cybersecuritysummit.com Open in urlscan Pro
2606:4700:3034::6815:9a7  Public Scan

Submitted URL: https://protect-us.mimecast.com/s/jiU6CKr25oT8KEE0HAqiMU?domain=urldefense.proofpoint.com
Effective URL: https://cybersecuritysummit.com/summit/rosemont24/?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cybersecuritysumm...
Submission: On January 26 via manual from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

Connecting Sr. Executives with Leading Cyber Solution Providers

Upcoming Summits

Jan 26 Tampa

Feb 2 Atlanta

Feb 13 Silicon Valley

Feb 23 Nationwide

Mar 1 Seattle/Bellevue

Mar 7 San Diego

Mar 12 New York

Mar 20 Rosemont

Mar 22 Miami

2016-08-25
 
 * Summits
   
   
    *  * 2024 CYBERSECURITY SUMMITS
   
    *  * Tampa
         Jan 26, 2024
   
    *  * Atlanta
         Feb 2, 2024
   
    *  * Silicon Valley
         Feb 13, 2024
   
    *  * Nationwide
         Feb 23, 2024
   
    *  * Seattle
         Mar 1, 2024
   
    *  * San Diego
         Mar 7, 2024
   
    *  * New York
         Mar 12, 2024
   
    *  * Rosemont
         Mar 20, 2024
   
    *  * Miami
         Mar 22, 2024
   
    *  * Baltimore
         Apr 4, 2024
   
    *  * Nashville
         Apr 5, 2024
   
    *  * Dallas
         Apr 12, 2024
   
    *  * Waltham
         Apr 19, 2024
   
    *  * Finance
         Apr 26, 2024
   
    *  * Milwaukee
         May 2, 2024
   
    *  * Austin
         May 17, 2024
   
    *  * Denver
         May 21, 2024
   
    *  * Salt Lake City
         Jun 6, 2024
   
    *  * Healthcare
         Jun 13, 2024
   
    *  * Oklahoma City
         Jun 14, 2024
   
    *  * Hartford
         Jun 25, 2024
   
    *  * Pittsburgh
         Jun 27, 2024
   
    *  * Raleigh
         Jul 16, 2024
   
    *  * DC Metro
         Jul 18, 2024
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 
   
    *  * 

 * Speakers
 * Solution Providers
 * Partners
 * About
    * About Us
    * Contact Us
    * Official Press Releases
    * Our Delegates
    * Business Development Opportunities
    * Request Speaking Opportunity
    * Earn CEU / CPE Credits
    * Photos
    * Testimonials

 * Content Sharing
 * Resources
    * Trainings & Certifications
    * Career Advancement Tools
    * Diversity & Inclusion in Cyber
    * Special Offers
    * Career Opportunities

 * Jobs
 * View All Summits

REGISTER NOW

Menu:--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block-Column--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Text--Block--BlockSummits--Block-Column-ColumnSpeakersSolution
Providers-ColumnPartners-ColumnAbout-Column-Column-About Us-Contact
Us-Column-Column-Official Press Releases-Our Delegates-Column-Column-Business
Development Opportunities-Request Speaking Opportunity-Column-Column-Earn CEU /
CPE Credits-Column-Photos-Column-TestimonialsContent
Sharing-Column-ColumnResources-Column-Trainings & Certifications-Column-Career
Advancement Tools-Column-Diversity & Inclusion in Cyber-Special
Offers-Column-Column-Career Opportunities-ColumnJobsView All
Summits-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column--Block--Block--Block--Block--Block
REGISTER NOW

20 March 2024


ROSEMONT

Cybersecurity Summit

CPE/CEUs with full attendance

In-Person Summit

Wed, March 20, 2024
7:30AM - 6:00PM CDT

DAYS

53

HOURS

20

MIN

47

SEC

51

--------------------------------------------------------------------------------

Hyatt Regency O'Hare Chicago
9300 W Bryn Mawr Ave
Rosemont, IL, 60018

Register Now March 20, 2024 7:30AM March 20, 2024 6:00PM america/chicago Cyber
Security Summit: Rosemont Hyatt Regency O'Hare Chicago
9300 W Bryn Mawr Ave
Rosemont, IL, 60018 Add to Calendar
 * iCalendar
 * Google Calendar
 * Outlook
 * Outlook Online
 * Yahoo! Calendar

Book Hotel Room


QUESTIONS?

Contact Samantha@CyberSummitUSA.com
or call 212.655.4505 ext. 852

RosemontAgendaSponsors

The Inaugural Rosemont/Chicago Cybersecurity Summit connects C-Suite & Senior
Executives responsible for protecting their companies’ critical infrastructures
with innovative solution providers and renowned information security experts.
Admission gives you access to all Interactive Panels, Discussions, Catered
Breakfast, Lunch & Cocktail Reception.


ANNOUNCING OUR CLOSING KEYNOTE SPEAKER

Jay Patel
Assistant Special Agent in Charge
FBI Chicago Field Office




INTERACTIVE PANEL DISCUSSIONS

Defining Cybersecurity-Readiness: How do you evaluate yours?

When looking at how to best protect your business, cybersecurity readiness
should be top priority, but what is it? Let’s discuss GRC & the best steps to
take when quantifying cyber risk, developing your incident response plan,
creating a data security policy & more.

2024 & The Biggest Threats to Your Business

On this panel our lineup of industry experts will discuss the most dangerous and
emerging threats to your organization as well as the solutions that go beyond
anti-malware/anti-virus to include endpoint security, vulnerability management,
Active Directory monitoring, credential protection, DNS security tools, SIEM,
DLP and encryption.

Conceptualizing Cloud Security & Why it Matters Today

Cloud computing solves many problems like flexibility, cost-efficiency &
scalability, so it’s no surprise that use of the cloud is consistently growing.
Our experts will look at hybrid and multi-cloud environments, adopting the
concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge
(SASE) framework, cloud-native tools & platforms, as well as why the future of
network security is in the Cloud.


TOP 8 REASONS TO ATTEND THE CYBERSECURITY SUMMIT

1

Learn

Our conferences have been rated as one of The Top 5 Must Attend Conferences for
the last 6 years. Learn from renowned experts from around the globe on how to
protect & defend your business from cyber attacks during interactive Panels &
Fast Track Discussions.


2

Evaluate Demonstrations

Evaluate & See demonstrations from dozens of cutting-edge solution providers
that can best protect your enterprise from the latest threats.


3

Time, Travel & Money

Many senior executives simply don’t have the time to travel for up to a week to
the large cyber trade shows. Our mission is to bring the cyber summit to the
executives in the nation’s top cities. Our events are always for just one day
only and are produced within first class hotels, not convention centers.


4

Engage, Network, Socialize & Share

Engage, Network, Socialize & Share with hundreds of fellow Powerful Business
Leaders, C-Suite Executives & Entrepreneurs.

5

CEUs / CPE Credits

By attending a full day at the Cybersecurity Summit, you will receive a
certificate granting you Continuing Education Units or Continuing Professional
Education Credits. To earn these credits you must participate for the entire
summit & confirm your attendance at the end of the day.  


6

Investment

By investing one day at the summit, you may save your company millions of
dollars, avoid stock devaluation and potential litigation.


7

Atmosphere

Each Cybersecurity Summit is “By Invitation Only” and all attendees are
pre-screened & approved in advance. On-site attendance is limited to approx. 400
Sr. Level Executives to maintain an intimate, non-trade show like environment.


8

Reality Check

Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that
were hacked do everything within their power to avoid being victimized? Is your
company next? Learn the latest defensive measures at the Cybersecurity Summit
from your peers and from thought leaders in the industry.




QUESTIONS

For any questions, please contact Samantha@CyberSummitUSA.com or call
212.655.4505 ext. 852


SPONSOR

To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com
or call 212.655.4505 ext. 223




AGENDA

This educational forum will focus on educating attendees on how to best protect
highly vulnerable business applications and critical infrastructure. Attendees
will have the opportunity to meet the nation’s leading solution providers and
discover the latest products and services for enterprise cyber defense.

7:30-8:00 CDT

NETWORKING BREAKFAST

8:00-8:30 CDT

OPENING GOVERNMENT SECURITY BRIEFING

8:30-9:05 CDT

OPENING SECURITY KEYNOTE

9:05-9:35 CDT

KEYNOTE PRESENTATION

9:35-10:05 CDT

KEYNOTE PRESENTATION

10:05-10:25 CDT

NETWORKING BREAK

10:25-10:40 CDT

TOKEN PRESENTATION: TOKEN PRESENTATION: HOW CYBERCRIMINALS ARE WEAPONIZING
GENERATIVE AI AND HOW YOU CAN RESPOND.

--------------------------------------------------------------------------------

In this informative session, we will step into the eye of the cybersecurity
storm in a session that exposes the profound shift in the cyber battleground
brought by Generative AI. Last year witnessed record losses to phishing and
ransomware attacks, but as they say in showbusiness, “you ain’t seen nothing
yet!” Learn how the incredible power of Generative AI, that helps fortify
cybersecurity defenses, is also arming cybercriminals with formidable new
capabilities, transforming them into much more dangerous digital adversaries
threatening every type and size of organization across every industry. This
session explores the shadowy world of hacker innovation and the impact of
generative AI on the most dangerous and destructive attack methods, along with
the next-generation defense strategies that will become necessary.

--------------------------------------------------------------------------------

John Gunn
CEO & Next-Generation MFA Evangelist
Token

10:40-11:10 CDT

PANEL 1: DEFINING CYBERSECURITY-READINESS - HOW DO YOU EVALUATE YOURS?

--------------------------------------------------------------------------------

When looking at how to best protect your business, cybersecurity readiness
should be top priority, but what is it?

Cybersecurity readiness is the ability to identify, prevent, and respond to
cyber threats. Can proper data governance, risk management (including managing
3rd party risk and supply chain risk) and compliance provide a framework to
always being ready?

Let’s discuss GRC & the best steps to take when quantifying cyber risk,
developing your incident response plan, creating a data security policy & more.

11:10-11:35 CDT

EXABEAM PRESENTATION

11:35-12:00 CDT

SWIMLANE PRESENTATION

12:00-12:25 CDT

TENABLE PRESENTATION: PREDICT, EXPLAIN, RETAIN – DATA ANALYSIS FOR BETTER
SECURITY

--------------------------------------------------------------------------------

Getting past the hype of AI and ChatGPT, there are huge benefits to practical
(and less sexy) applications of AI. And despite all the buzzwords and
overpromises coming from our industry today, there actually are real and
meaningful ways AI tools will help security professionals make better risk
decisions, faster and more accurately. In this talk, we’ll show some examples of
how AI can help predict risk, cut through complexity when making risk decisions
and even help to retain senior staff while keeping them focused on the tasks
that matter most.

--------------------------------------------------------------------------------

Nathan Wenzler
Chief Security Strategist
Tenable, Inc.

12:25-1:05 CDT

NETWORKING LUNCH

1:05-1:50 CDT

PANEL 2: 2024 & THE BIGGEST THREATS TO YOUR BUSINESS - HOW TO MANAGE YOUR ATTACK
SURFACE & PROTECT AGAINST RANSOMWARE, ARTIFICIAL INTELLIGENCE, DDOS ATTACKS &
MORE!

--------------------------------------------------------------------------------

What are the biggest threats to your business? What’s changing in the current
threat landscape that you need to know about? Is ransomware still the biggest
threat or is AI taking the spotlight?

On this panel our lineup of industry experts will discuss the most dangerous and
emerging threats to your organization as well as the solutions that go beyond
anti-malware/anti-virus to include endpoint security, vulnerability management,
Active Directory monitoring, credential protection, DNS security tools, SIEM,
DLP and encryption.

--------------------------------------------------------------------------------

Cybersecurity Expert
CyCognito



Cybersecurity Expert
Bitdefender



Cybersecurity Expert
Stellar Cyber

1:50-2:15 CDT

CHECK POINT SOFTWARE TECHNOLOGIES PRESENTATION

2:15-2:40 CDT

VECTRA AI PRESENTATION

2:40-3:05 CDT

SECUREWORKS PRESENTATION

3:05-3:25 CDT

NETWORKING BREAK

3:05-3:25 CDT

PANEL 3: CONCEPTUALIZING CLOUD SECURITY & WHY IT MATTERS TODAY

--------------------------------------------------------------------------------

Cloud computing solves many problems like flexibility, cost-efficiency &
scalability, so it’s no surprise that use of the cloud is consistently growing. 

That said, it also means organizations step into unknown areas where gaps are
easy to miss and hackers are quick to exploit. 

Today we will discuss all things cloud so you know what works best for your
organization.

Our experts will look at hybrid and multi-cloud environments, adopting the
concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge
(SASE) framework, cloud-native tools & platforms, as well as why the future of
network security is in the Cloud. 

4:10-4:35 CDT

IMPERVA PRESENTATION

4:35-5:00 CDT

PLATINUM PRESENTATION

5:00-5:25 CDT

PLATINUM PRESENTATION

5:25-5:50 CDT

GOVERNMENT CLOSING KEYNOTE WITH JAY PATEL, ASSISTANT SPECIAL AGENT IN CHARGE,
FBI CHICAGO FIELD OFFICE

--------------------------------------------------------------------------------

Jay Patel
Assistant Special Agent in Charge
FBI Chicago Field Office



 

5:50-6:30 CDT

COCKTAIL RECEPTION AND RAFFLE PRIZE WINNER ANNOUNCEMENTS FROM OUR SPONSORS

Register for the Summit Now »


SPONSORS

The Cybersecurity Summit connects cutting-edge solution providers with Sr.
Executives to analyze & diagnose cybersecurity flaws through interactive panels
& roundtable discussions. View the latest presentations given at the
Cybersecurity Summit through our Security Content Sharing portal.

PLATINUM SPONSORS


 

GOLD SPONSORS


 

SILVER SPONSORS


 
To sponsor at an upcoming summit, contact Bradford Rand at
BRand@CybersecuritySummit.com »


SPONSOR EVENTS

Find out how you can become a sponsor and grow your business by meeting and
spending quality time with key decision makers and dramatically shorten your
sales cycle. View Prospectus


STAY CONNECTED!
FOLLOW US ON SOCIAL MEDIA:




AN INSIDE LOOK






© 2024 Cybersecurity Summit - All Rights Reserved



 
We use cookies on our website to give you the most relevant experience by
remembering your preferences and repeat visits. By clicking “Accept All”, you
consent to the use of ALL cookies.
Cookie SettingsAccept All
Manage consent
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these, the cookies that are categorized as necessary are
stored on your browser as they are essential for the working of basic
functionalities of the ...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
These cookies ensure basic functionalities and security features of the website,
anonymously.

CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is
set by GDPR Cookie Consent plugin. The cookie is used to store the user consent
for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11
monthsThe cookie is set by GDPR cookie consent to record the user consent for
the cookies in the category "Functional".cookielawinfo-checkbox-necessary11
monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to
store the user consent for the cookies in the category
"Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR
Cookie Consent plugin. The cookie is used to store the user consent for the
cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis
cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the
user consent for the cookies in the category
"Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie
Consent plugin and is used to store whether or not user has consented to the use
of cookies. It does not store any personal data.

Functional
Functional
Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.
Performance
Performance
Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.
Analytics
Analytics
Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and
marketing campaigns. These cookies track visitors across websites and collect
information to provide customized ads.
Others
Others
Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.
SAVE & ACCEPT