cybersecuritysummit.com
Open in
urlscan Pro
2606:4700:3034::6815:9a7
Public Scan
Submitted URL: https://protect-us.mimecast.com/s/jiU6CKr25oT8KEE0HAqiMU?domain=urldefense.proofpoint.com
Effective URL: https://cybersecuritysummit.com/summit/rosemont24/?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cybersecuritysumm...
Submission: On January 26 via manual from US — Scanned from US
Effective URL: https://cybersecuritysummit.com/summit/rosemont24/?utm_source=marketing-campaign&utm_medium=email&utm_campaign=cybersecuritysumm...
Submission: On January 26 via manual from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Connecting Sr. Executives with Leading Cyber Solution Providers Upcoming Summits Jan 26 Tampa Feb 2 Atlanta Feb 13 Silicon Valley Feb 23 Nationwide Mar 1 Seattle/Bellevue Mar 7 San Diego Mar 12 New York Mar 20 Rosemont Mar 22 Miami 2016-08-25 * Summits * * 2024 CYBERSECURITY SUMMITS * * Tampa Jan 26, 2024 * * Atlanta Feb 2, 2024 * * Silicon Valley Feb 13, 2024 * * Nationwide Feb 23, 2024 * * Seattle Mar 1, 2024 * * San Diego Mar 7, 2024 * * New York Mar 12, 2024 * * Rosemont Mar 20, 2024 * * Miami Mar 22, 2024 * * Baltimore Apr 4, 2024 * * Nashville Apr 5, 2024 * * Dallas Apr 12, 2024 * * Waltham Apr 19, 2024 * * Finance Apr 26, 2024 * * Milwaukee May 2, 2024 * * Austin May 17, 2024 * * Denver May 21, 2024 * * Salt Lake City Jun 6, 2024 * * Healthcare Jun 13, 2024 * * Oklahoma City Jun 14, 2024 * * Hartford Jun 25, 2024 * * Pittsburgh Jun 27, 2024 * * Raleigh Jul 16, 2024 * * DC Metro Jul 18, 2024 * * * * * * * * * * * * * * * * * * * * * * * * * Speakers * Solution Providers * Partners * About * About Us * Contact Us * Official Press Releases * Our Delegates * Business Development Opportunities * Request Speaking Opportunity * Earn CEU / CPE Credits * Photos * Testimonials * Content Sharing * Resources * Trainings & Certifications * Career Advancement Tools * Diversity & Inclusion in Cyber * Special Offers * Career Opportunities * Jobs * View All Summits REGISTER NOW Menu:--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block-Column--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Block--Text--Block--BlockSummits--Block-Column-ColumnSpeakersSolution Providers-ColumnPartners-ColumnAbout-Column-Column-About Us-Contact Us-Column-Column-Official Press Releases-Our Delegates-Column-Column-Business Development Opportunities-Request Speaking Opportunity-Column-Column-Earn CEU / CPE Credits-Column-Photos-Column-TestimonialsContent Sharing-Column-ColumnResources-Column-Trainings & Certifications-Column-Career Advancement Tools-Column-Diversity & Inclusion in Cyber-Special Offers-Column-Column-Career Opportunities-ColumnJobsView All Summits-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column-Column--Block--Block--Block--Block--Block REGISTER NOW 20 March 2024 ROSEMONT Cybersecurity Summit CPE/CEUs with full attendance In-Person Summit Wed, March 20, 2024 7:30AM - 6:00PM CDT DAYS 53 HOURS 20 MIN 47 SEC 51 -------------------------------------------------------------------------------- Hyatt Regency O'Hare Chicago 9300 W Bryn Mawr Ave Rosemont, IL, 60018 Register Now March 20, 2024 7:30AM March 20, 2024 6:00PM america/chicago Cyber Security Summit: Rosemont Hyatt Regency O'Hare Chicago 9300 W Bryn Mawr Ave Rosemont, IL, 60018 Add to Calendar * iCalendar * Google Calendar * Outlook * Outlook Online * Yahoo! Calendar Book Hotel Room QUESTIONS? Contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 852 RosemontAgendaSponsors The Inaugural Rosemont/Chicago Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception. ANNOUNCING OUR CLOSING KEYNOTE SPEAKER Jay Patel Assistant Special Agent in Charge FBI Chicago Field Office INTERACTIVE PANEL DISCUSSIONS Defining Cybersecurity-Readiness: How do you evaluate yours? When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more. 2024 & The Biggest Threats to Your Business On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption. Conceptualizing Cloud Security & Why it Matters Today Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud. TOP 8 REASONS TO ATTEND THE CYBERSECURITY SUMMIT 1 Learn Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions. 2 Evaluate Demonstrations Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats. 3 Time, Travel & Money Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers. 4 Engage, Network, Socialize & Share Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs. 5 CEUs / CPE Credits By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day. 6 Investment By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation. 7 Atmosphere Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment. 8 Reality Check Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry. QUESTIONS For any questions, please contact Samantha@CyberSummitUSA.com or call 212.655.4505 ext. 852 SPONSOR To speak or exhibit at an upcoming summit, contact BRand@CyberSecuritySummit.com or call 212.655.4505 ext. 223 AGENDA This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense. 7:30-8:00 CDT NETWORKING BREAKFAST 8:00-8:30 CDT OPENING GOVERNMENT SECURITY BRIEFING 8:30-9:05 CDT OPENING SECURITY KEYNOTE 9:05-9:35 CDT KEYNOTE PRESENTATION 9:35-10:05 CDT KEYNOTE PRESENTATION 10:05-10:25 CDT NETWORKING BREAK 10:25-10:40 CDT TOKEN PRESENTATION: TOKEN PRESENTATION: HOW CYBERCRIMINALS ARE WEAPONIZING GENERATIVE AI AND HOW YOU CAN RESPOND. -------------------------------------------------------------------------------- In this informative session, we will step into the eye of the cybersecurity storm in a session that exposes the profound shift in the cyber battleground brought by Generative AI. Last year witnessed record losses to phishing and ransomware attacks, but as they say in showbusiness, “you ain’t seen nothing yet!” Learn how the incredible power of Generative AI, that helps fortify cybersecurity defenses, is also arming cybercriminals with formidable new capabilities, transforming them into much more dangerous digital adversaries threatening every type and size of organization across every industry. This session explores the shadowy world of hacker innovation and the impact of generative AI on the most dangerous and destructive attack methods, along with the next-generation defense strategies that will become necessary. -------------------------------------------------------------------------------- John Gunn CEO & Next-Generation MFA Evangelist Token 10:40-11:10 CDT PANEL 1: DEFINING CYBERSECURITY-READINESS - HOW DO YOU EVALUATE YOURS? -------------------------------------------------------------------------------- When looking at how to best protect your business, cybersecurity readiness should be top priority, but what is it? Cybersecurity readiness is the ability to identify, prevent, and respond to cyber threats. Can proper data governance, risk management (including managing 3rd party risk and supply chain risk) and compliance provide a framework to always being ready? Let’s discuss GRC & the best steps to take when quantifying cyber risk, developing your incident response plan, creating a data security policy & more. 11:10-11:35 CDT EXABEAM PRESENTATION 11:35-12:00 CDT SWIMLANE PRESENTATION 12:00-12:25 CDT TENABLE PRESENTATION: PREDICT, EXPLAIN, RETAIN – DATA ANALYSIS FOR BETTER SECURITY -------------------------------------------------------------------------------- Getting past the hype of AI and ChatGPT, there are huge benefits to practical (and less sexy) applications of AI. And despite all the buzzwords and overpromises coming from our industry today, there actually are real and meaningful ways AI tools will help security professionals make better risk decisions, faster and more accurately. In this talk, we’ll show some examples of how AI can help predict risk, cut through complexity when making risk decisions and even help to retain senior staff while keeping them focused on the tasks that matter most. -------------------------------------------------------------------------------- Nathan Wenzler Chief Security Strategist Tenable, Inc. 12:25-1:05 CDT NETWORKING LUNCH 1:05-1:50 CDT PANEL 2: 2024 & THE BIGGEST THREATS TO YOUR BUSINESS - HOW TO MANAGE YOUR ATTACK SURFACE & PROTECT AGAINST RANSOMWARE, ARTIFICIAL INTELLIGENCE, DDOS ATTACKS & MORE! -------------------------------------------------------------------------------- What are the biggest threats to your business? What’s changing in the current threat landscape that you need to know about? Is ransomware still the biggest threat or is AI taking the spotlight? On this panel our lineup of industry experts will discuss the most dangerous and emerging threats to your organization as well as the solutions that go beyond anti-malware/anti-virus to include endpoint security, vulnerability management, Active Directory monitoring, credential protection, DNS security tools, SIEM, DLP and encryption. -------------------------------------------------------------------------------- Cybersecurity Expert CyCognito Cybersecurity Expert Bitdefender Cybersecurity Expert Stellar Cyber 1:50-2:15 CDT CHECK POINT SOFTWARE TECHNOLOGIES PRESENTATION 2:15-2:40 CDT VECTRA AI PRESENTATION 2:40-3:05 CDT SECUREWORKS PRESENTATION 3:05-3:25 CDT NETWORKING BREAK 3:05-3:25 CDT PANEL 3: CONCEPTUALIZING CLOUD SECURITY & WHY IT MATTERS TODAY -------------------------------------------------------------------------------- Cloud computing solves many problems like flexibility, cost-efficiency & scalability, so it’s no surprise that use of the cloud is consistently growing. That said, it also means organizations step into unknown areas where gaps are easy to miss and hackers are quick to exploit. Today we will discuss all things cloud so you know what works best for your organization. Our experts will look at hybrid and multi-cloud environments, adopting the concept of cybersecurity mesh & Zero Trust, the Secure Access Service Edge (SASE) framework, cloud-native tools & platforms, as well as why the future of network security is in the Cloud. 4:10-4:35 CDT IMPERVA PRESENTATION 4:35-5:00 CDT PLATINUM PRESENTATION 5:00-5:25 CDT PLATINUM PRESENTATION 5:25-5:50 CDT GOVERNMENT CLOSING KEYNOTE WITH JAY PATEL, ASSISTANT SPECIAL AGENT IN CHARGE, FBI CHICAGO FIELD OFFICE -------------------------------------------------------------------------------- Jay Patel Assistant Special Agent in Charge FBI Chicago Field Office 5:50-6:30 CDT COCKTAIL RECEPTION AND RAFFLE PRIZE WINNER ANNOUNCEMENTS FROM OUR SPONSORS Register for the Summit Now » SPONSORS The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal. PLATINUM SPONSORS GOLD SPONSORS SILVER SPONSORS To sponsor at an upcoming summit, contact Bradford Rand at BRand@CybersecuritySummit.com » SPONSOR EVENTS Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus STAY CONNECTED! FOLLOW US ON SOCIAL MEDIA: AN INSIDE LOOK © 2024 Cybersecurity Summit - All Rights Reserved We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL cookies. Cookie SettingsAccept All Manage consent Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the ... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. Functional Functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. Performance Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. Analytics Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Advertisement Advertisement Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads. Others Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. SAVE & ACCEPT