Supervisory Cybersecurity Advisor,
Cybersecurity and Infrastructure Security Agency (CISA), U.S. DHS
Upcoming Summits
The Inaugural Tampa / Florida Region Cyber Security Summit goes virtual as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is now FREE giving you access to all Keynote Discussions, Interactive Panels and Product Demonstrations.
Tuesday, July 28, 2020
8:00AM - 5:30PM EDT
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 3 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
QUESTIONS
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact BRand@CyberSummitUSA.com or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
8:00-9:00
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
By visiting each booth, you will be automatically entered to win
a $500 Amazon gift card!
9:00-9:30
Andrew Sekela
Special Agent
The FBI, Tampa Field Office
9:35-10:20
Nicole Eagan
Chief Strategy Officer and AI Officer
Darktrace
Global disruption has taught us that the only thing that is certain, is things will remain uncertain – and that business leaders need to remain confident that their operations can continue securely in the face of global or even regional events. Though parts of the world are re-opening, attackers have not slowed down and may be even lying in wait to take advantage of the next disruption.
Traditional, static, legacy approaches to security consistently prove both unintelligent and ill-equipped to adapt. Organizations often find themselves undergoing a delicate balancing act—each new work practice and technology that is needed to adapt, evolve, or even grow also brings unforeseen risk.
This session will explore how Cyber AI allows organizations to achieve much-needed adaptability and resilience, ensuring both seamless transition and the ability to disrupt attacks in the earliest moments. In the face of an uncertain present and future, Cyber AI enables businesses to continue communicating, operating, and innovating.
10:20-10:35
Experience and evaluate the latest cutting-edge solutions for your company.
By visiting each booth, you will be automatically entered to win
a $500 Amazon gift card!
10:35-11:00
Jeff Costlow
Deputy CISO
ExtraHop
As enterprises have become increasingly reliant on technology for every aspect of operations, technical executives like CIOs and CISOs have found themselves in a completely new operations center: the boardroom. This shift is more recent for CISOs, who increasingly must demonstrate security and compliance at a board level. This move can present a significant challenge. Board members are often not well-versed in technology or security best practices, let alone jargon. At the same time, CISOs (and CIOs) often lack the business experience to speak in terms that the board can understand, defaulting to technical discussions that the board can’t parse.
This breakdown in communication can have a cascade effect. The board might fail to fully understand the security risks posed by a certain initiative. Or, with the growing number of costly and embarrassing security breaches, they might overemphasize caution and risk mitigation at the expense of implementing important technical advancements.
In this session, attendees will learn strategies for discussing security and technology priorities at the board level.
In addition to providing board-conversation strategies, attendees will also learn how shifting board composition is changing the dynamics on cybersecurity and technology conversations.
11:05-11:30
Eddie Doyle
Cyber Security Evangelist
Check Point Software Technologies
11:30-11:45
Experience and evaluate the latest cutting-edge solutions for your company.
By visiting each booth, you will be automatically entered to win
a $500 Amazon gift card!
11:45-12:25
Sean Atkinson
Chief Information Security Officer
Center for Internet Security
MODERATOR
Regine Bonneau
CEO & Founder
RB Advisory LLC
Sean Frazier
Advisory CISO - Federal
Duo Security
Scott Giordano
V.P., Data Protection
Spirion
Adam Palmer
Chief Cybersecurity Strategist
Tenable
Marcus Session
VP, Information Technology
Tampa International Airport
Security teams today are being overwhelmed by the massive amounts of data collected by their various protection tools and in most cases, these security teams do not have the budget to hire external Security Operations Center (SOC) analysts. As such, companies are looking to implement an automated response system by using SOAR (Security Orchestration, Automation and Response) tools in an effort to relieve some of the burden on their already understaffed security teams and increase efficiency.
In a recent survey of more than 1,400 IT security professionals, 79% reported that their organization has existing automation tools and platforms in place (29%) or are planning to implement them within the next six months to three years (50%). However, this is not a simple solution for many companies as the successful implementation of automation requires a well-trained and educated team. In fact, 56% of organizations from this same survey indicated that they don’t currently have the in-house expertise required to effectively use these tools. This presents a problem as the shortage of gap between workforce demands and skilled cyber security professionals in the field is larger than ever and steadily increasing. According to another report, it is projected that by 2021, 3.5 million cyber security jobs will be unfilled; that’s a 350% increase in open positions from 2013 to 2021.
This panel will provide an understanding on SOAR tools, the importance on training your security team to understand and leverage these tools to more rapidly detect and respond to threats, and ways to attract and retain talent.
12:30-12:50
12:50-1:05
Experience and evaluate the latest cutting-edge solutions for your company.
By visiting each booth, you will be automatically entered to win
a $500 Amazon gift card!
1:05-1:30
Richard Dean
Assistant to the Special Agent in Charge
U.S. Secret Service, Tampa Field Office
1:35-2:00
Gina Scinta
Senior Solutions Architect
Thales
We all know that the operating paradigm in which business is conducted changes on almost a daily basis, yet the way we defend the sensitive data within our business has remained static for nearly 3 decades. Perimeter security is not sufficient, and that’s why we have embraced the concept of Securing the Breach by protecting the data at rest, in transit and in motion utilizing a three step approach of strong centralized key management, encrypting the data and controlling access thru identity access management.
This presentation will address our three step approach to data protection and how it can enable organizations to meet compliance mandates, mitigate risk and secure their infrastructure from on premise to the cloud.
Gain insight on how to prepare for the breach and protect what truly matters—your data.
2:00-2:15
Experience and evaluate the latest cutting-edge solutions for your company.
By visiting each booth, you will be automatically entered to win
a $500 Amazon gift card!
2:15-2:55
Sean Atkinson
Chief Information Security Officer
Center for Internet Security
MODERATOR
Tony Anscombe
Chief Security Evangelist
ESET
Christopher Chandler
Public Cloud Security Systems Engineer
Palo Alto Networks
Duncan Godfrey
Sr. Director of Security and Compliance
Auth0
JP Perez-Etchegoyen
Chief Technology Officer
Onapsis
Rex Tolman
Chief Information Security Officer
Kforce, Inc.
According to a recent survey, last year 69% of organizations suffered a data breach caused by an Insider Threat, even with a data loss prevention (DLP) solution in place. While malicious users are a legitimate threat to an organization’s security, another study found that 64% of incidents were a result of human error made by an employee. In fact, 78% of Chief Security Officers confessed that even they have clicked on suspicious links.
These statistics demonstrate that having a DLP solution in place with a centralized IT Security team is not sufficient in protecting company assets. Organizations must also address the human element and provide effective ongoing training and education to all employees within the organization.
This panel will discuss the importance of understanding and detecting the various types of Insider Threats that put your organization at risk, as well as provide insight on how to prepare a prevention and defense strategy against an insider breach.
3:00-3:25
George Avetisov
CEO & Cofounder
HYPR
Modern tools such as SNIPR and Modlishka make it easier for hackers to launch large-scale automated attacks, bringing credential re-use and two-factor-authentication attacks to record highs. How did we get here, and will mainstream adoption of passwordless security have an impact?
We will explore how the rise of virtual desktop infrastructure has affected workstation login and review how the evolution of authentication has impacted organizations’ identity and access management systems.
In this session, you’ll learn:
• Why is Credential Reuse at All-time Highs?
• How has Authentication Evolved?
• Why this is the Passwordless Decade
3:25-3:40
Sam McLane
Chief Technical Services Officer
Arctic Wolf
It is important to recognize that, overall, the industry has an effectiveness problem. The escalation in threat activity and the talents shortage in the industry has created a situation where, despite lots of products and cybersecurity spend, we aren’t getting better protection. To put a finer point on it, there are over 3,000 vendors selling products in the industry. The total spend last year was $120B+ and even with all of that there we almost 4,000 breaches — a 96% increase over the previous year. The key takeaway from these breaches is that they are NOT product failures. They are operational failures. To prevent these kinds of breaches from happening again in the future, we believe, the industry needs to adopt a new approach – an operational approach – to cybersecurity.
4:10-4:35
Chris Goettl
Director of Product Management
Ivanti
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially. Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment. Join us as we discuss how continuous vulnerability management can be executed effectively.
4:40-5:10
During this session, Cybersecurity Advisor Klint Walker will discuss:
5:10-5:30
Experience and evaluate the latest cutting-edge solutions for your company.
By visiting each booth, you will be automatically entered to win
a $500 Amazon gift card!
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at MHutton@CyberSummitUSA.com or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |