CEO,
TAG Infosphere
Upcoming Summits
Cybersecurity Summit
8 CPE/CEUs with full attendance
In-Person Summit
Tue, March 12, 2024
7:30AM - 6:30PM EDT
Sheraton New York Times Square Hotel
Metropolitan Ballroom
811 7th Avenue, W 53rd Street
New York, NY, 10019
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852
The 13th Edition of the New York Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 852
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30 EDT
8:30-9:00 EDT
9:00-9:35 EDT
9:35-10:05 EDT
We believe the enterprise will be hybrid forever and all modern attacks are hybrid attacks. We also believe legacy threat detection and response approaches have proven inefficient and ineffective against hybrid attacks and here’s why: over the last decade, digital transformation drove the need for threat detection coverage across an expanding hybrid attack surface. The need for coverage led to investments in siloed detection tech, driving tool sprawl for security architects and engineers. Detection tool sprawl has resulted in unmanageable alert volume for SOC leaders and their teams. Unmanageable alert volume creates excessive workload. No wonder, SOC analysts receive an average of 4,484 alerts per day and 67% of them are ignored. As a result, 71% admit their organization may be compromised and they don’t know about it, and a staggering 97% of analysts worry they will miss a relevant security event buried in alerts – 49% worry about this every day. We contend to effectively defend the hybrid enterprise from hybrid attacks, we need to shift from trying to maximize the value of tech and tools and start figuring out how to maximize the value of existing talent. In this session, we explore the definition of effective hybrid attack defense through the eyes of SOC analysts and the pose the question: what role does AI play in hybrid attack defense and unlocking the value of our existing SOC talent?
10:05-10:35 EDT
10:35-11:00 EDT
11:00-11:35 EDT
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it?
Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats. Can proper data governance, risk management (including managing 3rd party risk and supply chain risk) and compliance provide a framework to always being ready?
Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
Tim Mortimer
President
ISACA NY
MODERATOR
Cando Wango
National Security Solutions Architect
Konica Minolta
Noam Perel
Director of Technical Success
Rubrik
Brandon Traffanstedt
Senior Director, Field Technology Office
CyberArk
Mark Millender
Senior Advisor, Global Executive Engagement
Tanium
Beth Miller
Field CISO
Code42
Girish Redekar
CEO
Sprinto
11:35-11:50 EDT
In this informative session, we will step into the eye of the cybersecurity storm in a session that exposes the profound shift in the cyber battleground brought by Generative AI. Last year witnessed record losses to phishing and ransomware attacks, but as they say in show business, “you ain’t seen nothing yet!” Learn how the incredible power of Generative AI, that helps fortify cybersecurity defenses, is also arming cybercriminals with formidable new capabilities. This transformation will make them much more dangerous digital adversaries increasing the threat to every type and size of organization across every industry. Attendees will see the tools that cybercriminals use, and they will gain an understanding of the impact of generative AI on the most dangerous and destructive attack methods. The session will also present the next-generation defense strategies that will become necessary.
11:50-12:10 EDT
The cost of data breaches continues to grow—topping $4.5 million on average. But what if breaches could become harmless?
There is a paradigm shift in security: Traditional approaches to cybersecurity, focusing on network and device security, have proven insufficient due to evolving threats and third-party access. We’ll explore how enterprises can shift to a data-centric security model to mitigate the impact of inevitable cybersecurity breaches.
12:10-12:30 EDT
12:30-12:50 EDT
The way businesses operate has changed more in the past forty-eight months than any other 4-year period. First, people and data fled the traditional office for home and cloud. Now, people are making their way back (sometimes), but data isn’t. Rather than returning to the way things were before the pandemic, businesses and government agencies are forging a new path in which people are working anywhere with data that’s everywhere. Forcepoint’s mission is to help simplify end users’ journey through what Forcepoint calls “Data Security Everywhere.”
12:50-1:40 EDT
1:40-2:25 EDT
What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight?
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Michael Melore
FBI InfraGard Committeeman
Infragard New York Metro
MODERATOR
Sean Blenkhorn
Chief Customer Officer
Cycognito
Oren Koren
CPO and Co-founder
Veriti
Neil Karnik
Senior Product Manager
Delinea
Howard Goodman
Sr. Technical Director
Skybox Security
Nicolas Oberndorfer
US Channel Sales Engineer
Bitdefender
Carl Levine
Head of Sales Engineering
DNSFilter
Maurice Côté
VP Products
Devolutions
2:25-2:45 EDT
A unified approach to breach control for endpoints is crucial in today’s increasingly complex and diverse IT landscapes. It involves combining various strategies and technologies to create a comprehensive defence against cyberattacks.
Ensure you can identify, protect, detect, respond, and recover capabilities. More importantly, having all your known vulnerabilities stopped at the bay will ensure you have a better control over the assets before the threat actor does. Once you have a good grip over the known vulnerabilities, your detection and respond abilities can take care of the unknown-unknown vulnerabilities to protect your business assets.
Lets look at the above using the NIST CSF lenses to have clarity.
2:45-3:05 EDT
Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster and more accurately. In this talk, we’ll show some examples of how AI can help predict risk, cut through complexity when making risk decisions and even help to retain senior staff while keeping them focused on the tasks that matter most.
3:05-3:30 EDT
3:30-4:00 EDT
4:00-4:20 EDT
4:20-5:05 EDT
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Jennifer Gold
President
New York Metro InfraGard Members Alliance, Inc.
MODERATOR
Michael Ferguson
Director of Security Transformation
Netskope
Nick Davis
Director of Product Management, Cloud
SentinelOne
Jorn Knuttila
Senior K8S Security Solutions Engineer
SUSE
Julian Wayte
Solution Engineering Principal
uptycs
Sean Hanrahan
Senior Solutions Engineer
Okta
Andrew McCoy
Field Security Specialist
GitHub
5:05-5:25 EDT
5:25-5:45 EDT
5:45-6:05 EDT
This session will review the misconceptions surrounding AI. We will cover the various models and how they can be (a) used by cyber security professionals, (b) how they are utilized by threat actors and (c) where they fail and hallucinate. In addition we will dive into Russian underground chats and show what threat actors are saying about this topic. Last but not least – we will see how private GPT instance are an easy pray for different types of attacks.
6:05-6:25 EDT
6:25-7:00 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |