CPO,
ThreatLocker
Upcoming Summits
Cybersecurity Summit
8 CPE/CEUs with full attendance
In-Person Summit
Fri, January 26, 2024
7:30AM - 5:00PM EST
Hilton Tampa Downtown
Bayshore Ballroom
211 N Tampa St
Tampa, FL, 33602
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852
The Fifth Annual Tampa Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Defining Cybersecurity-Readiness: How do you evaluate yours?
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
2024 & The Biggest Threats to Your Business
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Conceptualizing Cloud Security & Why it Matters Today
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30 EST
8:30-9:00 EST
9:00-9:30 EST
Explore the powerful intersection of artificial intelligence (AI) and video analytics for protecting physical assets of cyber systems, and how these technologies can revolutionize physical security by providing proactive and intelligent monitoring capabilities.
9:30-9:55 EST
In this Keynote, we will review how Cisco has modernized the NGFW to accommodate this ever-changing environment. Gaining deep visibility and applying consistent protections to those workloads is paramount. Learn how the platform works to provide a coherent, consistent, and secure outcome.
9:55-10:30 EST
10:30-10:45 EST
In this informative session, we will step into the eye of the cybersecurity storm in a session that exposes the profound shift in the cyber battleground brought by Generative AI. Last year witnessed record losses to phishing and ransomware attacks, but as they say in showbusiness, “you ain’t seen nothing yet!” Learn how the incredible power of Generative AI, that helps fortify cybersecurity defenses, is also arming cybercriminals with formidable new capabilities, transforming them into much more dangerous digital adversaries threatening every type and size of organization across every industry. This session explores the shadowy world of hacker innovation and the impact of generative AI on the most dangerous and destructive attack methods, along with the next-generation defense strategies that will become necessary.
10:45-11:10 EST
When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it?
Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats. Can proper data governance, risk management (including managing 3rd party risk and supply chain risk) and compliance provide a framework to always being ready?
Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more.
11:10-11:35 EST
In a world where anyone can create successful malware or have AI generate it for them, it’s important to know how malware can be successful so you can better defend. Starting from a default-deny posture, learn how adopting Zero Trust principles can keep your data safe and operations running regardless of hacking attempts by man or machine.
11:35-12:00 EST
Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster and more accurately. In this talk, we’ll show some examples of how AI can help predict risk, cut through complexity when making risk decisions and even help to retain senior staff while keeping them focused on the tasks that matter most.
12:00-12:25 EST
In the face of budget limitations, organizations can strategically enhance their cybersecurity posture by ensuring they have network visibility and utilizing artificial intelligence (AI). Network visibility serves as a foundational element to achieving zero trust and mitigating threats on your network by providing crucial insights into network activities. Simultaneously, AI technologies significantly contribute to threat detection & incident response and help close the workforce skill gap with a result of overall better network resilience.
In this session we’ll discuss how the synergistic integration of network visibility and AI enables organizations to maximize the efficiency of their security operations while minimizing costs.
12:25-1:05 EST
1:05-1:50 EST
What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight?
On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption.
Kennashka DeSilva
Communications Co-Coordinator
WiCyS Florida
MODERATOR
Josh Schofield
Principal Product Manager
NinjaOne
Mark Liggett
Senior Sales Engineer
Trend Micro
Justin Endres
Chief Revenue Officer
Seclore
David Van Heerden
Product Evangelist
Automox
Maurice Côté
VP Products
Devolutions
John TerBush
Threat Intelligence Researcher
Recorded Future
1:50-2:15 EST
A quick overview of current breaches, their impacts and 3rd party curveballs. Today more than ever zero-day threats continue to successfully gain entry into the enterprise. Join us to speak about some of the new breaches we are seeing and how a layered security approach is the best protection.
2:15-2:40 EST
Legacy SOAR (Security Orchestration, Automation and Response) technology promised to revolutionize the practice of security operations. Unfortunately, the first generation of these platforms have gained a reputation for rigid playbooks that require extensive development resources, poor case management features, and limited use cases. That’s why Swimlane developed a more modern and extensible approach to security automation.
2:40-3:15 EST
3:15-3:40 EST
Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing.
That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit.
Today we will discuss all things cloud so you know what works best for your organization.
Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud.
3:40-4:05 EST
For the past decade, cyber security defense for enterprise organizations centered on what is known. Threat detection and response methodologies across people, process and technology have relied heavily on signatures, anomalies, rules to see and stop cyber criminals from infiltrating the organization and exfiltrating data. The problem with this approach is that it’s broken. As organizations shifted to hybrid and multi-cloud environments, embracing digital identities, digital supply chains, and ecosystems, security, risk, and compliance leaders, architects and analysts are continuously faced with more.
· More attack surface for attackers to exploit and infiltrate.
· More methods for attackers to evade defenses and progress laterally
· More attack noise, complexity and hybrid cloud incidents
We call this the “spiral of more” and as organizations shift more applications and data to the cloud, the bigger the spiral becomes and the faster it accelerates, creating more challenges for SOC teams. Learn how AI can break this spiral, as Vectra, the pioneer in security AI is laser focused on supporting those on the front lines of cyber do just that.
4:05-4:30 EST
4:30-5:00 EST
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Chase McGahan at Chase.McGahan@CyberRiskAlliance.com or call at 212.655.4505 ext 251.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |