Cyber Security Advisor,
U.S. Department of Homeland Security
Upcoming Summits
The Scottsdale Cyber Security Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is $350 each, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Thursday, October 17
7:45AM - 6:00PM
6333 N. Scottsdale Rd.
Scottsdale, AZ 85250
Insider Threat
What the CISO and Every IT Security Management Team Must Face & Govern 24/7
Cloud INsecurity
Common Pitfalls that Organizations Make when Moving to the Cloud and How to Avoid Them
Incident Response
What to do Before, During and After a Breach
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 3 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
5All Inclusive
During the summit, all of your meals, refreshments and snacks are included. We provide a catered breakfast, lunch & cocktail reception for all of the attending delegates for one low price. You may also indulge in complimentary cigars at the conclusion of each event.
CEUs
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
7Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
8Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment set within a luxury venue.
9Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
10Cyber Crime
Cyber Crime is the fastest growing threat to businesses globally. Secure your critical infrastructure before it’s too late!
QUESTIONS
For any questions, please contact [email protected] or call 212.655.4505 ext. 225
VOLUNTEERING
Interested in volunteering at the Cyber Security Summit? Please email Lindsay Wess at [email protected]
Active Students Only
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact [email protected] or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:45-9:00
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
9:00-9:30
Joe Hooper
Supervisory Special Agent
The FBI
Jim Knapp
Assistant U.S. Attorney
9:30-10:00
Tommy Nguyen
Manager
Darktrace
The digital enterprise is constantly expanding, with new IoT, cloud, and operational technologies all challenging traditional notions of cyber security. Safeguarding these evolving environments against machine-speed attacks has never been more difficult.
Yet the digital battleground now features its most formidable defender in Cyber AI — a self-learning technology that distinguishes friend from foe in order to thwart threats autonomously. With the Cyber AI Platform protecting your entire infrastructure in real time, it doesn’t matter whether the attack originates on a connected device, an industrial system, or in the cloud. Wherever it strikes, the AI fights back in seconds.
In this session, you’ll discover:
10:00-10:30
Danelle Au
Chief Strategist
Blue Hexagon
The collective efforts of attackers have fundamentally changed the cyberdefense game. Today, adversaries are sophisticated, creative and tenacious -- launching attacks at unprecedented rates and volumes. Blue Hexagon Chief Strategist Danelle Au will dive into the threat landscape including new attack vectors and how they are delivered. She will present a new approach to detect network threats using deep learning. Deep learning neural networks can learn and intelligently make decisions on malware, even zero days seen for the first time. In this session, hear about why advances are possible today and how organizations worldwide are harnessing deep learning address the modern threat landscape.
11:00-11:30
Steve Gold
Vice President of Cybersecurity Solutions
Center for Internet Security
MODERATOR
Charlie Bollom
AVP of Sales
ExtraHop
Ryan Davis
Chief Information Security Officer
Veracode
John McClurg
Vice President, Ambassador-At-Large
Blackberry Cylance
Today 86% of organizations are in the process of building or already have an existing system in place to prevent/defend against insider attacks; if this statistic proves anything it is that more and more business are coming to terms with the hostilities of our world. Expected or unexpected, an employee with access to company-wide systems, no matter their intentions is a great threat to any organization. An employee with malicious intentions is dangerous, but according to a recent IBM survey, 95% of all breaches involved someone making a mistake. The Insider Threat panel at the Cyber Security Summit will show you how your organization is at risk, as well as showing you innovative & necessary steps to take in order to prevent attacks and increasing your defense systems.
11:30-12:00
Todd Rossin
CEO & Chief Strategist
IDMWORKS
Organizations process and store huge volumes of sensitive information that belong to their customers and employees – from financial information to medical records to personal identifiers, like social security numbers and birthdates. Inadequate controls in IAM processes and technology can lead to breach, involuntary exposure of this data, and non-compliance issues.
But you cannot correct what you don't know, so the first step in any IAM program is assessment.
IDMWORKS CEO & Chief Strategist, Todd Rossin, will address the most common questions around IAM Assessments & Roadmaps - Why Should We Assess? What Should We Assess? and When Should We Reassess?
12:00-12:30
Sean Brehm
Chairman and CEO
@RISK Technologies, Inc.
All Artificial Intelligence is not the same. If A.I. mimics human behavior, what human do you mimic? @RISK presents the value of fusing human tradecraft, machine learning and big data to provide a real-time, quantified approach for managing enterprise wide cybersecurity and risk. @Risk’s application of A.I. and machine learning, fused with incident data, SIEM events, and threat intelligence results in a ‘new’ harmonized view of the network.
Specifically, “Network Consensus” synchronizes existing security products using: netflow and packet capture techniques, Dark Web Queries, and Attack Avenue testing in conjunction with IBM Watson’s Machine Learning and Cognitive Computing capabilities. The result is a real-time “situational awareness” for executives, managers and technical staff that provides a single view of the enterprise’s cyber security status and is measured through a balance scorecard.The benefits of automating Post Incident Digital Forensic Investigation (DFI) and its reuse for Pre-Incident Discovery will also be discussed. The objective of the session is to demonstrate how to transform an organization’s security and risk posture, to one that is predictive, preemptive and adaptive, in order to maximize cyber defenses and minimize risk.
12:30-1:30
1:30-2:00
Robert Wiggenhorn
Sr Director, Professional Services
Bromium
In this session, Robert Wiggenhorn, Sr Director of Professional Services, will talk about how modern malware continues to circumvent even the most advanced enterprise perimeter and endpoint security tools. Even AI and Machine Learning-based technologies can’t seem to keep up with the most sophisticated and well-funded hackers. Join us to discuss new strategies today’s enterprises can employ to protect endpoints against ransomware, polymorphic malware, and threats that lurk inside email attachments, phishing links, file downloads and malicious websites.
2:00-2:30
Brian Black
Sr. Solutions Engineer and Cybersecurity Evangelist
Deep Instinct
Machine learning is a big step forward in combatting cyberattacks but is still no silver bullet. Many traditional cybersecurity solutions available today are causing huge operational challenges as they are not adequately fighting against today’s complex and sophisticated threats. Detection and response-based solutions are no longer sufficient as damage can already be done while waiting for the execution of an attack. Executives and security leaders need to start adopting a preventative approach to cybersecurity, which is made possible through Deep Learning.
Fortunately, AI technologies are advancing, and deep learning is proven to be the most effective cybersecurity solution, resulting in unmatched prevention rates with proven lowest false positive rates. As you evaluate new technologies for your organization, understand the differences and benefits of AI/ML/DL.
This session will cover:
3:15-4:00
Steve Gold
Vice President of Cybersecurity Solutions
Center for Internet Security
MODERATOR
Sean Brehm
Chairman and CEO
@RISK Technologies, Inc.
Nelson Cottier
Sr Manager, Sales Engineering (Enterprise West - Keysight)
Ixia Solutions Group
Dan Konzen
CIO
Advisor Armor
Tim McCulloch
Senior Presales Systems Engineer
Arctic Wolf
Kathy Winger
Attorney at Law
Law Offices of Kathy Delaney Winger
A common phrase in information security is: “It is a matter of when you will be breached, not if.” As the headlines provide real-life examples from Marriot, to Equifax, to FedEx, this seems more true than ever before. But what should you do to prepare, respond and recover from it? What tools and tactics will make it easier to detect a breach (either as it happens or after the fact), what do you say to key stake holders about what is happening and how do you pivot from “How did this happen” to “How can we make sure it doesn’t happen again”. Few things in IT can be as high visibility and high stakes as a breach and this panel will equip the audience with what they need to know to better handle when a breach happens.
4:00-4:30
Mike Lettman
Cyber Security Advisor
U.S. Department of Homeland Security
4:30-5:30
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Execs to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be aligned with some of the industry’s leading Cyber Security associations and media outlets. If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at [email protected] or call at 212.655.4505 ext 241.
Hilton Scottsdale Resort & Villas
6333 N. Scottsdale Rd.,
Scottsdale, AZ 85250
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |