Security and Threat Intelligence Research Manager,
Lookout
Upcoming Summits
Cybersecurity Summit
CPE/CEUs with full attendance
In-Person Summit
Thu, September 19, 2024
8:00AM - 5:30PM EDT
Cipriani Wall Street
55 Wall Street
New York, NY, 10005
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 225
The Inaugural New York/Wall Street Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Lunch & Cocktail Reception.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Supply Chain Attacks
Supply chain attacks make it possible for cyber attackers to circumvent security controls by creating avenues to sensitive resources through a target’s third-party vendor.
Ransomware
Ransomware and Ransomware-as-a-Service is a critical cyber risk to financial services. During a ransomware attack, cybercriminals lock victims out of their computers by encrypting them with malware. The damage is only reversed if a ransom is paid.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
8:00-9:00 EDT
9:00-9:30 EDT
9:30-10:00 EDT
Support from fellow executives, clarity in board communications, and demonstrable alignment with industry regulations all influence the success of a security transformation more than is commonly realized. In this session, experienced technologist and veteran CTO and financial services industry leader, Gregory Simpson explains how interpersonal dynamics influence everything from establishing a phased deployment plan to reporting on success metrics. Learn the skills and tools that help ensure everyone, from directors to end users, is united behind your project while exploring this important, if often overlooked, topic.
10:00-10:30 EDT
Emerging technologies present significant opportunities but also heighten existing risks and introduce new cyber threats. For financial institutions, the traditional practice of cyber risk management is increasingly crucial as new technologies expand their digital footprint. Cyberattacks are becoming more frequent and sophisticated, with well-funded criminal groups using advanced tools, including generative AI, to enhance their strategies. This evolving threat landscape highlights the urgent need for robust risk management and agile incident response frameworks. Financial institutions must fortify their defenses and refine their incident response capabilities to stay ahead of emerging threats, ensuring they can protect their assets and maintain operational resilience in an increasingly complex cyber environment.
10:30-10:50 EDT
10:50-11:20 EDT
11:20-11:55 EDT
Ransomware and Ransomware-as-a-Service is a critical cyber risk to financial services. During a ransomware attack, cybercriminals lock victims out of their computers by encrypting them with malware. The damage is only reversed if a ransom is paid.
11:55-12:15 EDT
12:15-12:35 EDT
In today’s rapidly evolving digital landscape, organizations are struggling with diverse methods of interaction with employees, customers, and partners through a multitude of technologies. This complexity often leads to a lack of control over Identity and Access Management (IAM), leaving organizations vulnerable to security threats and compliance issues. The cost of ignoring the risk can haunt you for years however, you cannot correct what you don’t know, so the first steps are assessing whether your organization is positioned for a successful implementation, migration or fix and, validating the organization is focused on the right path and/or issue they are looking to mitigate. Join us as we demonstrate a proven, 3 stage, IAM Strategic Assessment model that is NIST compliance driven answering the “what, where, when, why and how” surrounding both Workforce Identity & Access Management and Customer Identity & Access Management (CIAM) programs, projects and operations.
12:35-1:35 EDT
1:35-1:55 EDT
Whether you see it as good, bad, or indifferent, AI is here to stay and it’s changing the way software is developed. We can now give instructions to large language models and instantly be greeted with the code needed to build applications or features. This trend is only going to increase and with the speed and scale it offers, continue to be leveraged by more organizations.
But there is still a very real human element to this. AI is not designing software, it is taking human readable language as a design and building the code. It is clear that in the building of software, AI puts the emphasis in design. The same is true of application security. When you are not writing the code how do you ensure it is secure code? You can’t do it in the build stage, the AI is building it for you, and sure, you could do it in the testing phase, but good luck with that bottleneck. We need to rethink, or relook at building security in – at the design phase.
The good news is that we already have the tools and processes needed. In this talk, we’ll see how secure by design principles and threat modeling are the arsenal we need when securing software in the age of AI.
1:55-2:15 EDT
Regulators worldwide are addressing operational resilience. Because of the rising likelihood of disruptions and their potential cascading effects, particularly in the financial sector, international regulators are collaborating to establish best practices and harmonize approaches. In this session, we’ll review some of these regulations and discuss how network analysis and visibility can help you prepare for, adapt to, and withstand or recover from disruptive events.
2:15-2:35 EDT
2:35-2:55 EDT
2:55-3:25 EDT
Supply chain attacks make it possible for cyber attackers to circumvent security controls by creating avenues to sensitive resources through a target’s third-party vendor.
3:25-3:45 EDT
Learn about what’s actively happening in the last quarter in the ransomware ecosystem. Halcyon’s professional services team has the largest private research on ransomware payloads and their tools. We engage daily with federal law enforcement, cyberinsurance carriers, breach coaches, and DFIR firms to assist victims on ransomware recovery so we get an in depth view of the threat actors, how they’re being successful, and what is happening on victim’s networks.
From that experience, we provide stories and trends to illustrate how ransomware is constantly evolving to overcome the challenges of having to collaborate amongst criminal groups. As any business model, it must adapt and the recent business pressures in ransomware are coming from decreasing payout rates, improved security controls, and recent law enforcement actions. Halcyon breaks down five specific trends that are the catalyst in new behaviors from ransomware operators and RaaS groups that have helped them continually generate more revenue than ever in 2024. Halcyon provides the supporting data, business pressures, and the countermeasures that organizations can take to adapt to these changing areas. Mixed in are as many stories from recent events and cases that Halcyon has been engaged on to provide color to this continually developing world.
3:45-4:15 EDT
4:15-5:00 EDT
The Cybersecurity Summit will be giving away an InfoSec world VIP pass during the cocktail reception to one lucky winner (a $2,400 value).
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Franki Rosenthal at Franki.Rosenthal@cyberriskalliance.com or call at (954) 560-7327.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |