VP of Solutions,
Brinqa
Upcoming Summits
Cyber Security Summit
Earn CPE/CEUs with full attendance
Virtual Summit
Wed, December 13, 2023
10:00AM - 3:00PM EST
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852
The Finance & Risk Summit is a one-of-a-kind conference designed for exclusively invited Executives in need of innovative solutions to protect their company’s critical data & infrastructure. This next-generation event will provide a virtual space for business leaders to learn about the latest cyber threat landscape and evaluate the industry’s most cutting-edge solutions by directly connecting them with emerging and established solution providers, subject matter experts and powerful cyber thought leaders.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 852
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
10:00-10:15 EST
10:15-11:00 EST
In this informative session, we face down the challenges of establishing priorities within the evolving landscape of cybersecurity threats. We dive deep into the revolutionary impact of Generative AI technologies and their dual role as both a shield and a sword in cybersecurity. The session will also cast a spotlight on the latest SEC regulations, interpreting their profound implications on your cybersecurity strategies. Amidst the high-stakes narrative, we confront the daunting challenge of aligning cutting-edge security measures with stringent budgetary constraints. This session is crafted to empower leaders with foresight and agility in fortifying their defenses and ensuring they are steps ahead in the relentless battle against cyberthreats in 2024. Attendees will gain an understanding of the key priorities for their 2024 cybersecurity agenda along with actionable strategies to enhance their organization’s security posture in an increasingly dangerous digital world.
11:00-11:30 EST
Exploited vulnerabilities are the most common root cause of the most significant ransomware attacks in the financial services sector. At the same time, nearly half of security professionals say that testing too late in the development cycle remains a major source of frustration. So why are we still failing to catch vulnerabilities earlier? The structure and priorities of development and security teams remain at odds for most organizations. In fact, few “shift left” initiatives have successfully gone to plan.
Developer productivity is still often measured on speed of deployment, at the expense of security. Failing to catch vulnerabilities before code is released overburdens small security teams, stalls code production, and increases the risk of costly data breaches that erode brand trust.
In this presentation, Alex Rice will demonstrate how we can reframe our thinking, team structures, and culture to recognize that security is a process, not a destination. Security teams must adopt an advisory role for development that embraces how developers work and supports developer-first initiatives to drive secure outcomes.
11:30-11:50 EST
Banking’s reliance on cloud tech brings efficiency and cyber risks. Tackle DevOps challenges, evolving threats, and the new SEC cybersecurity regulations. Gain strategies, insights, and real-case studies to secure cloud-native environments effectively, safeguard workloads, and manage compliance demands.
11:50-12:20 EST
In this session you’ll gain a holistic understanding of AI security including the novel risks of AI technology. We’ll explore new policies, processes, team education and security measures to implement today to effectively safeguard your organization from AI intricacies. You’ll learn how Snyk as an organization protects itself from developers using generative AI during code development – and specifically how to mitigate those issues.
12:20-12:55 EST
Ransomware attacks on FinTech and the need for Cyber Insurance has rapidly grown in recent years. The reason? Ransomware exploits the best vulnerability there is: human error.
According to the 2022 ENISA Threat Landscape report, ransomware attacks were the highest they’ve ever been, with phising as the leading vector of initial access. Another report found that 55% of financial institutions were hit by ransomware within the last year, a 62% increase.
Today we will discuss prevention, but ending there is not enough. Companies increasingly need protection after they get hacked, both technologically and financially. Because of this, cyber insurance policies that cover ransomware have become a must-have for most businesses.
But what does this involve and why does it matter?
12:55-1:05 EST
1:05-1:25 EST
1:25-1:50 EST
1:50-2:15 EST
It’s a cloudy and breachy world out there – especially when the threats are hidden from view.
Join former CISO and current CrowdStrike Executive Strategist, Victoriano Casas III, as he discusses the sophisticated threat landscape targeting the Financial sector during 2023. Victoriano will cover the most common attack types used against the Finance industry, the criminals, or “adversaries”, behind these attacks, and most importantly, what tools and resources you need to protect your business and your customers in 2024.
Cybercrime evolves and changes at the same rate of pace as technology. Don’t get caught in the New Year with legacy security systems that can no longer keep up.
2:15-2:45 EST
As security practitioners, we’re always trying to find ways to get ahead of attackers and mitigate threats before they wreak havoc in our environments. But, traditional defense-in-depth strategies rely more on reactive controls to build walls that we hope will stop attacks from being successful. However, time and again, we see news headlines proving how often and how easily these reactive approaches are defeated.
Today’s attack surface requires a different approach, focusing on preventative risk mitigation strategies that give more visibility and a better mechanism to tie technical risk to business context. While reactive controls are still necessary, the more we can identify areas of risk before the attackers do and close the gaps in our defenses, the fewer attacks will successfully take place and the more effective those reactive controls will be.
Preventative security strategies are driven by making better decisions about how, when and where to best mitigate risks. In this talk, we’ll review new techniques to implement within your security program that will give a better understanding of the technical and business risk across your attack surface, how to identify the areas to focus on first and ways to drive a more meaningful approach to mitigating and, more importantly, communicating risks to the business and executives before cyberattacks exploit your weaknesses.
2:45-3:10 EST
The cost of data breaches continues to grow—topping $4.5 million on average. But what if breaches could become harmless?
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |