Chief Information Security Officer,
Center for Internet Security
Upcoming Summits
Cyber Security Summit
8 CPE/CEUs with full attendance
In-Person & Virtual Summit
Fri, May 13, 2022
7:30AM - 6:00PM CDT
Marriott St. Louis Grand
Landmark Ballroom
800 Washington Ave
St. Louis, MO, 63101
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 247
An event access code will be emailed to all in-person attendees prior to the summit.
The Second Annual St. Louis Cyber Security Summit returns In-Person and Virtually Live-Streamed as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Securing the Cloud
This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.
Ransomware and Resiliency – To Trust or Not Trust?
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Our lineup of Industry Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting the latter can help companies stay resilient as ransomware threats continue to grow.
Learn
Our conferences have been rated as one of The Top 5 InfoSec Conferences Worldwide for the last 4 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Flexibility
Our mission is to bring the Cyber Summit experience to as many executives as possible. In 2022, all attendees have the option of attending either in-person to engage face-to-face with leading solution providers or virtually from the comfort of your own home/office. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 8 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:00 CDT
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
8:00-8:30 CDT
As the nation’s cyber defense agency, CISA stands ready to help organizations prepare for, respond to, and mitigate the impact of cyberattacks. Chris will discuss the threat landscape, share practical tips, and introduce the many resources CISA provides to help build resilience into the overall cyber ecosystem.
8:30-9:15 CDT
8:30-9:15 CDT
Fast-moving cyber-attacks can strike at any time, and security teams are often unable to react quickly enough. Join Darktrace Director of Analysis, Brianna Leddy, to learn how Autonomous Response takes targeted action to stop in-progress attacks, without disrupting your business. Includes real-world threat finds, case studies and attack scenarios.
· Topic for this session– Autonomous Response –
· Explore today’s threats and challenges
· How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously – where humans can no longer react fast enough.
9:15-9:50 CDT
With the potential ability to shut down an entire organization and prevent it from executing its mission, ransomware is still the leading threat; in 2021 it represented 21% of all attack types according to the latest X-Force Threat Intelligence Index report. These attacks not only test almost every aspect of technical defenses, but also on a broader level, an organization’s ability to maintain minimum viable functionality and delivery of services, while responding.
On the plus side however, from hundreds of client engagements, IBM has not only mapped out each of the attack stages and how they can be disrupted, but also how to initiate a CISO driven, cultural shift, towards an organizational wide resiliency strategy, suitable for this particular threat, as well as many others.
Join us to hear what we have learned and where best to augment your defenses against these attacks.
9:50-10:15 CDT
Your security team manages risks that affect business units and functions across your entire organization. Security is threaded through every aspect of your business, and your decisions have never mattered more. On a regular basis, you make decisions that affect day-to-day operations, data and system security, executive-level strategy and quite possibly, the future success of your organization. Security leaders straddle the lines of executive, strategic, and tactical decision making, and must be experts at navigating all three. We’re wearing many hats, often switching between them from meeting to meeting, and it’s imperative that we can effectively communicate and drive decisions that improve and mature our security efforts to mitigate risk across the board.
This session will explore ways to enhance engagement with technical teams, business units and executives alike, while still maturing your security program to be more efficient and effective at managing and mitigating risk. Concepts and topics covered will include:
10:15-10:35 CDT
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
10:35-11:20 CDT
Cloud innovations continue to drive the rapid adoption of cloud services, which offer numerous advantages such as increased flexibility, better scalability, cost savings, higher productivity, and resiliency. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches.
This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud.
11:20-11:45 CDT
Ransomware has made its mark in cybersecurity since the first reported case of an attack in 1989 that targeted Healthcare.
As time has progressed, we have seen an evolution in the quality of ransomware code, delivery mechanisms, and extortion methods.
History has a way of teaching us ways to look at things differently, and becoming antifragile is an approach to acknowledge the chaos from ransomware and grow stronger.
11:20-11:45 CDT
What are the top security challenges companies experience when migrating, developing and running applications in the public cloud? Our session will review this along with Gartner’s defense-in-depth model for developing a secure cloud architecture.
According to Gartner, through 2025:
99% of cloud security failures will be human error (misconfigurations being most common).
90% of organizations that fail to control public cloud use will inadvertently leak sensitive data.
If you don’t want to be part of these predictions, join us for our presentation. We will help you gain an understanding of best practices for implementing a comprehensive cloud security posture management program and a proven methodology to get there.
11:45-12:10 CDT
Most organizations see over 11,000 alerts per day from an average of 6.8 threat intelligence feeds, according to a 2020 Palo Alto networks report. With the overwhelming volume of alerts from various security tools, security analysts are unable to keep up with every new alert. With the lack of prioritization, alerts can slip through the cracks, increasing the risk of irreversible damage. The sheer volume of daily alerts leads to alert fatigue.
Join Deepwatch Field CTO, Tim West, for a live presentation to learn how to rethink your alert management and security operations to reduce the noise and find better security focus.
Attendees can expect to learn:
11:45-12:10 CDT
Staffing your organization with an experienced security team or SOC has become an increasingly difficult task. Join this session for an insightful conversation to learn how to solve for the cybersecurity skills gap including common issues to avoid, warning signs to look out for, and strategies for combating these issues.
12:10-12:35 CDT
The Shuttle Challenger tragedy was a major turning point in the NASA Space Program. What appeared at first to be a random accident quickly became a case study in how trivial amounts of risk acceptance can snowball into a disaster. What lessons can we as security professionals learn from this tragedy, and how do we apply them to our everyday lives?
12:35-1:10 CDT
1:10-1:35 CDT
1:35-2:00 CDT
Multi-generational data sprawl leads to data fragmentation, an increased surface for cyberattacks, complicates automation and process efficiency efforts, and increases the potential risk of a successful ransomware attack. When ransomware strikes, simplicity and scalability are critical to minimize disruption and resume business operations quickly. Learn how to reduce the attack surface across workloads and best practices to protect, detect, and recover from ransomware threats through multi-layered security and Zero Trust Principles for on-premises, SaaS applications, cloud, and hybrid infrastructures with a unified experience.
2:00-2:45 CDT
As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, it’s imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. For many companies today, that means foregoing the traditional “trust but verify” perimeter-based security and implementing Zero Trust framework built on the principle of “never trust, always verify”. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. In fact, last year in his Executive Order on Improving the Nation’s Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture.
This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Should companies pay hackers to get their data back or will that backfire? Our lineup of Subject Matter Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting strategies and policies that can help companies stay resilient as ransomware threats continue to grow.
2:45-3:10 CDT
3:10-3:25 CDT
3:25-3:50 CDT
Good security gets out of the way of users while getting in the way of adversaries. Passwords fail on both accounts. What holds us back from getting rid of passwords? Trust. In this session, we will propose a framework of technical controls to ensure only trusted sessions authenticate, regardless of faults or failures in any one factor. We will share a path forward for increasing trust in passwordless authentication.
3:50-4:15 CDT
4:15-4:40 CDT
As we settle into life with COVID, the topic of zero trust security and a remote workforce is top of mind for all enterprise security teams. During this session you’ll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises – Adobe & Cisco. They will share their experiences and tips for rolling out zero trust methodologies at scale.
4:40-5:00 CDT
SaaS platforms are used by nearly everyone but SaaS security is often overlooked. That can be for a variety of reasons: Perhaps the security team doesn’t understand the nuances and settings for each different SaaS application in use. Perhaps the SaaS owners don’t understand security risks while configuring the apps, and don’t bring in the security team to help. Bridging this gap and ensuring appropriate SaaS security is in place is crucial in today’s dynamic world.
5:00-6:00 CDT
To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance until 5:00PM. In order to claim any raffle prizes, you must be present during the cocktail reception.
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSecuritySummit.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |