
9:00 am - 9:30 am

Registration & Exhibit Browsing

ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.
All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.
Live: June 8th @ 9am
On Demand: June 9th until 5pm
Registering For a Group?
Call + 1 (609)-356-1499
Interested in addressing ISMG’s global audience of cybersecurity, information security, fraud, risk and compliance professionals?
Speaker:
Christopher Krebs, Director of Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security
Speakers:
Mike Huckaby, VP, Worldwide Sales Engineering, GigamonTimothy Rohrbaugh, CISO, JetBlue AirwaysTomas Maldonado, CISO, NFL
Speaker:
Dave Lewis, Global Advisory CISO, Cisco
Speaker:
Sam Curry, Chief Security Officer, Cybereason
Somewhere out there, in a market crowded by over-qualified workers deluged by job offers, the next generation of CISOs is maturing. But how can CISOs train tomorrow's security executives when today's well-known security talent deficit makes it difficult to fill even the most basic roles?
Retaining cyber professionals isn't just a matter of offering the biggest paycheck - it requires getting creative with cross-training, hands-on experience and developing collaborative solutions with fellow CISOs.
Attend this talk with Sam Curry, Chief Security Officer at Cybereason, to explore strategies for identifying and developing the next generation of CISOs, as well as how to excel in your own role and lay the foundation for a stronger security practice.
Speaker:
Rahim Kaba, VP Product Marketing, OneSpan
A poor customer experience and insufficient security in the account opening process has been shown to directly negatively impact long-term customer loyalty, retention and profitability. New technologies, such as digital identity verification, facial comparison, e-signature, liveness detection, biometrics, and more - are helping banks reinvent how they attract and convert new applicants into happy customers during the digital account opening and onboarding process - while reducing abandonment rates and application fraud.
Key Topics in this session will include:
Speaker:
Dan Fein, Director of Email Security Products, Americas, Darktrace
Today, 94% of cyber-threats still originate in the inbox. 'Impersonation attacks' are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or 'digital fakes', that expertly mimic the writing style of trusted contacts and colleagues.
Humans can no longer distinguish real from fake on their own - businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, 'immune system' technology takes action in seconds - stopping cyber-threats before damage is done. Find out how in this session.
Speaker:
Renee Tarun, Deputy CISO, Fortinet
With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT and security requirements in a rapidly changing environment. In these uncertain times, organizations will need to be prepared for a variety of challenges to ensure secure operations. Organizations will need to shore up their networks to prepare for the influx of applications, devices, and other technologies necessary to support and protect customers, employees, and their business. This session will help organizations understand how to pivot quickly, where to focus their attention, and be strategic in their planning for both today's and tomorrow's security challenges.
Speaker:
Brad Beutlich, Vice President of Western and LATAM Sales, Entrust
For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don't understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.
We'll discuss why nCipher's general purpose hardware security modules (HSMs) are used to solve real-world issues; regardless of company size or vertical market. You'll also discover why it's important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more. Crypto keys are everywhere: We directly integrate with F5, Palo Alto, CyberArk, Gigamon and BeyondTrust, just to name a few.
Speaker:
Ran Shahor, Brigadier General (Ret.), CEO & Founder, HolistiCyber
Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always been a target for these, and the pandemic has only worsened it. These highly advanced mechanisms of cyber assault are continuously evolving and readily available for sale on the darknet, enabling hackers and new players looking for alternative income due to COVID19 to become extremely powerful attackers. The question arises - How can organizations protect themselves in today's crisis cyber reality? And what happens the day after? Fortunately, there are answers and solutions.
In his presentation, Ran Shahor, IDF Brigadier General (Ret.) will discuss the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected and stay ahead of the curve.
Speaker:
Paul Dant, Vice President of Product Management, Digital.ai
When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. But according to recent analyst research, a majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised. And relying on legacy methods - like network or perimeter protection that is incapable of detecting these kinds of attacks - can have dire consequences.
In this session, Arxan senior security engineer Paul Dant will discuss the impact of reverse engineering mobile applications and exposing vulnerabilities that can lead to a devastating breach. He'll share how to harden applications using code obfuscation, key and data encryption, and provide best practices for building a comprehensive security strategy that includes real-time visibility into active threats.
Speakers:
Alex Corstorphine, Lead Security Solutions Engineer, Rapid7Jeremy Snyder, Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7
Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear your hair out in frustration? Join Jeremy Snyder, Senior Director of Solutions Engineering, and Alex Corstorphine, Senior Solutions Engineer, from DivvyCloud by Rapid7 for an active discussion and debate. Topics will include why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations governing cloud IAM to reduce risk and the chance of a data breach.
Key takeaways include understanding how to:
Speaker:
Alberto Yepez, Co-Founder and Managing Director, ForgePoint Capital
Speaker:
Geoff Belknap, CISO, LinkedIn
Speakers:
Jeff Schwartz, Vice President of North America Engineering, CheckpointRandy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLPRonald Raether, Partner, Partner at Troutman Pepper
At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their remote workforces, and now those risks are coming due. Join these seasoned cybersecurity attorneys and industry analysts for an interactive discussion of legal trends and potential traps, including:
Speaker:
Ryan Poppa, Director of Product Management at Cisco Cloud Security
How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?
Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.
In his presentation, you'll learn:
Ryan will also share key insights on how you can protect your organization against these malicious actors and improve your cybersecurity posture with immediate results.
Speaker:
Ameya Talwalkar, Co-Founder and Chief Product Officer, Cequence Security
With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to consider whether your existing infrastructure and security tools can identify security gaps before they become incidents and if they can withstand an industrialized attack. API coding errors and malicious bots are a significant cause of fraud and theft-related revenue losses, infrastructure overspending, poor customer experience, and brand damage.
In this talk, we'll explore several case studies of API attacks and techniques and discuss what's needed to protect your applications and your business from suffering damages.
Key takeaways:
Speaker:
Yassir Abousselham, CISO, Splunk
Speakers:
Craig Hoffman, Co-Leader Digital Risk Advisory and Cybersecurity Team, BakerHostetlerJeff Chan, Technical Advisor, MOXFIVEKen Suh, Focus Group Leader, Cyber & Tech Claims, BeazleyMark Singer, Cyber and Tech E&O Claims Manager, Beazley
Speaker:
John Grim, Head | Research, Development, Innovation, Verizon Threat Research Advisory Center
Speaker:
Ofer Israeli, Founder, CEO, Illusive Networks
Speaker:
Michael Geraghty, CISO, State of New Jersey
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismg.io