Director, Sales Engineering,
ExtraHop
Upcoming Summits
Cyber Security Summit
8 CPE/CEUs with full attendance
In-Person & Virtual Summit
Thu, December 8, 2022
7:30AM - 6:00PM CST
The Westin Houston, Memorial City
Azalea Ballroom
945 Gessner Rd
Houston, TX, 77024
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The Fourth Annual Houston Cyber Security Summit returns In-Person and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Securing the Hybrid & Remote Workforce
This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our Industry Experts will discuss best-practices on how businesses and their IT Security Teams should address risks such as insider threat, phishing, unsecured devices and lack of training.
Securing the Cloud
This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.
Ransomware and Resiliency – To Trust or Not Trust?
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Our lineup of Industry Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting the latter can help companies stay resilient as ransomware threats continue to grow.
Learn
Our conferences have been rated as one of The Top 5 InfoSec Conferences Worldwide for the last 4 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Flexibility
Our mission is to bring the Cyber Summit experience to as many executives as possible. In 2022, all attendees have the option of attending either in-person to engage face-to-face with leading solution providers or virtually from the comfort of your own home/office. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30 CST
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:30-9:15 CST
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization
8:30-9:15 CST
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
9:15-9:50 CST
Now more than ever, security has to be top of mind for IT and security teams. Cybercrime is up 600% due to the COVID-19 pandemic, and remote work has increased the average cost of a data breach by $137,000. IT teams need to make sure every piece of their tech stack helps support their security needs. And that starts with the browser, a key component of end user productivity. Hear from the Chrome team on how to improve your security posture with Chrome.
9:50-10:15 CST
Lying deep in every network is Active Directory. The legacy network operating system that nearly everyone uses! It holds the Keys to the Kingdom, connected to nearly every application, service, IAM, and device. AD is always changing, which makes it more complex and difficult to keep track of every day. It rarely is given the attention that it needs to withstand the onslaught from attackers, both inside and outside. Everyone knows it needs attention, but one wrong setting could cause it to stop, causing total disruption of the network. M&A can cause significant security holes if not analyzed thoroughly. In the session, Craig will show you how to secure AD, making it capable of withstanding the constant attacks.
10:15-10:35 CST
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
10:35-11:20 CST
As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture.
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.
Jessica Robinson
vCISO
WiCyS
MODERATOR
Rich Bakos
Director, Sales Engineering
ExtraHop
Gregg Yurchak
Professional Services Specialist
BlackBerry
Kevin McDonough
Advisory Systems Engineer, Cyber and Compliance Practice
Dell Technologies
Andy Redman
Director, Sales Engineering
Progress Software
Justin Kestelyn
Head of Product Marketing
Bugcrowd
Allan Liska
Solutions Architect
Recorded Future
Romanus Prabhu
Head of Global Support
ManageEngine UEM
11:20-11:45 CST
11:20-11:45 CST
Breaches happen and 2021 was a record-breaking year for them. According to Identity Theft Resource Center (ITRC) research, there were 1,291 breaches publicly reported in 2021 as of Sept. 2021 compared to 1,108 breaches in 2020; that’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches from happening. Join us for a discussion on:
11:45-12:10 CST
We all have been talking about “cloud” for a number of years. We migrated to the cloud and working in and with multi-cloud environments. However, security teams in many organizations have a hard time keeping up. Cloud environments and technologies are fundamentally different than traditional on-prem environments, with different challenges, new risks (as well as opportunities), threats and tools unique to the cloud. Trying to move security teams to consider the cloud environment NOT as an extension or as an evolution of the on-prem environment is not easy and many fail trying to adopt similar methodologies and techniques embedding security into the cloud as they did on prem. In this session we will talk about why and where it is so different, focusing on how organizations and security teams should act differently when addressing security concerns in the cloud.
12:10-12:35 CST
Security breaches become headlines, and breach headlines that were rare just five years ago seem to occupy today’s daily news cycle. At the same time, the outdated image of an information security practitioner running through the office, brandishing their flaming sword of justice and screaming, “thou shall not pass!” is now from a bygone era. In fact, many of today’s data breaches are made possible by missteps and misconfigurations, and compounding this are security issues introduced to website authentication mechanisms that enforce bad end user behavior. As a result, security debt has become a significant problem for most organizations, and attackers will exploit it to their advantage.
12:35-1:10 CST
1:10-1:55 CST
As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. Regardless of where your team is in today’s flexible work culture, it’s important to make sure your data is secure.
This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.
Kathleen Moriarty
Chief Technology Officer
Center for Internet Security
MODERATOR
James Christiansen
VP and CSO Cloud Strategy
Netskope
Craig Ellrod
Senior Solutions Architect(surfd4wg)
JupiterOne
Nick Yokum
Enterprise Systems Engineer
Code42
Jonathon Mayor
Global Director of Security Solutions Architecture
Cohesity
Chris Cochran
Cybersecurity Advocate
Axonius
John Coakley
Sales Engineer
Arctic Wolf
1:55-2:20 CST
2:20-2:45 CST
Multi-generational data sprawl leads to data fragmentation, an increased surface for cyberattacks, complicates automation and process efficiency efforts, and increases the potential risk of a successful ransomware attack. When ransomware strikes, simplicity and scalability are critical to minimizing disruption and resuming business operations quickly. Learn how to reduce the attack surface across workloads, architect for faster cyber recovery and leverage best practices with key integrations with security ecosystem technology stack to protect, detect, and recover from ransomware threats through multi-layered security and Zero Trust Principles for on-premises, SaaS applications, cloud, and hybrid infrastructures with a unified experience.
2:45-3:10 CST
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.
3:10-3:25 CST
3:25-4:10 CST
Cloud innovations continue to drive the rapid adoption of cloud services, which offer numerous advantages such as increased flexibility, better scalability, cost savings, higher productivity, and resiliency. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches.
This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.
Stacey Wright
Director of Cyber Threat Intelligence
CyberWA
Alex Lawrence
Principal Security Architect
Sysdig
Bob West
CSO, Prisma Cloud
Palo Alto Networks
Cris Carreon
CISSP
AttackIQ
Gabe Schuyler
Enterprise Solutions Engineer
Wiz
Jim Mandelbaum
Cloud Architect and Field CTO
Gigamon
Joseph Carson
Chief Security Scientist & Advisory CISO
Delinea
Peter Klimek
Director of Technology, Office of the CTO
Imperva
4:10-4:35 CST
4:35-5:05 CST
This session will explore how critical infrastructure owners and operators have prioritized their cyber resilience efforts based on anonymized CISA Assessments, and will highlight some trends identified in that data. Mr. McElroy will conclude the session by highlighting key best practices to make organizations more secure, mature, and resilient.
5:05-6:00 CST
Join fellow executives at the cocktail & cigar reception sponsored by Insight along with raffle prize winner announcements from our sponsors. To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance until 5:00PM. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |