ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: North East

June 08-09, 2021

Register Now

WELCOME / Summit Overview

ISMG’s Global Summit Series will take place across multiple continents, focusing on global security topics such as fraud and breach prevention, zero trust security, connected devices and on many key industry verticals such as finance, government, retail, energy and healthcare.

All content will be driven by our global editorial team from publications such as DataBreachtoday, BankInfoSecurity, GovInfoSecurity and HealthcareInfoSecurity, as well as our newest sites dedicated to Payments Security, Device Security and Fraud. These events will provide the opportunity to learn from industry influencers, earn CPE credits, meet with leading technology providers and be a part of the ISMG community of over 900,000 subscribers.

Details

Free Registration

Live: June 8th @ 9am

On Demand: June 9th until 5pm

Register

Registering For a Group?
Call + 1 (609)-356-1499

  • Event Gallery

Eugene Liderman

Director of Mobile Security Strategy, Google

Diana Kelley

Cybersecurity Field CTO, Microsoft

M.K. Palmore

VP, Field CSO, Palo Alto Networks, fmr FBI Agent, San Francisco Cyber Division

Jeffrey Dant

Managing Director, Fraud Ops and Intelligence, BMO Financial Group

Devon Bryan

Executive Vice President & CISO, Federal Reserve System

Julie Conroy

Research Director, Aite Group

Brian Harrell

Asst Dir, U.S. Cybersecurity and Infrastructure Security Agency

Stephen Katz

World's First CISO, former CISO, Merrill Lynch, Citi

PAST SPEAKERS / Featured Past Speakers

Geoff Belknap

CISO, LinkedIn

Christopher Krebs

Director of Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security

Timothy Rohrbaugh

CISO, JetBlue Airways

Ken Suh

Focus Group Leader, Cyber & Tech Claims, Beazley

Alberto Yepez

Co-Founder and Managing Director, ForgePoint Capital

Ran Shahor, Brigadier General (Ret.)

CEO & Founder, HolistiCyber

Sam Curry

Chief Security Officer, Cybereason

Matt Rose

Global Director Application Security Strategy, Checkmarx

Dave Lewis

Global Advisory CISO, Cisco

Renee Tarun

Deputy CISO, Fortinet

Ameya Talwalkar

Co-Founder and Chief Product Officer, Cequence Security

Jeff Schwartz

Vice President of North America Engineering, Checkpoint

Ofer Israeli

Founder, CEO, Illusive Networks

Mike Huckaby

VP, Worldwide Sales Engineering, Gigamon

Dan Fein

Director of Email Security Products, Americas, Darktrace

Ryan Bergquist

Sales Engineer, Netsparker

Mark Schembri

Technical Sales Engineer, Acunetix

Paul Dant

Vice President of Product Management, Digital.ai

Jeremy Snyder

Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7

Alex Corstorphine

Lead Security Solutions Engineer, Rapid7

Michael Geraghty

CISO, State of New Jersey

Ryan Poppa

Director of Product Management at Cisco Cloud Security

Gurinder Bhatti

Senior Solutions Engineer, Okta

Brad Beutlich

Vice President of Western and LATAM Sales, Entrust

Tomas Maldonado

CISO, NFL

Ronald Raether

Partner, Partner at Troutman Pepper

Randy Sabett

Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP

Jeff Chan

Technical Advisor, MOXFIVE

Craig Hoffman

Co-Leader Digital Risk Advisory and Cybersecurity Team, BakerHostetler

Mark Singer

Cyber and Tech E&O Claims Manager, Beazley

Yassir Abousselham

CISO, Splunk

John Grim

Head | Research, Development, Innovation, Verizon Threat Research Advisory Center

Rahim Kaba

VP Product Marketing, OneSpan

Call for Speakers is Now Open!

Interested in addressing ISMG’s global audience of cybersecurity, information security, fraud, risk and compliance professionals?

Click here to learn more!

Schedule / Session Dates & Times



  • Tuesday, June 8th

  • Wednesday, June 9th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

Election Cybersecurity 2020

Speaker:
Christopher Krebs, Director of Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security

In terms of election cybersecurity, is the U.S. better off in 2020 than it was in 2016? Christopher Krebs, Director of the Cybersecurity and Infrastructure Security Agency, answers this question and more in an exclusive keynote that tackles:
  • The state of election security
  • Myths and realities about foreign influence
  • What has been done to ensure election resiliency
10:00 am -
10:30 am
10:00 am - 10:30 am

CISO's Perspective: Adapt and Secure

Speakers:
Mike Huckaby, VP, Worldwide Sales Engineering, Gigamon
Timothy Rohrbaugh, CISO, JetBlue Airways
Tomas Maldonado, CISO, NFL

2020 has brought seismic change to all sectors, and cybersecurity leaders have been in the driver's seat in helping their enterprises adapt. Join this exclusive panel for unique insight into:
  • How to respond when your business faces historic transformation;
  • Challenges posed by new threats, endpoint security challenges and expanded reliance on the cloud;
  • How to strategize and budget for ongoing challenges in 2021.
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

Zero Trust Access: The Five Step Program

Speaker:
Dave Lewis, Global Advisory CISO, Cisco

The perimeter-based security approach of the last century is no longer adequate for securing the modern enterprise. Today, organizations must secure a mobile workforce that uses a mix of corporate-owned and personal devices to access cloud-based applications and services, often from outside corporate networks. The zero trust access model delivers security without cumbersome and antiquated technologies. Attend this session to learn how the zero trust access model works, how leading organizations such as Google use this approach to secure access to their critical applications and data, and how you can implement this model in your organization in five logical steps.
10:30 am - 11:00 am Track B

How to Not Lose Your Job in 13 Months: NG CISO

Speaker:
Sam Curry, Chief Security Officer, Cybereason

Somewhere out there, in a market crowded by over-qualified workers deluged by job offers, the next generation of CISOs is maturing. But how can CISOs train tomorrow's security executives when today's well-known security talent deficit makes it difficult to fill even the most basic roles?

Retaining cyber professionals isn't just a matter of offering the biggest paycheck - it requires getting creative with cross-training, hands-on experience and developing collaborative solutions with fellow CISOs.

Attend this talk with Sam Curry, Chief Security Officer at Cybereason, to explore strategies for identifying and developing the next generation of CISOs, as well as how to excel in your own role and lay the foundation for a stronger security practice.

10:30 am - 11:00 am Track C

The Role of Digital Identity in Account Opening & Onboarding

Speaker:
Rahim Kaba, VP Product Marketing, OneSpan

A poor customer experience and insufficient security in the account opening process has been shown to directly negatively impact long-term customer loyalty, retention and profitability. New technologies, such as digital identity verification, facial comparison, e-signature, liveness detection, biometrics, and more - are helping banks reinvent how they attract and convert new applicants into happy customers during the digital account opening and onboarding process - while reducing abandonment rates and application fraud.

Key Topics in this session will include:

  • Strategies for removing friction in the mobile account opening experience
  • How to mitigate application fraud and synthetic identities
  • Industry data on investment priorities and adoption of new digital ID tech
  • 11:00 am -
    11:15 am
    11:00 am - 11:15 am Track A

    Faking It - How Cyber AI can Combat Digital Fakes

    Speaker:
    Dan Fein, Director of Email Security Products, Americas, Darktrace

    Today, 94% of cyber-threats still originate in the inbox. 'Impersonation attacks' are on the rise, as artificial intelligence is increasingly being used to automatically generate spear-phishing emails, or 'digital fakes', that expertly mimic the writing style of trusted contacts and colleagues.

    Humans can no longer distinguish real from fake on their own - businesses are increasingly turning to AI to distinguish friend from foe and fight back with autonomous response. In an era when thousands of documents can be encrypted in minutes, 'immune system' technology takes action in seconds - stopping cyber-threats before damage is done. Find out how in this session.

    11:00 am - 11:15 am Track B

    An Integrated Approach to Embedding Security Into DevOps

    Speaker:
    Matt Rose, Global Director Application Security Strategy, Checkmarx

    11:15 am -
    11:30 am
    11:15 am - 11:30 am Track A

    Tech Spotlight: Security Operations In This New Paradigm

    Speaker:
    Renee Tarun, Deputy CISO, Fortinet

    With unprecedented levels of remote working, organizations have had to respond quickly and prioritize IT and security requirements in a rapidly changing environment. In these uncertain times, organizations will need to be prepared for a variety of challenges to ensure secure operations. Organizations will need to shore up their networks to prepare for the influx of applications, devices, and other technologies necessary to support and protect customers, employees, and their business. This session will help organizations understand how to pivot quickly, where to focus their attention, and be strategic in their planning for both today's and tomorrow's security challenges.

    11:15 am - 11:30 am Track B

    What You Don't Understand About Crypto Can Hurt You

    Speaker:
    Brad Beutlich, Vice President of Western and LATAM Sales, Entrust

    For over 2000 years, governments, armies, businesses and lovers have been encrypting messages. For the same amount of time, the keys used to perform the encryption have been the weakest link in the chain. After 2000 years, technology has advanced such that the keys can be protected but many companies don't understand how important it really is. Mr. Beutlich will explain in an entertaining (and sometimes graphic) fashion why protecting the encryption key is more important than the encryption itself.

    We'll discuss why nCipher's general purpose hardware security modules (HSMs) are used to solve real-world issues; regardless of company size or vertical market. You'll also discover why it's important to protect the crypto keys associated with Database Encryption, File Encryption, Digital Signatures & Certificates, IoT Device Certification, Blockchain, Digital Payments, SSL, PKI and more. Crypto keys are everywhere: We directly integrate with F5, Palo Alto, CyberArk, Gigamon and BeyondTrust, just to name a few.

    11:30 am -
    11:45 am
    11:30 am - 11:45 am

    Exhibit, Resource Center & Networking Break

    11:45 am -
    12:15 pm
    11:45 am - 12:15 pm Track A

    Cyber Defense During a Time of Crisis and After

    Speaker:
    Ran Shahor, Brigadier General (Ret.), CEO & Founder, HolistiCyber

    Any and every one is a target for nation-state grade cyber attacks, especially during a global crisis. During times of crisis there is a shift in focus which allows cyber-attacks to grow and intensify, and a large portion of them are nation-state grade. The private sector, all verticals and industries, have always been a target for these, and the pandemic has only worsened it. These highly advanced mechanisms of cyber assault are continuously evolving and readily available for sale on the darknet, enabling hackers and new players looking for alternative income due to COVID19 to become extremely powerful attackers. The question arises - How can organizations protect themselves in today's crisis cyber reality? And what happens the day after? Fortunately, there are answers and solutions.

    In his presentation, Ran Shahor, IDF Brigadier General (Ret.) will discuss the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected and stay ahead of the curve.

    11:45 am - 12:15 pm Track B

    APIs, Digital Transformation and a New Approach to Security

    Speaker:
    Paul Dant, Vice President of Product Management, Digital.ai

    When it comes to finance, mobile banking or payments apps, maintaining customer trust is crucial to protecting brand equity and revenue. But according to recent analyst research, a majority of mobile finance apps lack the security controls and code hardening necessary to prevent applications from being compromised. And relying on legacy methods - like network or perimeter protection that is incapable of detecting these kinds of attacks - can have dire consequences.

    In this session, Arxan senior security engineer Paul Dant will discuss the impact of reverse engineering mobile applications and exposing vulnerabilities that can lead to a devastating breach. He'll share how to harden applications using code obfuscation, key and data encryption, and provide best practices for building a comprehensive security strategy that includes real-time visibility into active threats.

    • Gain knowledge on the ease at which mobile apps can be reverse engineered - the first step in circumventing traditional security approaches
    • Understand how common app vulnerabilities and development mistakes can lead to data exposure
    • Learn what's necessary to implement a comprehensive mobile app security strategy
    11:45 am - 12:15 pm Track C

    Cloud IAM: Enlightenment or Bull$#^&?

    Speakers:
    Alex Corstorphine, Lead Security Solutions Engineer, Rapid7
    Jeremy Snyder, Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7

    Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear your hair out in frustration? Join Jeremy Snyder, Senior Director of Solutions Engineering, and Alex Corstorphine, Senior Solutions Engineer, from DivvyCloud by Rapid7 for an active discussion and debate. Topics will include why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations governing cloud IAM to reduce risk and the chance of a data breach.

    Key takeaways include understanding how to:

    • Gain visibility to assess, prioritize and remediate improper permission combinations that grant unintended or overly permissive access.
    • Reduce access down to least privilege.
    • Work to minimize cloud security blast radius.
    12:15 pm -
    12:45 pm
    12:15 pm -
    12:45 pm
    12:15 pm - 12:45 pm

    Venture Capitalist View: The State of the Cybersecurity Marketplace

    Speaker:
    Alberto Yepez, Co-Founder and Managing Director, ForgePoint Capital

    It's been a seismic year for the global economy, and now sector has been immune to the aftershocks. Where does this leave the cybersecurity marketplace, and what is the outlook for market growth and hot technologies as we approach 2021? In this exclusive session, Alberto Yépez of ForgePoint Capital shares insight on:
    • The changing economic landscape
    • State of venture capital funding
    • COVID-19 impact on buyers, suppliers and how technology categories
    12:45 pm -
    1:30 pm
    12:45 pm - 1:30 pm

    Exhibit, Resource Center & Networking Break

    1:30 pm -
    5:00 pm
    1:30 pm - 5:00 pm

    OnDemand Session Viewing Available

    View Schedule
    • Hall A
    • Hall B
    • Hall C
    • Hall D
    9:00 am -
    9:30 am
    9:00 am - 9:30 am

    Registration & Exhibit Browsing

    9:30 am -
    10:00 am
    9:30 am - 10:00 am

    Beyond Security: Building Security Teams Focused on Member and Customer Trust

    Speaker:
    Geoff Belknap, CISO, LinkedIn

    Whether you're building a security team from scratch or strengthening an existing team, it's important to first think about the cultural values you'd like to instill within the team. Cultural tenets such as trust by design, risk management in concert with customer service and organization-wide understanding of security best practices are a few of the values to consider when looking to reset or kickstart culture on today's security teams. Join LinkedIn CISO Geoff Belknap as he shares some of the key cultural values on his own team, and how this enables trust to be built into its very core.
    10:00 am -
    10:30 am
    10:00 am - 10:30 am

    2021: The Cybersecurity Legal and Compliance Outlook

    Speakers:
    Jeff Schwartz, Vice President of North America Engineering, Checkpoint
    Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
    Ronald Raether, Partner, Partner at Troutman Pepper

    At the start of 2020, the legal and compliance communities were focused on the enactment of CCPA and other global privacy initiatives. A worldwide pandemic later, and the focus is on business resiliency, insider risk and visibility into a new army of endpoint devices. Many enterprises accepted new risk to deploy their remote workforces, and now those risks are coming due. Join these seasoned cybersecurity attorneys and industry analysts for an interactive discussion of legal trends and potential traps, including:

    • Business resiliency "gotchas"
    • The "perfect storm" for insider risk and fraud
    • Regulatory expectations that haven't gone away
    10:30 am -
    11:00 am
    10:30 am - 11:00 am Track A

    How to Think Like a Cybercriminal (so you can outsmart them)

    Speaker:
    Ryan Poppa, Director of Product Management at Cisco Cloud Security

    How well do you really know your environment, your security practices and policies? Do you know the tools, techniques, and procedures that cyberattackers use to exploit your vulnerabilities?

    Join Cisco Umbrella cybersecurity expert Ryan Poppa exposes the inner workings of a crafty cyberattack.

    In his presentation, you'll learn:

    • Why you have been targeted for attack
    • How cybercriminals penetrate environments
    • What tactics they use to pivot from system-to-system while escalating privileges along the way
    • How they are capable of easily exfiltrating sensitive data out of your organization
    • Where your biggest threats may exist

    Ryan will also share key insights on how you can protect your organization against these malicious actors and improve your cybersecurity posture with immediate results.

    10:30 am - 11:00 am Track B

    Defending Your APIs Against Industrialized Cybercrime

    Speaker:
    Ameya Talwalkar, Co-Founder and Chief Product Officer, Cequence Security

    With APIs pervasive across your organization, powering apps, and enabling digital transformation, you need to consider whether your existing infrastructure and security tools can identify security gaps before they become incidents and if they can withstand an industrialized attack. API coding errors and malicious bots are a significant cause of fraud and theft-related revenue losses, infrastructure overspending, poor customer experience, and brand damage.

    In this talk, we'll explore several case studies of API attacks and techniques and discuss what's needed to protect your applications and your business from suffering damages.

    Key takeaways:

    • How attackers are evolving to bypass detection
    • How cybercriminals beat traditional approaches
    • How Machine Learning and AI can provide help detect and defend against malicious bots
    • Why an end-to-end API security strategy is imperative to making your apps less attractive to criminals
    10:30 am - 11:00 am Track C

    Evolution of the CISO priorities in the COVID-19 era

    Speaker:
    Yassir Abousselham, CISO, Splunk

    Data is the lifeblood of modern organizations - and modern security operations. Today's SecOps teams must be more data-driven, leveraging automation, machine learning and other tools to quickly identify threats and reduce response times, while freeing up critical engineering and analyst resources. Splunk CISO Yassir Abousselham will discuss the evolution of CISO priorities within the current threat landscape and his vision for helping businesses move faster and securely during the Covid-19 era.
    11:00 am -
    11:15 am
    11:00 am - 11:15 am Track A

    How DAST Solutions can be Maximized through IAST

    Speaker:
    Mark Schembri, Technical Sales Engineer, Acunetix

    11:00 am - 11:15 am Track B

    Identity & Security: Enabling Remote Work

    Speaker:
    Gurinder Bhatti, Senior Solutions Engineer, Okta

    11:15 am -
    11:30 am
    11:15 am - 11:30 am

    Exhibit, Resource Center & Networking Break

    11:30 am -
    12:00 pm
    11:30 am - 12:00 pm Track A

    Recovering from Ransomware: Managing Stakeholders, Recovering Data, and Cybersecurity Coverage

    Speakers:
    Craig Hoffman, Co-Leader Digital Risk Advisory and Cybersecurity Team, BakerHostetler
    Jeff Chan, Technical Advisor, MOXFIVE
    Ken Suh, Focus Group Leader, Cyber & Tech Claims, Beazley
    Mark Singer, Cyber and Tech E&O Claims Manager, Beazley

    Companies must adapt to meet the ever changing challenges posed by ransomware. Navigating a response to ransomware requires understanding the legal and technical process of engaging a threat-actor, containing the threat, evaluating potential back-ups, and managing the expectations of business stakeholders. Our panel of legal, technical, and cybersecurity experts discuss best practices based on assisting clients on thousands of cybersecurity incidents.
    11:30 am - 12:00 pm Track B

    Watch Your Back: Insider Threat Insight from Verizon's 2020 DBIR

    Speaker:
    John Grim, Head | Research, Development, Innovation, Verizon Threat Research Advisory Center

    Verizon's 2020 Data Breach Investigations Report (DBIR) reveals that, across all industries, "inside actors" are responsible for nearly 1/3 of data breaches -- and the number is even higher in some industries. Join cybersecurity experts from Verizon for a look at how insiders can accidentally (or intentionally) cause great harm, and how security and business leaders can better mitigate Insider Threats.
    11:30 am - 12:00 pm Track C

    How IAM Empowers Businesses to Securely Work from Anywhere

    Speaker:
    John Bennett, SVP & General Manager, Identity & Access Management at LogMeIn

    Remote work is the new normal. In this new work-from-anywhere environment, how can IT leaders ensure
    12:00 pm -
    12:15 pm
    12:00 pm - 12:15 pm Track A

    How to Build a Web App Security Program to Secure Thousands of Applications

    Speaker:
    Ryan Bergquist, Sales Engineer, Netsparker

    12:00 pm - 12:15 pm Track B

    The Coming Insider Threat Spike

    Speaker:
    Ofer Israeli, Founder, CEO, Illusive Networks

    In this time of crisis, remote work has become a necessary survival mechanism. However, it has also turned thousands of potential malicious insiders into outsiders, separated physically and emotionally from their organizations. Unprecedented financial, emotional, and professional hardships have tempted and emboldened insiders to take action during past upheavals, and the pattern is repeating itself now. In this session, we will explore how organizations can ensure they have the means to detect and deter the silent, malicious activity of trusted users no matter how global events continue to evolve.
    12:15 pm -
    12:45 pm
    12:15 pm - 12:45 pm

    One on One: NJ State CISO Michael Geraghty on Resilience, Cybersecurity and the Road Ahead

    Speaker:
    Michael Geraghty, CISO, State of New Jersey

    The State of New Jersey was at one point part of the epicenter of the U.S. COVID-19 pandemic. How did the state's CISO approach business resiliency, digital transformation and the expanded threat landscape? In an exclusive one-on-one discussion, NJ State CISO Michael Geraghty discusses:
    • Business continuity/resiliency in the pandemic era
    • The lasting impact of digital transformation
    • How he has approached identity, access and endpoint security with a distributed workforce
    12:45 pm -
    1:30 pm
    12:45 pm - 1:30 pm

    Exhibit, Resource Center & Networking Break

    1:30 pm -
    5:00 pm
    1:30 pm - 5:00 pm

    OnDemand Session Viewing Available

    View Schedule

    PAST SPONSORS / Supporting Organizations

    Arxan
    Beazley Group
    Checkmarx
    Check Point
    Cisco Systems
    Darktrace
    digital.ai
    DivvyCloud
    DUO Security
    Fortinet
    Gigamon
    HolistiCyber
    Illusive Networks
    LastPass
    nCipher
    netsparker
    Okta
    OneSpan
    Splunk
    Verizon

    Meet Our Speakers

    ISMG Global Events: 2020 and Beyond

    ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

    The Critical Importance of Data Integrity

    Microsoft's Diana Kelley on How to Keep Data Untampered

    Steve Katz on Cybersecurity’s State of the Union

    World's First CISO Weighs in on the Technologies and Trends Shaping 2019

    The Challenge of Fighting Identity Fraud

    IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

    A Common Sense Guide to Mitigating Insider Threats

    Randy Trzeciak of CERT Reviews the Latest Research

    VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

    View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

    If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.

    ISMG Virtual Summit Attendee Guide
    For more information please download our ISMG Virtual Summit Attendee Guide.

    Register Today

    To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

    Registering For a Group?
    Call + 1 (609)-356-1499  or email at events@ismg.io

    Contact Us

    Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

    +1 (609) 356-1499
    events@ismg.io

    Join the Community

    Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

      • BankInfoSecurity
      • CUInfoSecurity
      • GovInfoSecurity
      • HealthcareInfoSecurity
      • InfoRiskToday
      • CareersInfoSecurity
      • DataBreachToday
      • CyberEd
      Home | Summits | Press Releases | Sponsorship
      © 2021 Information Security Media Group, Corp. |
      Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data