CTO & Co-founder,
Axis Security
Upcoming Summits
The Eighth Annual New York Cyber Security Summit goes virtual as it connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission is just $95 giving you access to all Keynote Discussions, Interactive Panels and Product Demonstrations.
With full day attendance, you will earn 6 CPE/CEU Credits!
Friday, November 20, 2020
7:30AM - 5:00PM EST
Learn
Our conferences have been rated as one of The Top 50 Must Attend Conferences for the last 3 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Comfort & Safety
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the Cyber Summit experience to the executives from the comfort and safety of your own home. Our events are always for just one day only.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cyber Security Summit, you will receive a certificate granting you 6 Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cyber Security Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. Attendance is limited to approx. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry.
QUESTIONS
For any questions, please contact [email protected] or call 212.655.4505 ext. 225
SPONSOR
To sponsor, speak or exhibit at an upcoming summit, contact [email protected] or call 212.655.4505 ext. 223
This educational and informational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
By meeting with each Solution Provider, you will be automatically entered to win one of ten $100 Amazon gift cards!
8:30-9:05
Prior to defending an organization against a determined attacker, their techniques must be understood. This presentation provides an adversarial viewpoint to inform network defense leaders how the attackers see their organizations and are able to be successful with their objectives, even when well defended. The presenter will draw upon over 17 years of personal experience as a Red Team operator and leader to illustrate how your organizations are viewed, through the eyes of an adversary.
9:05-9:50
Dan Fein
Director of Email Security Products
Darktrace
Today, 94% of cyber-threats still originate in the inbox. ‘Impersonation attacks’ are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or ‘digital fakes’, that expertly mimic the writing style of trusted contacts and colleagues. Humans can no longer distinguish real from fake on their own – businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, ‘immune system’ technology takes action in seconds – stopping cyber-threats before damage is done. Find out how in this session.
9:50-10:15
David Grady
Security Evangelist
Verizon
John Grim
Head - Research, Development, Innovation | Verizon Threat Research Advisory Center
Verizon Enterprise Solutions
If you’re not regularly referring to the Verizon 2020 Data Breach Investigations Report, Verizon’s 2020 Mobile Security Index or the company’s other recent research reports, you’re missing out. This presentation will highlight key findings from Verizon’s recent research reports – and will explain how security leaders can use these reports to fine-tune their security programs and educate their stakeholders and employees about risks specific to their industry.
10:15-10:40
Chris Goettl
Director of Product Management
Ivanti
When threat actors exploit weaknesses in an organization’s IT infrastructure, the consequences can be devastating to productivity, reputation, and financially. Without treating cybersecurity as an ongoing process, hackers can find, weaponize, deploy, and attack your infrastructure faster than your team can patch the vulnerability leaving your infrastructure unprotected. Your systems may be secure today, but next week, a cybersecurity criminal may discover and exploit a critical vulnerability in your environment. Join us as we discuss how continuous vulnerability management can be executed effectively.
10:40-10:45
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
By meeting with each Solution Provider, you will be automatically entered to win one of ten $100 Amazon gift cards!
10:45-11:10
Sudhakar Ramakrishna
CEO
Pulse Secure
The growth of workforce mobility and recent dramatic increase in workplace flexibility is requiring businesses to enable users more fluid, yet secure access from anywhere, at any time, and from any device to distributed applications and resources residing in data center and multi-cloud environments. In our “age of any access,” what should organizations consider to fortify their security posture and what innovations are on the horizon? Pulse Secure CEO, Sudhakar Ramakrishna will discuss how secure access has evolved, where Zero Trust model is being applied, and new technologies being put to task to ensure user productivity, operational visibility and compliance.
11:10-11:55
Kristin Judge
CEO/President
Cybercrime Support Network
MODERATOR
Torsten Larson
Director, Solutions Consulting
Galvanize
Stuart Winter-Tear
Director of Sales Engineering
ThreatModeler Software, Inc
Nathan Wenzler
Chief Security Strategist
Tenable, Inc.
Ron Bennatan
Senior Vice President and General Manager, Data Security
Imperva
Kevin Kennedy
Senior Engineer
Malwarebytes
Harish Sekar
Senior Evangelist ManageEngine
ManageEngine
Dave Lewis
Advisory CISO, Global
Duo Security, now part of Cisco
Security teams today are being overwhelmed by the massive amounts of data collected by their various protection tools and in most cases, these security teams do not have the budget to hire external Security Operations Center (SOC) analysts. As such, companies are looking to implement an automated response system by using SOAR (Security Orchestration, Automation and Response) tools in an effort to relieve some of the burden on their already understaffed security teams and increase efficiency.
In a recent survey of more than 1,400 IT security professionals, 79% reported that their organization has existing automation tools and platforms in place (29%) or are planning to implement them within the next six months to three years (50%). However, this is not a simple solution for many companies as the successful implementation of automation requires a well-trained and educated team. In fact, 56% of organizations from this same survey indicated that they don’t currently have the in-house expertise required to effectively use these tools. This presents a problem as the shortage of gap between workforce demands and skilled cyber security professionals in the field is larger than ever and steadily increasing. According to another report, it is projected that by 2021, 3.5 million cyber security jobs will be unfilled; that’s a 350% increase in open positions from 2013 to 2021.
This panel will provide an understanding on SOAR tools, the importance on training your security team to understand and leverage these tools to more rapidly detect and respond to threats, and ways to attract and retain talent.
11:55-12:20
Sam McLane
Chief Technical Services Officer
Arctic Wolf
It is important to recognize that, overall, the industry has an effectiveness problem. The escalation in threat activity and the talents shortage in the industry has created a situation where, despite lots of products and cybersecurity spend, we aren’t getting better protection. To put a finer point on it, there are over 3,000 vendors selling products in the industry. The total spend last year was $120B+ and even with all of that there we almost 4,000 breaches — a 96% increase over the previous year. The key takeaway from these breaches is that they are NOT product failures. They are operational failures. To prevent these kinds of breaches from happening again in the future, we believe, the industry needs to adopt a new approach – an operational approach – to cybersecurity.
12:20-12:45
Nayeem Islam
CEO and Co-founder
Blue Hexagon
The rate of change information technology and security experienced over the past few months has been unprecedented. What’s even more challenging, cybersecurity is itself in a state of transformation as CISOs grapple with new paradigms like cloud security while trying to build a next-generation architecture in the wake of threats that have proven they can evolve faster than traditional controls like signatures, intelligence feeds, and sandboxes.
As pernicious threat actors deploy ‘enemy-AI’ to breach defenses and act on their objectives, the window of time to detect and respond has shrunk dramatically. Can artificial intelligence, specifically deep learning, which has revolutionized areas like self-driving cars, computer vision and medical image diagnosis be used to solve these cybersecurity challenges?
Deep learning is the security weapon of the future as attackers evolve their techniques using sophisticated malicious, morphing malware, ransomware variants created at unprecedented volume and velocity.
Attend this online session with Nayeem Islam, CEO and Founder of Blue Hexagon to learn about how deep learning has evolved, why advances are possible today, and why it is ideal to address the new threat landscape of automated attacks without having to rely on an army of security analysts. He’ll also share some recent real-life examples of evasive threats and ransomware that deep learning caught and traditional security controls missed.
12:45-12:55
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
By meeting with each Solution Provider, you will be automatically entered to win one of ten $100 Amazon gift cards!
12:55-1:20
Gil Azrielant
CTO & Co-founder
Axis Security
1:20-1:45
Scott Giordano
V.P., Data Protection
Spirion
1:45-2:15
Patrick Vowles
North America Product Marketing Manager - Security
IBM Security
As organization adopt new technologies and utilize the cloud for business innovation and growth, security teams are challenged with ensuring that those initiatives and missions are successful. To do that they are faced with creating an effective security program from a fragmented patchwork of solutions and data sources that really don’t interoperate very well without a great deal of development work.
2:15-2:20
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
By meeting with each Solution Provider, you will be automatically entered to win one of ten $100 Amazon gift cards!
2:20-2:40
James Locus
Product Evangelist and Sr. PMM
Menlo Security
2:40-3:25
Kristin Judge
CEO/President
Cybercrime Support Network
MODERATOR
Chris Pittman
Manager, Central US Sales Engineering
BlackBerry Cylance
Spencer Lichtenstein
Senior Product Strategist, RSA NetWitness Platform
RSA
Dr. Torsten George
Cyber Security Evangelist
Centrify
Renee Tarun
Deputy CISO/VP Information Security
Fortinet
Dan Clark
Senior Systems Engineer
Code42
Kim Berry
Principal Threat Intelligence Researcher
Auth0
Jeff Schwartz
Vice President North American Engineering
Check Point Software Technologies
According to a recent survey, last year 69% of organizations suffered a data breach caused by an Insider Threat, even with a data loss prevention (DLP) solution in place. While malicious users are a legitimate threat to an organization’s security, another study found that 64% of incidents were a result of human error made by an employee. In fact, 78% of Chief Security Officers confessed that even they have clicked on suspicious links.
These statistics demonstrate that having a DLP solution in place with a centralized IT Security team is not sufficient in protecting company assets. Organizations must also address the human element and provide effective ongoing training and education to all employees within the organization.
This panel will discuss the importance of understanding and detecting the various types of Insider Threats that put your organization at risk, as well as provide insight on how to prepare a prevention and defense strategy against an insider breach.
3:25-3:50
Christopher Smith
Third-Party Risk Consultant
OneTrust
Your vendors often handle your most sensitive data. This presents significant challenges as security, procurement, sourcing, IT, and privacy teams struggle to vet and manage vendor risks in real time. So, how can organizations proactively monitor vendors to protect against emerging threats? Additionally, how can risk exchanges help organizations manage the third-party risk management lifecycle with more efficiency? In this session, we’ll answer these questions and breakdown how risk exchanges offer a mature approach to vendor risk monitoring.
• Understand third-party risk management trends and challenges
• Gain actionable insights on how to monitor third-party risks and performance
• Learn the benefits of a third-party risk exchange
• See how you can protect against third-party threats such as data breaches, etc.
3:50-4:00
Meet & Engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
By meeting with each Solution Provider, you will be automatically entered to win one of ten $100 Amazon gift cards!
4:00-4:25
Loren Hudziak
Chrome Customer Engineer
Google
With the proliferation of COVID-19 across the globe, the need for a remote working strategy has become paramount to keep businesses running. Technologies such as Chromebooks, Chrome Browser, and SaaS applications have helped make this strategy a reality, providing access to critical data wherever employees may be working from during this challenging time. However, this way of working has created new security challenges for IT departments, who may not be equipped to address these issues. In this session, we’ll walk through many of Google’s solutions, such as Chrome Enterprise Upgrade, BeyondCorp Remote Access, Chrome Browser Cloud Management, and others, to ensure your business can keep secure, even in a remote working environment.
4:25-5:05
Rich Richard Jr.
Cybersecurity Advisor, Region II (NY, NJ, PR, USVI)
Cybersecurity and Infrastructure Security Agency, U.S. DHS
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cyber Security Summit solutions to protect your business from cyber attacks.
The Cyber Security Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal.
The Cyber Security Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cyber Security Summit, please contact Megan Hutton at [email protected] or call at 212.655.4505 ext 241.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |