VP of Cyber Risk and Compliance,
Darktrace
Upcoming Summits
Cyber Security Summit
8 CPE/CEUs with full attendance
In-Person Summit
Wed, September 13, 2023
7:30AM - 6:30PM EDT
Sheraton Philadelphia Downtown
Liberty Ballroom, A,B,C
201 North 17th Street
Philadelphia, PA 19103
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
The Fifth Annual Philadelphia Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 5 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
To become an official strategic marketing partner, contact MHutton@CyberSecuritySummit.com or call 212.655.4505 ext. 241
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
7:30-8:00 EDT
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:00-8:30 EDT
8:30-9:00 EDT
This presentation will highlight the five pillars of the cyber community while touching on industry finances, cyber job market, acknowledging mental health and stressors of working in the field. We’ll also discuss tips on how to help each other get ahead for best success in the field.
9:00-9:35 EDT
Derived from the past, present and future, learn about the best practices around Securing Access with Zero Trust. While many organizations have begun their journey to zero trust, the elements and opportunities are changing. In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero trust of the future.
9:35-10:00 EDT
For far too long, the role of the security analyst, charged with investigating, validating and responding to attacks amidst the noise of alerts from multiple tools, has been a frustratingly fragmented and inefficient one. The hours spent on manual triage, threat hunting and research across many tools and data sources, not only extends the time taken per incident, but also distracts valuable resources away from higher risk attacks. Data shows that despite deploying more great tools and getting more alerts, we are not getting much better at this, if at all, over the past several years. The industry needs to focus on the analyst experience. How can these tools and data sources be better connected? How can AI and machine learning best be employed to unburden teams of the error prone repetitive tasks while providing rapid and valuable insights into the specifics of an attack, and even provide focused recommended actions? This can and does, dramatically improve the overall analyst experience and efficacy, helping to prevent burn out while simultaneously sharpening response capabilities. Join us to discuss what we have learned and how we and other members of a growing, open community are building and delivering in this space.
10:00-10:35 EDT
10:35-11:20 EDT
Use of the cloud is continuously growing, not surprisingly so due to its perceived lower costs, greater agility, and ability to increase computing power with increased demand & continuously deploy new applications and software features.
Despite the appeal of cloud, there are many security risks and vulnerabilities and managing these risks has proven to be a big challenge as cyber criminals shift their tactics to cloud data and systems in responses to this increased use of the cloud. According to a CRA Business Intelligence’s September 2022 Cloud Security Survey, misconfigurations, lack of oversight, and little visibility across the organization are among their chief concerns regarding cloud deployments.
If organizations are going to successfully adopt/transition to the cloud, they must ensure security is part of their program. An effective cloud security program includes various process and technology capabilities to effectively keep up with the current threat landscape and vulnerabilities.
Ben Levin
Vice President
CSA Delaware Valley
MODERATOR
TJ Horan
Container Security Presales Engineer
SUSE
Brad Woodward
Field CTO
Lacework
Jordan Farkas
Senior Sales Engineer
Axonius
Dan Sigetti
Senior Cloud Solutions Engineer
Trend Micro
Taylor Speaker
Sr. Sales Engineer
Orca Security
Nathan Wenzler
Chief Security Strategist
Tenable, Inc.
Ben Burich
Cloud Technical Architect
SEI Sphere
11:20-11:45 EDT
We may be biased, but Penetration Tests are the Swiss Army knife of information security. There is no more effective way to find your gaps, gauge your ability to detect and respond, or protect your crown-jewels than by running a live-fire exercise. However, don’t just buy the penetration test and wait for the results; there are numerous things you can do to ensure you wring out every last drop of value.
Please join us for a candid conversation with the Senior Director of the Secureworks Adversary Group and Incident Response team. In this session, you’ll learn:
Major pen test types, and what questions they might help you answer
How to get more value than just findings
Why you want to make your pen testers life hard
How to leverage your pen test as a way to up your detection and response capabilities
11:45-12:10 EDT
There seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?
Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?
This talk will explore:
12:10-12:35 EDT
In this presentation we will dissect a cloud ransomware incident observed in March 2023 by the team behind SentinelOne’s Vigilance MDR service. At the root of this incident was a vulnerable web application running on a public internet-facing Linux server. Through such retrospective analysis and shared findings, organizations can better steel their cloud defenses against such opportunistic attacks.
12:35-1:10 EDT
1:10-1:55 EDT
Despite having distinct differences, data privacy and compliance are deeply intertwined with cyber security. As focus on data privacy and compliance increases, business leaders can expect to see vast changes related to how consumer data is managed, shared, and secured. Policy & laws on data privacy and compliance continue to expand and become increasingly stringent, so it is important for companies and their respective business leaders to consider these areas as they develop & evaluate their cyber security strategies. For instance, last year the SEC proposed amendments to its rules on cyber security, risk management, strategy, governance, and incident disclosure by public companies.
At a more granular level, there are various initiatives to protect specific consumer data and ensure enterprises are compliant in doing so – particularly health data and children’s personal information. The American Data Privacy and Protection Act (ADPPA) if passed could greatly impact health data beyond the scope of HIPAA by establishing a national framework to protect & preserve the privacy of consumer data collected by entities not covered by HIPAA. In an American Medical Association survey, about 75% of surveyed patients expressed concern and confusion related to the privacy of their health data and how it is handled. The ADPPA could help clear up some of this confusion by establishing clear expectations. Another critical area is the collection of personal information of children. The Children’s Online Privacy Protection Act (COPPA) helps put parents in control of how their children’s data is handled and ensures that all entities in possession of this data sustain its confidentiality, security, and integrity.
Maintaining strong data privacy and compliance practices is imperative in preventing sensitive personal data from becoming compromised. This information is extremely valuable to cyber criminals, who seek to utilize compromised data to steal others’ identities or resell such PII.
This panel will look at the latest data privacy policies and implications for what this means for business leaders in the future. Our lineup of experts will lend their insights and offer best practices relating to privacy, compliance, and identity protection.
Ashley Turner
Cyber Security Expert
Philly Tech Sistas
MODERATOR
Keith Daly
Senior Principal Sales Engineer
ForgeRock
Jonathan Trabucco
Data Science Manager, Structured Data and Signals
Recorded Future
Kevin O’Connor
Director of Threat Research
Adlumin
Yachie Xu
Strategic Solutions Engineer
Cloudflare
Ray Manash
Lead - Customer Success
ManageEngine
Tammy Klotz
Former CISO/CTO of Covanta, President of Lehigh Valley CSA, and Membership Chair, WiCyS
WiCyS Delaware Valley
1:55-2:20 EDT
CISO’s and Executives need to immediately understand and deal with the latest Artificial Intelligence-based tools, risks and benefits.
CISOs need to be very aware of all the issues and risks related to their business and the entire corporate and personal ecosystems. With this awareness, they need to provide ongoing guidance and leadership in addressing these new opportunities and their risks. Many CISOs are including AI-based issues in their weekly staff meetings and giving initial guidance as well as updates to Executive Staff. For example: Chat GPT and other AI-based tools are lowering the bar for hackers to create very targeted phishing emails based on previous hack info combined with social media information that are fooling many end users. Staff members in Security, IT, Network and Development, as well as Marketing and Sales, are all using ChatGPT and that must be shared and discussed during CISO-led meetings!
CISOs need to review and embrace the significant amount of good guidance that has recently been released. NIST just released the “AI Risk Management Framework” The AI Risk Management Framework (AI RMF) is intended for voluntary use and to improve the ability to incorporate trustworthiness considerations into the design, development, use, and evaluation of AI products, services, and systems. CISOs need to give good guidance to other executives that are needing to leverage AI tools to ensure their business innovates and beats the competition!
We’ll discuss all the appropriate steps that CISOs can use: Framing the Risk, your Audience, AI Risks and Trustworthiness, Effectiveness of the Benefits, the Risk Management Core that describes “Govern, Map, Measure, and Manage” and describes the Risk Management Profiles.
Key Take Aways:
1. Awareness of current AI tools and the benefits and risks that are happening now
2. Some new ideas on how to leverage AI tools safely.
3. How to ensure your team and company do not have incidents based on AI tool attacks and misuse.
4. Lots of links to the most current tools, research, countermeasures and the future
2:20-2:45 EDT
Generative AI is proving to increase productivity and augment humans in new ways. To seize the opportunities AI presents, organizations must first be aware of and manage its risks. That includes understanding how generative AI has changed the threat landscape and the security concerns that come with it – access control, cyber risk and compliance, data privacy, governance, and security. =In this session, learn how applying Self-Learning AI across your organization’s digital environment will help your security team prevent, detect, respond, and heal from incidents, including those augmented by generative AI, through every stage of the attack lifecycle. These defensive capabilities share AI outputs with each other to strengthen autonomous insights and actions, giving your teams greater visibility, impact, and control to stay ahead of evolving threats.
2:45-3:10 EDT
Organizations are rapidly adopting digital innovation (DI) initiatives to accelerate their businesses, reduce costs, improve efficiency, and provide better customer experiences. Common initiatives involve moving applications and workflows to the cloud, deploying Internet-of-Things (IoT) devices on the corporate network, and expanding the organization’s footprint to new branch locations.
With this evolving infrastructure also come growing security risks. Organizations must cope with growing attack surfaces, advanced threats, increased infrastructure complexity, and an expanding regulatory landscape. To accomplish their desired outcomes while effectively managing risks and minimizing complexities, organizations should look to adopt a cybersecurity platform-based approach that provides visibility across their environment and a means to manage both security and network operations easily.
The Fortinet Security Fabric solves these challenges with broad, integrated, and automated solutions that enable security-driven networking, zero-trust network access, dynamic cloud security, and artificial intelligence (AI)-driven security operations. Fortinet offerings are enhanced with an ecosystem of seamless integrated third-party products that minimize the gaps in enterprise security architectures, while maximizing security return on investment (ROI).
3:10-3:25 EDT
3:25-4:10 EDT
“Pay Up, or Else”. The number of organizations who have been faced with this scenario has been steadily increasing over the past several years as ransomware attacks continue to rise — both in numbers and the size of payouts.
The clear and present danger of a ransomware attack looms large among cyber executives and business leaders as the number of vulnerabilities increases daily. According to a 2022 CRA Business Intelligence survey, nearly one in four respondents reported that their organization experienced one or more ransomware attacks in the past 12 months, and almost one out of three of these organizations said the attacker succeeded in gaining access to their systems, encrypting files, and demanding a ransom
According to this survey, many believe that the worst is yet to come and that they are at a significantly higher risk of a cyberattack than ever before – it’s not a matter of “if,” but “when.”
Preparing for the inevitable and defending against the threat of a ransomware attack requires constant evaluation and assessment, and then making the necessary adjustments.
On this panel, our lineup of industry experts will discuss the key security measures enterprises must take, going beyond backup and recovery and anti-malware/anti-virus solutions to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption, and cloud security software.
Tim Harrison
Sr. Cybersecurity Engineer
Center for Internet Security (CIS)
MODERATOR
Joe Conklin
Senior Sales Engineer
Rubrik
Ed Fabiszewski
Advisory Systems Engineer, Cyber & Compliance Practice
Dell Technologies
Denis Barry
Senior Services Sales Account Manager
BlackBerry
Matthew Radolec
Senior Director, Incident Response & Cloud Operations
Varonis System, Inc.
Shaun Donaldson
Associate Director, Technical Marketing
Bitdefender
Irina Tishelman
Solutions Engineer
Sonatype
Stephen Cosby
Senior Solutions Engineer
Delinea
4:10-4:35 EDT
Enterprises have ransomware prevention basics covered – from data backups, EDR, and user training, to phishing detection, and threat intel. But there’s a significant blind spot lurking: lack of visibility into malware compromises (especially when the infected devices are unmanaged or under-managed) and the resulting passwords, web session cookies that have been siphoned.
Without immediate knowledge of this data that criminals are using to target the enterprise for ransomware and other costly cyberattacks, SOC teams have become accustomed to a machine-centric malware infection response. The result is exposed employee, contractor, and partner identities, exploitable until the affected users, applications, and devices are properly remediated. It’s been a challenge for most organizations – until now.
Join this session to learn about a new, more complete and effective approach to preventing ransomware called Post-Infection Remediation. We’ll cover how:
-Today’s digital environment increases the risk of malware while decreasing security teams’ visibility into a growing attack surface
-Bad actors are shifting their tactics to access organizations via session hijacking with malware-exfiltrated cookies
-Organizations are addressing infostealer malware infections and the gaps that exist with machine-centric remediation
-The seven steps of Post-Infection Remediation can empower your SOC to neutralize the risk of ransomware and other critical threats by resetting the application credentials and invalidating session cookies siphoned by infostealer malware
4:35-5:00 EDT
– The fastest ways to reduce MTTD and MTTR – improving SOC efficiency by 60%+ – New revenue streams that can be tapped by using additional, extensible use cases – How forward-thinking MSSPs can save an average of 45 minutes per investigation
5:00-5:25 EDT
During the past 10 years I’ve participated in many security incidents, received confidential readouts of other company incidents, collaborated with top well-known incident response firms as well as government agencies. It’s with these experiences and learnings I’ve applied an overlay of Zero Trust to the problem. Having also delivered Zero Trust strategies at two globally-recognized enterprises we can speak to the reality of the problem and solution.
In 2022 I presented how my Enterprise Security teams delivered Zero Trust at Adobe and Cisco. So, let’s talk about why we prioritized the initiative; a forward thinking strategy that really defended against the attacks we were seeing. During this session we’ll discuss some high-profile security incidents from the past year, reviewing the themes, kill chain, and how or where a Zero Trust strategy might help prevent the attack, slow them down, or reduce risk.
As an example, many high profile hacks all started similarly. Related to an employee or contractor credential theft (or purchase) and an MFA fatigue or bypass. These are NOT highly sophisticated attacks and there are strategies that can save your bacon.
5:25-5:55 EDT
5:55-6:30 EDT
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance for the full day. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Thank you for registering for the Cyber Security Summit. Our networking breakfast will start promptly at 7:30 AM. To receive your full CEU / CPE credits, you must attend for the entire day. We look forward to seeing you soon!
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |