Solutions Engineer,
Trend Micro
Upcoming Summits
Cybersecurity Summit
6 CPE/CEUs with full attendance
In-Person Summit
Thu, June 27, 2024
8:00AM - 4:30PM EDT
Wyndham Grand Pittsburgh Downtown
Grand Ballroom
600 Commonwealth Pl
Pittsburgh, PA, 15222
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 225
The Second Annual Pittsburgh Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
8:00-9:00 EDT
9:00-9:30 EDT
9:30-10:00 EDT
Join Stacy, a Secureworks leader, as she unveils the blueprint for future-proofing cybersecurity in the face of relentless, opportunistic threat actors. In this keynote, we’ll explore the imperative for organizations to adapt, collaborate, and fortify their tech strategy against the ever-changing threat landscape. Gain invaluable insights to empower your cybersecurity approach, ensuring resilience in a landscape where adaptability is not just an option but a necessity.
10:00-10:20 EDT
There seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?
Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?
This talk will explore:
• The history of AI, ML, and automation already in your security stack
• The dangers and challenges of unrestricted GPT and other chat bots as information sources
• Ways humans and AI can work together
• How Exabeam uses ML today and is exploring AI in the future
10:20-10:50 EDT
10:50-11:30 EDT
V. Venesulia Carr
CEO
Vicar Group, LLC
MODERATOR
Shawn Taylor
Senior Director, Solutions Engineering
Xage Security
Dan Brady
Solutions Engineer
Trend Micro
Chris Dawson
Threat Intelligence Publications Lead
Proofpoint
Ian McIntyre
Director, Managed Data Detection and Response (MDDR)
Varonis
Sam Levin
Solutions Engineer
Contrast Security
Maurice Côté
VP Products
Devolutions
11:30-11:50 EDT
Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster and more accurately. In this talk, we’ll show some examples of how AI can help predict risk, cut through complexity when making risk decisions and even help to retain senior staff while keeping them focused on the tasks that matter most.
11:50-12:10 EDT
12:10-1:10 EDT
1:10-1:30 EDT
Critical infrastructure refers to the systems and assets that are essential for the functioning of society and economy, including power grids, water supply systems, transportation networks, and communication systems. These infrastructures are highly interconnected and interdependent, making them vulnerable to various threats, including cyber-attacks, natural disasters, and physical attacks. This paper provides an overview of critical infrastructure security, including the current state of critical infrastructure protection, the challenges in securing critical infrastructure, and the best practices for improving critical infrastructure security.
1:30-1:50 EDT
In today’s rapidly evolving digital landscape, organizations are struggling with diverse methods of interaction with employees, customers, and partners through a multitude of technologies. This complexity often leads to a lack of control over Identity and Access Management (IAM), leaving organizations vulnerable to security threats and compliance issues. The cost of ignoring the risk can haunt you for years however, you cannot correct what you don’t know, so the first steps are assessing whether your organization is positioned for a successful implementation, migration or fix and, validating the organization is focused on the right path and/or issue they are looking to mitigate. Join us as we demonstrate a proven, 3 stage, IAM Strategic Assessment model that is NIST compliance driven answering the “what, where, when, why and how” surrounding both Workforce Identity & Access Management and Customer Identity & Access Management (CIAM) programs, projects and operations.
1:50-2:10 EDT
In today’s digital age, the threat of cyber attacks looms large, with hackers constantly devising new methods to breach networks and compromise sensitive data. This talk delves into the intricate world of hacking, shedding light on the techniques employed by cyber intruders to infiltrate networks and exploit vulnerabilities within company defenses. From phishing scams to sophisticated malware, we’ll explore the diverse arsenal at hackers’ disposal and examine the critical points of weakness that leave organizations susceptible to attack. By understanding the modus operandi of hackers and pinpointing areas of vulnerability, companies can fortify their defenses and safeguard against potential threats in the ever-evolving landscape of cybersecurity.
2:10-2:35 EDT
2:35-3:05 EDT
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
3:05-3:35 EDT
3:35-4:30 EDT
The Cybersecurity Summit will be giving away an InfoSec world VIP pass during the cocktail reception to one lucky winner. ($2,400 value)
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |