As efforts now shift to the long-term strategic view of the new normal, organizations are questioning how they will ensure business resiliency in 2021 and act more quickly against new and evolving cyber threats. And, Airgaps Zero Trust access controls protect enterprises high value assets against cyber threats. Phosphorus is Security for the #IoT with the only AGENTLESS technology. ThreatLocker improves enterprise-level server and endpoint security by blocking unknown application vulnerabilities through Application Whitelisting, Ringfencing, Storage Control and Privileged Access Management solutions. For any questions, please contact [emailprotected] or call 212.655.4505 ext. Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. We are making an inefficient system more efficient, delivering amazing value at a reasonable price, and are helping businesses adapt to a changing world. Necessary cookies are absolutely essential for the website to function properly. Smart. Join Jack Lebeau in this session where he explores the benefits of Autonomous Response as a must-have that goes beyond defense. Our conferences have been rated as one of The Top 5 InfoSec Conferences Worldwide for the last 4 years. Weve seen the real-world consequences of cyberattacks from the shutdown of the Colonial Pipeline to the slowing of care for hospital patients, to major disruptions in the food supply lines. Elastic solutions are built on a single free and open technology stack that can be deployed anywhere to instantly find actionable insights from any type of data from finding documents, to monitoring infrastructure, to hunting for threats. Get insights on the latest in security from experts who live on the leading edge of cybersecurity technology. Its bold cybersecurity, built for people, by people who give a damn. Marcus has an engineering degree from the United States Naval Academy and a Masters Degree in International Security Studies from The Fletcher School. This field is for validation purposes and should be left unchanged. Check Point protects over 100,000 organizations of all sizes. These cookies do not store any personal information. These 21st century networks have been adopted by government entities and large enterprises around the world. How easy and affordable its become to avoid detection with the breadth of sophisticated tools and services available. https://airgap.io. Join your fellow cybersecurity professionals at the Boston Cybersecurity Conference for live, in-person sessions. 300 Sr. Level Executives to maintain an intimate, non-trade show like environment. Companies will be able to invest smart and protect more. We'd love to hear your feedback and can't wait to see you n, There are still #VirtualAdmission passes left to the DC Metro #CyberSecurity Summit on 7/28! Save Cyber Security Overview 1 Day Training in Boston, MA to your collection. Why are Security programs failing? info at futureconevents dot com. For more information, visithttps://www.exabeam.com. Securing the hybrid Infrastructure: we offer unique enterprise-grade solutions built from the ground up to secure virtual and physical hybrid distributed environments from a single console. Our events are always for just one day only. Our experts will discuss the various aspects of a zero trust approach including users, identity management, access, and network configuration concepts. Google Drive, Slack, Box, etc.) We also use third-party cookies that help us analyze and understand how you use this website. He has led cyber efforts with various US Intelligence Community elements and global partners, and has extensive experience advising senior leaders on cyber efforts. We published a blog post listing all the upcoming InfoSec Conferences of that year, and Google loved the resource and put us right to the top of the search engines. Will the Real Zero Trust Please Stand Up? Youll hear from industry luminaries on some of the newest tactics for defending against unprecedented attacks. These cookies track visitors across websites and collect information to provide customized ads. They will be able to quantify risks to the business and drive a security strategy aligned with the companys business growth. The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the worlds security leaders. Information Technology at Anna maria college, Boston, We list, literally, every single Information Security conference, event and seminar within every niche in Cybersecurity. Elastic makes data usable in real time and at scale for enterprise search, observability, and security. Backup remains your best defense against ransomware; but today, backups are under attack. Faced with supply chain disruption and cyber threats, businesses are re-assessing their dependence on partners and taking a closer look at the risk they introduce. Is your company next? We simplify and strengthen overall cybersecurity, so everyonesecurity professionals and employees alikecan focus on the important aspects of their work. View the latest presentations given at the Cyber Security Summit through our Security Content Sharing portal. Threat actors continuously adapt, innovate, and build robust tools to evade enterprise defenses, as they collaborate in a thriving underground bot economy made up of bot builders, sellers, and buyers. We do this for enterprises through our award-winning portfolio of end-to-end security services, including MDR and Cybersecurity Consulting Services. When entire workforces went remote in 2020 because of the global pandemic, organizations pivoted quickly to new business models by migrating apps and services to the cloud to enable the anywhere, everywhere workforce. Cybersecurity is no longer just an IT problem. This presentation will show business and IT leaders how to build and scale a fully integrated GRC program that drives financial value and operational efficiencies. A huge thank you to everyone who joined us today in DC! Subject to approval. With cyber-attackers continuously searching for new ways to outpace security teams, it can lead to a struggle to fight back without disrupting business operations. How does Microsofts latest OS affect endpoint management? Alex BauerChrome Enterprise Browser Customer EngineerGoogle, Adam MargetProduct Marketing ManagerUnitrends. Exec. Cybereason is a privately held, international company headquartered in Boston with customers in more than 40 countries. Cloudflare was recognized by the World Economic Forum as a Technology Pioneer, named the Most Innovative Network & Internet Technology Company for two years running by the Wall Street Journal, and ranked among the worlds 50 most innovative companies by Fast Company. According to research done by Cybersecurity Insiders in partnership with (ISC)2, 72% of organizations said they feel either not at all confident (8%), slightly confident (12%), or moderately confident (52%) in their cloud security posture, expressing concerns over data loss & leakage, data privacy, compliance, and unauthorized access. Named in CyberSecurity Ventures, Top 100 Women Fighting Cybercrime. We keep breaches from becoming catastrophes, avoiding operations downtime. Alert Logic is the only managed detection and response (MDR) provider that delivers comprehensive coverage for public clouds, SaaS, on-premises, and hybrid environments. Save Air Force Cyber Challenge 2022 to your collection. He is recognized as a leader in developing and deploying innovative cyber solutions. Code Dx has the ability to correlate and prioritize the findings from more than 75 testing solutions and manual testing activities. They will share their experiences and tips for rolling out zero trust methodologies at scale. Admission is $195 each for in-person attendance, giving you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception. Analytical cookies are used to understand how visitors interact with the website. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Check Point offers a complete security architecture defending enterprises from networks to mobile devices in addition to the most comprehensive and intuitive security management. As attacks ramp in frequency and efficacy, threat actors are emboldened by streaks of successful attacks. Security. Inspired Technology & Communications LLC. Vectra enables enterprises to immediately detect and respond to cyberattacks across cloud, data center, IT and IoT networks. WSCs mission is to advance women in cybersecurity careers by providing programs and partnerships that promote hands-on training, networking, education, mentoring, resource-sharing and other professional opportunities. Derek also regularly presents on cybersecurity strategy and trends at conferences to various IT and Information Security professionals. Our solutions support you with analytics-driven, multi-layer threat protection, industry-leading incident response, and endpoint security orchestration. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. Since no level of investment prevents or blocks 100% of attacks, you need to continuously identify and address breaches or gaps before they cause real damage. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day. Most importantly, this presentation will demonstrate how to capitalize on existing investments and capabilities to drive immediate benefits and how to scale from there. Our lineup of Subject Matter Experts will discuss the risks facing security teams as they adopt cloud services, offer recommendations to minimize these risks, and provide insight on best practices to secure the cloud. Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. In order to claim any raffle prizes, you must be present during the cocktail reception. Registration for qualified senior cybersecurity professionals. Den JonesChief Security OfficerBanyan Security. Solution Architect, Office of the CTO at Source Defense. Behavioral analytics allows security teams to detect compromised and malicious users that were previously difficult, or impossible, to find. Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats. Join Reciprocity experts as we share and discuss with you: The volume and types of security noise being generated across a cloud ecosystem can be deafening, bordering on unmanageable. Suite 200 Recent years have seen great progress in the enumeration and categorization of adversary TTPs. Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Each Cyber Security Summit is By Invitation Only and all attendees are pre-screened & approved in advance. He also completed Harvard Business Schools Executive Education Advanced Management Program. He will show how a Zero Trust Strategy will achieve tactical and operational goals. Cybercrime is up 600% due to the COVID-19 pandemic, and remote work has increased the average cost of a data breach by $137,000. Grimes holds a bachelors degree from Old Dominion University. We believe in a secure environment for all. Changing the mindset of defenders to offensive and proactive will help us build a safer world. Did Under Armour, Facebook, Equifax, Yahoo, Blue Cross / Blue Shield, Sony, Target and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Topic for this session Autonomous Response . When paired with unprecedented geopolitical uncertainty, its never been more important for organizations to be vigilant against bad actors. SolCyber, a ForgePoint company, is the first modern MSSP to deliver a curated stack of enterprise strength security tools and services that are streamlined, accessible and affordable for any organization. Beyond the potential, beyond the hype, zero trust is a strategy that organizations of all sectors and sizes are employing today. During this session youll hear from security practitioners who were responsible for the zero trust strategy and implementation at two Fortune 500 global enterprises Adobe & Cisco. The result: defenders can end cyber attacks from endpoints to everywhere. In this presentation, youll learn how Intelligent Orchestration and Code Dx solutions working hand in hand in a DevSecOps pipeline, help address the following application security testing challenges: This panel will highlight the benefits of migrating to the cloud and examine the pros & cons of the various cloud models. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. 2. 6. Windows 11: Adapt Early or Follow Cautiously? The Boston Cybersecurity Conference will feature industry experts and luminaries, and representatives from some of the worlds top cybersecurity solutions providers. Kathleen achieved over twenty years of experience driving positive outcomes across Information Technology Leadership, IT Strategy and Vision, Information Security, Risk Management, Incident Handling, Project Management, Large Teams, Process Improvement, and Operations Management in multiple roles with MIT Lincoln Laboratory, Hudson Williams, FactSet Research Systems, and PSINet. As a Virtual CISO, he will oversee the strategic and operational aspects of the information security program as well as work to discover and remediate potential gaps or security threats within an organizations environment. Darktrace is the worlds leading cyber AI company and the creator of Autonomous Response technology. But with nearly half the year behind us, what can we anticipate for the rest of the year? The INSPIRED + AVA Difference. He was the weekly security columnist for InfoWorld and CSO magazines from 2005-2019. According to a recent study by KPMG, third-party risk management is a strategic priority for 85 percent of businesses. Security provider SonicWall reported nearly 500 million attacks through September, 2021, an increase of 148% year over year. Virtual Chief Information Security Officer, Chief Information Officer / Chief Technology Officer, Join our newsletter for upcoming events and Industry news. Following a Shields Up warning from the Cybersecurity and Infrastructure Security Agency (CISA) in February, organizations and individuals have been encouraged to be more vigilant than ever. Compliance. Even the most seasoned cybersecurity professionals can be overwhelmed when attempting to take on Zero Trust architectures. With Phosphorus, devices can be reliably patched and updated in a timely fashion with alerts for insecure configurations. 7777 Bonhomme Ave. Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. While some things are difficult to predict, that is not the case with Ransomware, where attacks have been and continue to be accurately predicted to increase significantly in volume and severity. Visore simplifies your organizations security operations with a Single pane-of-glass SecOps Platform that solves interoperability, built to address the #1 challenge plaguing IT and cyber teams: comprehensive & up-to-date asset inventory. Join the Unitrends team as we share our five (5) key pillars of ransomware defense which, when combined, optimize protection against ransomware attacks and enable 100% proof and confidence in the recovery to come. Unlike traditional VPN technology which is costly, hardware-based and both difficult to install and manage, our innovative, Zero Trust Network as a Service platform simply secures access to your local networks, cloud infrastructures, and business applications, with one unified platform. However, challenges in migrating to the cloud and protecting the cloud environment cause concern for many organizations. Take a look at all Data Connectors has to offer here! Save Salesforce Admin 201 & App Builder Certification Training in Burlington, VT to your collection. Our lineup of Industry Experts will contrast traditional perimeter-based security with Zero Trust and offer their insight on how adopting the latter can help companies stay resilient as ransomware threats continue to grow. For sponsorship opportunities email sales@futureconevents.com. Cracking the Code of DevSecOps: Intelligent Orchestration + Code Dx, Solving the Human Element of SaaS Data Security, Email Security Reinvented - Securing Cloud Email and Collaboration. We serve a wide range of businesses, from midsize companies to Fortune 500s, and have established partnerships with the worlds foremost integrators, managed service providers and channel resellers. Blumiras cloud SIEM can be deployed in hours with broad integration coverage across cloud, endpoint protection, firewall and identity providers including Office 365, G Suite, Crowdstrike, Okta, Palo Alto, Cisco FTD and many others. This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Learn the latest defensive measures at the Cyber Security Summit from your peers and from thought leaders in the industry. Kathleen Moriarty, Chief Technology Officer, Center for Internet Security has over two decades of experience. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations. The platform deploys in 5 minutes via API to preventatively block phishing, spam, malware, data leakage, account takeover, BEC, and shadow IT across the organization. Demo the newest technology, and interact with the worlds security leaders and gain other pressing topics of interest to the information security community. We put our heart and soul into this Cybersecurity Conference directory. As the leader in network detection and response (NDR), Vectra uses AI to empower the enterprise SOC to automate threat discovery, prioritization, hunting and response. Thats resulted in business users spending an average of 75% of their workday working in a browser. This panel will discuss the various factors that contribute to the increase in threats facing the remote and hybrid workforce and the solutions needed to stay secure. Our mission is simple: detect threats and stop breaches by resolving every alert for our customers. Many Software as a Service (SaaS) applications (i.e. In order to drive business enablement, these business-critical applications are leveraged by many different identities such as employees, contractors, third-party vendors, and more. Boston Cybersecurity Conference feature industry experts, government agencies and innovative solution providers all bringing real world experience & knowledge to the forefront on specific cybersecurity topics and concerns. As Chief Information Officer, Pete has extensive experience in improving revenue and technology organizations. He has over 25 years of experience in information technology (IT), security, and infrastructure across numerous industries including banking, manufacturing, retail, and software as a service (SaaS). ZenGRC enables companies to track, manage, and assess information security compliance and remediate risk from one consolidated, easy-to-use, lightweight platform. Save Security Peers & Beers [Networking] to your collection. Founded in 2012, the Womens Society of Cyberjutsu (WSC) is a National 501(c)3 non-profit community, focused on empowering women to succeed in the cybersecurity industry. Here at Synopsys, we believe application security should be invisible, completely abstracted, extensible to any AST tools. AuditBoard is top-rated by customers on G2 and Gartner Peer Insights, and was recently ranked for the third year in a row as one of the fastest-growing technology companies in North America by Deloitte. that modern organizations are utilizing strive to achieve the same result. Lack of qualified staff / knowledge and visibility of security platforms continue to be the biggest threats facing cloud security, with misconfigurations accounting for the majority of cloud data breaches. Learn more at alertlogic.com. Rethink your Third-Party Risk Strategy in an Uncertain World, Market Dynamics driving the risk vs. opportunity balance, 5 key considerations to better identify, manage and mitigate third party risk, Real world examples of improving TPRM visibility and efficiency, Making Music from the Cloud Security Noise, Why SOCs Fail - The Maturity Model Required for Cyber Resilience, Why an outcome-based approach is the only way to offer effective coverage and protection for your organization, How the most successful Security programs use a comprehensive, strategic and end-to-end focused approach to address 95% of all operational issues at scale, Why it is critical that Security programs become more use case-driven and full lifecycle workflow orientated, Automated Cyber Attacks: Whats Really Behind The Next Big Threat, The Reason Why Ransomware is Really HEATing Up, Stopping Attacks, Not Your Business: AI & Autonomous Response, How advances in AI have been leveraged to allow for very surgical actions to be taken autonomously where humans can no longer react fast enough, Demo Session: Identity Drives User Experience and Security, An Adversary-Focused Approach to Cybersecurity Defenses. This panel will look at how ransomware attacks and bad actors have evolved to become more successful. Derek is part of Wolf and Companys Advisory Group, where he provides Virtual Chief Information Security Officer (vCISO) services to clients across the US and Canada. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions. To learn more, orschedule a demo, visitwww.akeyless.io. Sean AtkinsonChief Information Security OfficerCenter for Internet SecurityMODERATOR, Ed FabiszewskiAdvisory Systems Engineer, Practice Lead - Cyber Recovery PracticeDell Technologies, Gregg YurchakProfessional Services SpecialistBlackBerry, Jay SpannSecurity Automation EvangelistSwimlane, Mark HarrisCybersecurity AdvisorProofpoint, Mark OstrowskiHead of Engineering, US EastCheck Point Software Technologies. The Pan Asian American Business Council (PAABC) is a non-profit organization consisting of Asian American businesses that would like to promote and grow their own and other Asian American businesses. Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. Perimeter 81 ensures unified network security whether employees are working in or out of the office. This presentation will take these frameworks and matrices as inputs and focus them on the specific adversaries and attack types that are relevant to your organization, so that you can be more efficient with your cybersecurity prevention and detection efforts. Airgap is the only vendor that offers an agentless segmentation solution that protects your organization against ransomware threats. Recognizing the importance of encouraging girls to embrace a future in STEM-related professions through its Cyberjutsu Girls Academy, WSC provides a unique hands-on curriculum focused on securing information technology. Chesterfield, MO 63017. Headquartered in San Francisco, CA, Cloudflare has offices in Austin, TX, Champaign, IL, Boston, MA, Washington, DC, London, and Singapore. In fact, last year in his Executive Order on Improving the Nations Cybersecurity, the President of the U.S. recommended the Federal Government adopt Zero Trust architecture. To enable Asian American owned businesses to develop and grow. However, these frameworks and matrices are often cumbersome and unwieldy because they attempt to be all things for all people, listing every possible adversary and their TTPs. He now serves as the Data-Driven Security Analyst for KnowBe4. Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. Cloud Security Solution Architect at Orca Security, VP, Security Engineering at Critical Start, Principal Security Engineer at Salt Security, Senior Vice President, Cybersecurity Strategy, Technical Staff Assistant/Special Agent at USSS. FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. To be eligible to earn your Full 8 CPE Credits, delegates must be in attendance until 5:00PM. As new models of ransomware emerge and attacks become more frequent as they prove successful to bad actors, its imperative for business leaders to reexamine their approach to cyber security to more effectively combat threats and minimize damage in the event of a ransomware attack. Zero Trust is revolutionizing network security architecture: it is data-centric and designed to stop data breaches. Chief Information Security Officer,Center for Internet Security, Chrome Enterprise Browser Customer Engineer,Google, Advisory Systems Engineer, Practice Lead - Cyber Recovery Practice,Dell Technologies, CEO & Founding Board Member,Womens Society of Cyberjutsu, Head of Engineering, US East,Check Point Software Technologies, Professional Services Specialist,BlackBerry. With a global security delivery infrastructure protecting half a billion endpoints, visionary solutions, and a wealth of awards, we have been a trusted security provider since 2001. Join us to help ensure you, and your company, are prepared for potential cyber threats in todays tech heavy world! Pioneering the IoT and Smart home security: Bitdefender BOX, a ground breaking hardware based solution, offers in one package the ability to protect all the connected devices present in the household, even those which cannot be protected by traditional security software. Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs. As we adapt to the new normal in wake of the COVID-19 pandemic, some businesses have returned to the office while many continue to work from home or are shifting to a hybrid workforce. It provides comprehensive, enterprise-wide cyber defense to over 4,000 organizations worldwide, protecting the cloud, email, IoT, traditional networks, endpoints and industrial systems. Proven and specially designed to protect Manufacturing, Healthcare, and Critical Infrastructure, Airgap Security Platform is the easiest to implement and manage. 3. Marcus Fowler spent 15 years at the Central Intelligence Agency developing global cyber operations and technical strategies, until joining Darktrace in 2019. According to the FBIs Internet Crime Complaint Center, from January to July of 2021 there was a 62% increase in ransomware complaints from year to year. 500 Chesterfield Center Security. Our Industry Experts will discuss best-practices on how businesses and their IT Security Teams should address risks such as insider threat, phishing, unsecured devices and lack of training. It is a complex concept that unifies many different facets of cybersecurity. This session will discuss how Zero Trust will not only transform network security but function as a business enabler, by focusing on the businesses grand strategic objectives. Through its capability to isolate users and machines, Zero Trust can in the event of an attack limit it from spreading while still maintaining running operations, making it a popular security strategy. Code Dx is an award-winning application security risk management solution that automates and accelerates the discovery, prioritization, and remediation of software vulnerabilities. Simple. Mari GallowayCEO & Founding Board MemberWomens Society of CyberjutsuMODERATOR. Learn to protect your, NEXT WEEK 223. SolCyber is disrupting the status quo, by providing a new standard of managed security services that work to reduce cyber risk, wastage and complexity. Way back in 2013 we had another website called Concise Courses which used to market and sell InfoSec training courses. Intelligent Orchestration provides the ability to intelligently orchestrate security tests from our own tools, third-party tools, and open source tools. Our lineup of Industry Experts will offer their insight & explore best-practices on how businesses and their IT Security Teams should address risks such as ransomware, insider threat, phishing, unsecured devices and lack of training.

Sitemap 20