Upcoming Summits
The mission of the Cybersecurity Summit is to provide a forum to discuss and share the latest in cyber security threats & solutions with renowned experts from around the globe. Below is content from our past Cybersecurity Summit presentations and is updated monthly.
Security Content Sharing
Business E-mail Compromise (BEC) is defined as a sophisticated scam targeting businesses working with foreign suppliers and/or businesses that regularly perform wire transfer payments. The E-mail Account Compromise (EAC) component of BEC targets individuals that perform wire transfer payments.
Read more >Security Content Sharing
By Ryan Kalember, SVP Cybersecurity Strategy, Proofpoint. Presented at the Cyber Security Summit: Dallas – May 5, 2017
Read more >Security Content Sharing
By Arlette Hart, CISO, FBI. Presented at the Cyber Security Summit: Atlanta – April 6, 2017
Read more >Security Content Sharing
Daniel Garrie, Editor-in-Chief, Journal of Law and Cyber Warfare. Hacker attacks such as the one on Hollywood Presbyterian Medical Center show how easily digital platforms can be turned against organizations, but taking 10 steps can augment security, write RANE founder David Lawrence and his co-authors in this opinion piece.
Read more >Security Content Sharing
Need help moving from a reactive to proactive cybersecurity strategy? Check out these resources. Have more IT security questions? Talk to a CenturyLink cybersecurity expert to learn the best and most cost effective ways to keep your mission-critical data secure and available…
Read more >Security Content Sharing
By CenturyLink Business. An honest Cybersecurity professional will tell you they are spending more than ever on security tools and technologies to protect their critical business assets and IT infrastructure, but the bad guys are still getting in…
Read more >Security Content Sharing
By Doug Cahill, ESG Senior Analyst & Tony Palmer, ESG Senior Lab Analyst. The challenge of keeping pace with the evolving threat landscape has been compounded by employee mobility and hybrid clouds, requiring organizations to adapt by investing in a contemporary set of tools, tactics, technologies, and skills to protect data assets from compromise and ensure ...
Read more >Security Content Sharing
By Curtis Dukes, Director, Information Assurance at the National Security Agency. Presented at the DC Metro Cyber Security Summit – June 30, 2016
Read more >Security Content Sharing
By Curtis Dukes, Director, Information Assurance at the National Security Agency. Presented at the Boston Cyber Security Summit – October 21, 2015
Read more >Security Content Sharing
By Erik Yunghans, Consulting Engineer at Palo Alto Networks. Presented at the Boston Cyber Security Summit – October 21, 2015
Read more >Finance & Risk
April 26, 2024
Milwaukee
May 2, 2024
Austin
May 17, 2024
Denver
May 17, 2024
Salt Lake City
June 6, 2024
Healthcare & Pharma
June 13, 2024
Oklahoma City
June 14, 2024
Hartford
June 25, 2024
Pittsburgh
June 27, 2024
Raleigh-Durham
July 16, 2024
DC Metro
July 18, 2024
Toronto
July 25, 2024
St. Louis
August 1, 2024
Detroit
August 20, 2024
Portland
August 22, 2024
San Antonio
August 27, 2024
Chicago
September 6, 2024
Atlanta
September 17, 2024
New York/Wall Street
September 19, 2024
Columbus
September 26, 2024
Philadelphia
September 27, 2024
Charlotte
October 1, 2024
Houston
October 18, 2024
Indianapolis
October 22, 2024
Silicon Valley
October 25, 2024
Boston
October 29, 2024
Critical Infrastructure
November 8, 2024
New York
November 15, 2024
Scottsdale
December 6, 2024
Finance & Risk
December 11, 2024
Jacksonville
December 12, 2024
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |