Cybersecurity Engineer with the Benchmark Development Team,
Center for Internet Security (CIS)
Upcoming Summits
Cybersecurity Summit
CPE/CEUs with full attendance
In-Person Summit
Thu, December 12, 2024
8:00AM - 4:00PM EST
Sawgrass Marriott Golf Resort & Spa
Masters Ballroom
1000 Tournament Players Club Blvd
Ponte Vedra Beach, FL, 32082
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Nancy.Mathew@CybersecuritySummit.com
or call 212.655.4505 ext. 225
Self-parking rate is discounted from $22 to $10. To receive the discount, please get your voucher at registration. Guests must retain the original parking ticket they received when entering the gate. Upon departure, they should insert the original ticket, scan the provided voucher for the discounted rate, and then proceed with payment.
The Second Annual Jacksonville Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Nancy.Mathew@CybersecuritySummit.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
8:00-9:00 EST
9:00-9:30 EST
Whether a startup or a midmarket company, these controls will build, or repair, the foundational security program necessary to provide a strategic advantage in protecting the brand and revenue.
As a startup, security leaders are asked to move quickly while balancing productivity and security, erring on the side of productivity. As the company grows and becomes an enterprise, the concerns and challenges are similar yet more complex. As complexity grows leaders may overcomplicate security solutions as their budget grows. Certainly the implementation and maturity of controls requires additional effort the larger the organization, yet these 13 controls remain foundational to a truly affective security program.
Working on multiple cybersecurity insurance applications have provided a consistent set of minimum security controls insurance underwriters are looking for before considering writing a policy. The level of maturity of the implementation of those controls affects coverage levels provided as well as premium costs. Building on a basic set of 8 security controls provided by the insurance industry, I have created a set of custom set of the 13 essential cybersecurity controls every business should adopt to maximize their ability to mitigate cyber threats and significantly reduce business risks. This set of controls has been used multiple times in the last few years as I have led the implementation of security programs for an SEC-regulated investment firm and five healthcare service organizations. We need to stop chasing the next shiny object when it comes to new security tools and make sure these 13 controls are rock solid.
9:30-10:05 EST
Join Ken as he unveils the blueprint for future-proofing cybersecurity in the face of relentless, opportunistic threat actors. In this keynote, we’ll explore the imperative for organizations to adapt, collaborate, and fortify their tech strategy against the ever-changing threat landscape. Gain invaluable insights to empower your cybersecurity approach, ensuring resilience in a landscape where adaptability is not just an option but a necessity.
10:05-10:35 EST
10:35-11:00 EST
11:00-11:30 EST
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
11:30-11:50 EST
Please join Daniel Pollack, Check Point Harmony Manager for the Southern US, for a discussion about current attacks seen in the marketplace in 2024. We will review the highlights of recent attacks and responses documented by Check Point Research. Know what attacks are trending to help stay prepared
11:50-12:10 EST
Artificial Intelligence (AI) introduces novel security challenges, including adversarial attacks and model vulnerabilities. Also, there is the issue of whether you can trust the AI you have. This session will cover six different types of AI attacks in order to provide a better understanding of the threatscape along with some suggestions for securing the data, the model, the usage and the infrastructure. Also, a glimpse into the future of how generative AI can be leveraged to improve cybersecurity will be discussed.
12:10-12:30 EST
12:30-1:30 EST
1:30-2:00 EST
What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight?
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
2:00-2:30 EST
In a world where threats continue to become more challenging, the cost of breaches continues to rise, and the impact of breaches is becoming more catastrophic, CISOs must evolve their strategies rapidly. In addition, the reality of liability is weighing heavily on every CISO. As one of the newer roles in the C-suite, the CISO must evolve their cybersecurity programs and adapt their leadership styles to meet the advancement of threats today, especially with the general availability of AI, more specifically GenAI. During this session, we will cover the need for resilient cybersecurity within your cybersecurity programs, ensuring a comprehensive approach to reducing risk for your organization. The reality is, we need to be best prepared for ‘when’ a cybersecurity incident will occur, and not ‘if’. We will also look at the role of the CISO as it evolves into a position of prominence within the organization, requiring a shift from a role that is not only technical in nature but also integrates business acumen, translating technical risks into more quantifiable and business terms.
2:30-3:00 EST
3:00-4:00 EST
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Franki Rosenthal at Franki.Rosenthal@CyberRiskAlliance.com or call at (954) 560-7327.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |