Senior Solutions Architect for Security,
Druva
Upcoming Summits
Cybersecurity Summit
8 CPE/CEUs with full attendance
In-Person Summit
Thu, March 7, 2024
7:30AM - 6:00PM PST
Marriott Marquis San Diego Marina
Pacific Ballroom
333 W Harbor Drive
San Diego, CA, 92101
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852
The Fourth Annual San Diego Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 852
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30 PST
8:30-9:00 PST
9:00-9:30 PST
On July 26, 2023, the SEC adopted new rules requiring registrants to disclose their cybersecurity risk management strategy and governance, as well as the material impact of cybersecurity incidents. This reflects a larger global trend of regulators requiring more accountability for incident readiness and response, or IRR. As security leaders come under more and more scrutiny, what proactive measures should they be considering for risk mitigation and incident preparedness? And how are security leaders planning for incident response to ensure they are containing and eradicating threats, recovering affected systems, and learning from incidents to improve their security posture? Join this session for new data from a survey of 500 security leaders on IRR that sheds light on what they are prioritizing today and planning for tomorrow.
9:30-10:00 PST
10:00-10:25 PST
10:25-11:05 PST
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it?
Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats. Can proper data governance, risk management (including managing 3rd party risk and supply chain risk) and compliance provide a framework to always being ready?
Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
11:05-11:20 PST
In this informative session, we will step into the eye of the cybersecurity storm in a session that exposes the profound shift in the cyber battleground brought by Generative AI. Last year witnessed record losses to phishing and ransomware attacks, but as they say in show business, “you ain’t seen nothing yet!” Learn how the incredible power of Generative AI, that helps fortify cybersecurity defenses, is also arming cybercriminals with formidable new capabilities. This transformation will make them much more dangerous digital adversaries increasing the threat to every type and size of organization across every industry. Attendees will see the tools that cybercriminals use, and they will gain an understanding of the impact of generative AI on the most dangerous and destructive attack methods. The session will also present the next-generation defense strategies that will become necessary.
11:20-11:40 PST
As we step into 2024, it’s clear that Software Bill of Materials (SBOMs) are finally evolving beyond a buzzword, becoming indispensable for security and legal compliance in software development. The U.S. government and regulatory bodies around the globe have incorporated SBOMs into new cybersecurity legislation and software supply chain protections – and with good reason. Without an SBOM, companies risk being blind to known-vulnerable open source components being shipped in their software applications, and much like Equifax did in 2017, will struggle to respond to new zero day vulnerability disclosures in open source components. Join Sonatype as we explore how SBOMs can enhance resilience in the face of evolving threats, discuss best practices for effective SBOM management, and provide guidance for easily integrating SBOMs into your workflow.
11:40-12:00 PST
There seems to be a new article every day covering the intersection of artificial intelligence (AI), machine learning (ML), and the security industry. Vendors are suggesting that AI has the potential to act as a team member, replace missing expertise, and reduce headcount for detecting, investigating, responding to, and predicting new cyberthreats. The concept of a fully computerized SOC may be a dream in a world lacking cybersecurity professionals, but can it be realized?
Increasing the autonomy of the SOC is a noble goal, especially for smaller organizations struggling to hire and retain the necessary cybersecurity skills. However, the need for self-learning and self-repairing capabilities in an autonomous SOC raises an important concern: If your IT and security system becomes self-referential and self-healing, how can you investigate to ensure it’s getting it right? Who watches the watchers?
This discussion will explore:
12:00-12:20 PST
Our lives, both personal and professional, are intertwined with Wi-Fi. Everyone is online everywhere, be it a cafe, office, or at home. With AI doing most of our tasks in seconds, we rely on generative AI tools to get work done faster. Two questions: 1. What are we losing by connecting to high-speed free Wi-Fi at any place? 2. What are we losing by getting work done using AI tools?
Let’s get straight answers and staggering security concerns out of the way in my session. See you there!
12:20-1:00 PST
1:00-1:45 PST
What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight?
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Victor Monga
Senior Cybersecurity Executive
ISACA Orange County
MODERATOR
Tony Goulding
Senior Director in Technical Product Marketing
Delinea
Dimari Epps
Regional Vice President of Sales - West
Seclore
Benjamin Longuechaud
Senior Sales Engineer
Thales
Michael Micolino
Staff Sales Engineer
Proofpoint
Jason Dablow
Principal Engineer
Trend Micro
Josh Harguess
AI Security Chief
Cranium
Rick McElroy
Cybersecurity Expert
1:45-2:05 PST
Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster and more accurately. In this talk, we’ll show some examples of how AI can help predict risk, cut through complexity when making risk decisions and even help to retain senior staff while keeping them focused on the tasks that matter most.
2:05-2:25 PST
2:25-2:45 PST
2024 will mark the pivot point when software security finally gets the attention it has been lacking. The impetus for transformation will be driven by the innovation opportunities of AI and the rise of regulation focused on creating better security outcomes for customers. Join Francis Ofungwu, GitLab Global Field CISO, in this high-level overview. He will examine standards and regulations your software and application security programs should care about, the impact of non-conformance on your business, and recommendations on how to prepare for this sea change.
2:45-3:10 PST
3:10-3:55 PST
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Dave Tuckman
President
ISACA San Diego
MODERATOR
Lance Ophof
Senior Zero Trust and SASE Specialist
Cloudflare
Galen Emery
Director of Engineering
Lacework
Travis Pinto
Systems Engineering Mgr, West
Netskope
Brent Schroeder
CTO
SUSE
Abhinav Sukumar
Sr Solutions Engineer
Okta
Jordan Benzing
Security Engineering Lead
Patch My PC
3:55-4:15 PST
Artificial Intelligence (AI) promises revolutionary potential within the cybersecurity domain. However, successful AI integration can be hindered by common shortcomings such as poorly defined use cases and a lack of proper data engineering leading to issues of AI hallucination.
This presentation delves into the strategic incorporation of AI within Mandiant Advantage, demonstrating how we’ve circumvented typical AI pitfalls. We’ll highlight concrete examples of AI implementation in both Mandiant Advantage Threat Intelligence (MATI) and Google Chronicle. Emphasis will be placed on how these AI-powered tools lessen the workload on analysts while simultaneously lowering the knowledge barrier for effective analysis.
4:15-4:35 PST
Data protection has evolved to become something far more nuanced and powerful than simply data backup and restore.
4:35-5:00 PST
5:00-5:40 PST
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |