in preventing sensitive personal data from becoming compromised. This information is extremely valuable to cyber criminals, who seek to utilize compromised data to steal others’ identities or resell such PII.
This panel will look at the latest data privacy policies and implications for what this means for business leaders in the future. Our lineup of experts will lend their insights and offer best practices relating to privacy, compliance, and identity protection.
You wouldn’t play poker blind, so why search for cyberthreats without analytics? Searching data lakes for cybersecurity threats or vulnerable assets without using scaled analytics is like playing a round of poker while blindfolded! You always want the upper hand, so in this talk, you’ll learn how security-related content including pre-built reports, dashboards, and visualizations can handle common security and compliance requirements. Analytics ensure sound security postures so organizations don’t fold to cyber threats.
By simplifying the review of an enterprise data lake using easily implemented data science with scaled analytics, you can eliminate blind spots and significantly improve your organization’s cybersecurity framework. We’ll also show you how the SOC can extract the most value from security data, plus we’ll share many more stealth tips for your advantage.
Join SentinelOne to hear how AI and cybersecurity professionals can work together to problem-solve and create wins for our industry.
As a protective strategy, Compliance establishes a floor of capabilities that clearly satisfies threats from regulators and auditors, not adversaries. Thankfully, oIt is hard to find an industry untouched by the transformative power of Artificial Intelligence (AI), and Cybersecurity is no exception to this trend. While early AI adopters have enjoyed material advantages, will those advantages regress to mere competitive parity as operationalized AI becomes table stakes for modern cyber? For some organizations the answer will almost certainly be yes, but it doesn’t have to be!
Join Tim Wade, Vectra AI Deputy CTO, in a presentation aimed at strategic leaders with a vested interest in establishing, achieving, maintaining, or extending their strategic cyber advantages through AI. This presentation will underscore the principles and process at the center of this challenge, placed in the context of organizational resources, risks, and above all, mission.
“Pay Up, or Else”. The number of organizations who have been faced with this scenario has been steadily increasing over the past several years as ransomware attacks continue to rise — both in numbers and the size of payouts.
The clear and present danger of a ransomware attack looms large among cyber executives and business leaders as the number of vulnerabilities increases daily. According to a 2022 CRA Business Intelligence survey, nearly one in four respondents reported that their organization experienced one or more ransomware attacks in the past 12 months, and almost one out of three of these organizations said the attacker succeeded in gaining access to their systems, encrypting files, and demanding a ransom
According to this survey, many believe that the worst is yet to come and that they are at a significantly higher risk of a cyberattack than ever before – it’s not a matter of “if,” but “when.”
Preparing for the inevitable and defending against the threat of a ransomware attack requires constant evaluation and assessment, and then making the necessary adjustments.
On this panel, our lineup of industry experts will discuss the key security measures enterprises must take, going beyond backup and recovery and anti-malware/anti-virus solutions to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption, and cloud security software.
Sr. Cybersecurity Engineer
Center for Internet Security (CIS)
Principal Sales Engineer
Senior Director, Incident Response & Cloud Operations
Varonis System, Inc.
Senior Product Manager
VP, US Sales
Red teaming and tabletop incident response exercises are both established tools for organizations to test their cybersecurity capabilities. Red teaming, which simulates real-world attack scenarios, helps organizations test their detection and prevention mechanisms, while tabletop exercises facilitate the review and development of incident response processes and procedures. Individually, each method is a powerful way of maturing an organization’s cyber resilience.
However, combining red teaming and tabletop exercises, instead of treating them as stand-alone activities, offers benefits greater than the sum of its parts. A red team engagement only tests the organization’s technical controls, not the processes and procedures that guide the incident response team. Meanwhile, a tabletop exercise assesses the incident response plan, but assumes that the appropriate tooling is in place to help detect and contain the incident. Without both the technical controls and the security governance, an organization’s incident response strategy is incomplete. Learn how to best combine red team and tabletop exercises to ensure your team is properly equipped to protect your organization.
During this session, you will gain valuable insights into the key components of a Zero Trust model and understand how it can mitigate the risk of data breaches and unauthorized access. Our expert speakers will share real-life experiences from work at a large federal systems integrator, detailing the challenges they faced and the practical strategies they adopted to achieve a robust and resilient AD security framework. Zero Trust is achievable when an integrated, risk based, and phased approach is put into motion.
If you’re seeking to enhance the security posture of your Active Directory infrastructure, which is the core of the modern identity infrastructure, this session is a must-attend. Don’t miss this opportunity to learn from industry experts and gain actionable insights from real-life application of Zero Trust principles. Who Should Attend? IT security professionals, System administrators, Security architects, and anyone responsible for the governance and security of Active Directory.
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance for the full day. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
Distinguished Engineer, CTO Americas Security Technical Sale, IBM Master Inventor,
Financial Fraud Investigator, Global Investigative Operations Center,
US Secret Service
Cybersecurity Advisor (CSA) for Washington D.C. – Region III,
Cybersecurity and Infrastructure Security Agency US DHS
Cybersecurity Advisor (CSA) for Washington D.C. – Region III,
Cybersecurity and Infrastructure Security Agency U.S DHS
Supervisory Special Agent,
U.S. Secret Service, Criminal Investigative Division Cyber Outreach Program
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Thank you for registering for the Cyber Security Summit. Please bring a copy of your confirmation email with you. Our networking breakfast will start promptly at 7:30 AM. To receive your full 8 CEU / CPE credits, you must attend for the entire day. We look forward to seeing you soon!
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|