• Featured Speakers

    Collapse This Item

Event Schedule

Times for this Event are in Eastern Time (EDT/EST).

The Summit will be open from 9:00 AM to 3:30 PM Thursday, August 18th.

  • Welcome / Introductions
  • Protecting Against Cyber Attacks 10:05 am

    Panel Participants:

    Neil Clauson
    Neil Clauson

    Neil Clauson

    Director, Regional CISO at Mimecast

    Tim Savage
    Tim Savage

    Tim Savage

    Top of Funnel Optimizer at Conceal

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Growth Technologies Evangelist at Check Point Software Technologies

    Richard Marcus
    Richard Marcus

    Richard Marcus

    Head of Information Security at AuditBoard

    Collapse This Item

  • Do You Know Who Is on Your Endpoint? 10:50 am

    Presented by TypingDNA

    In looking at the top attacks of the last few years, attackers take full advantage of users with excessive privileges and those who run without multi-factor authentication. To make matters worse, cyber insurance is beginning to come with waivers for those who work from home or cannot validate a device that is truly authenticated correctly to the correct user. Join to learn about: 

    – Importance of Least Privileges and MFA. 

    – Importance of truly identifying/authenticating users behind a login. 

    – Critical techniques to protect executive, high target, and administrative accounts. 

    – Insurance and compliance standards driving adoption.

    Click to Expand

    Speaker:

    Tim Savage
    Tim Savage

    Tim Savage

    Top of Funnel Optimizer at Conceal

    Collapse This Item

  • Windows 11: Adapt Early or Follow Cautiously? 11:10 am

    Presented by baramundi

    6 years after the release of Windows 10, Microsoft introduced their new Operating System Windows 11. That fact is causing a lot of IT Departments to evaluate their decision whether it is worth it to make the transition now or not. Especially with a lot of companies still having remote work and older machines in place this decision comes with a few new challenges companies need to be aware of. On the other hand Windows 11 opens up new possibilities with regards to security and efficiency. 

    Axel Peters from baramundi software will tackle the big questions that IT departments have regarding Windows 11: Should I start planning deployment now or sit tight for a while? How does Microsoft’s latest OS affect endpoint management? And how will it affect endpoint security?

    Click to Expand

    Speaker:

    Axel Peters
    Axel Peters

    Axel Peters

    VP West Operations, baramundi

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 11:30 am

    Moderator:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Panel Participants:

    Kelley Goldblatt
    Kelley Goldblatt

    Kelley Goldblatt

    Cybersecurity Advisor, Region 5: Michigan at Department of Homeland Security

    Joshua Seney
    Joshua Seney

    Joshua Seney

    Network Intrusion Forensics Analyst at US Secret Service

    Benjamin Simon
    Benjamin Simon

    Benjamin Simon

    Special Agent at FBI, Detroit Field Office

    Collapse This Item

  • Lunch Break
  • Cybersecurity Leadership Lessons, from Hawaii to Afghanistan 12:30 pm

    If it’s not Illegal, immoral, or unethical – it’s on the table. John Felker led some of our nation’s largest and most important groups within consequential missions related to security, defense and protection. Pulling from his experiences at CISA, NCCIC, the US Coast Guard Cyber Command, and more, he will share with the Conference audience his most prescient takeaways from a lifetime of service, with a specific focus on cybersecurity.

    Today, cybersecurity leaders are uniquely positioned to lead their peers and the organizations they serve as we are among the most sought-after, read-in, and connected executives in our respective firms. Patching together a depth of technical knowledge, Mr. Felker will focus on further developing information gathering practices, leadership style, and effective decision making in team-based environments that will embody your character as a leader and at the same time encourage the loyalty and compliance of staff at all levels.

    Look for best practices on delegation, setting metrics, training, accountability, and building effective teams in this unique presentation from a monumental executive leader.

    Click to Expand

    Speaker:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Collapse This Item

  • Demystifying Gen V Attacks: Ransomware, Nation State, and Supply Chain 1:30 pm

    Presented by Check Point

    Over the US Independence Day weekend, the attack on IT management software firm Kaseya combined two of 2021’s most notorious cyber attack trends—supply chain attacks and ransomware. At least 1,000 businesses are said to have been affected by the attack, with victims identified in at least 17 countries. In May 2021, a major US fuel company fell victim to a ransomware attack which led to its entire fuel distribution pipeline being shut down while it investigated the problem, causing shortages across the East Coast of the United States and influencing oil prices globally. It wasn’t that long ago that ransomware didn’t even exist. How did we get to this point? And is there any way to stop this most popular trend in cybercrime before it’s too late? This session will address these phenomena and describe how organizations can remain protected against this growing global trend.

    Click to Expand

    Speaker:

    Grant Asplund
    Grant Asplund

    Grant Asplund

    Growth Technologies Evangelist at Check Point Software Technologies

    Collapse This Item

  • Evolving Your Organization’s Security Maturity 2:00 pm

    Presented by Cavelo

    Data protection, security maturity and regulatory compliance go hand in hand. A variety of initiatives can help teams align to best practices while building on their security maturity. Knowing what types of data you have, who has access to it and how it’s used provides data-driven evidence that better supports decision making and demonstrates to stakeholders and auditors that you’re taking appropriate steps to protect your business’s sensitive data – and the privacy of your customers.

    This session will review:

    • The NIST Cybersecurity Maturity Model and how it supports broader security strategy
    • Sensitive data types and how they vary based on the nature of your business or the industry that you operate in
    • Core security initiatives to achieve greater security maturity, whether you’re establishing your baseline or scaling your strategy
    Click to Expand

    Speaker:

    James Mignacca
    James Mignacca

    James Mignacca

    CEO at Cavelo

    Collapse This Item

  • Cyber Executive Panel 2:35 pm

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Moderator:

    John Felker
    John Felker

    John Felker

    President at Morse Alpha Associates, Inc.

    Panel Participants:

    Charles Parker
    Charles Parker

    Charles Parker

    CISO at Genesee County

    Todd Langusch
    Todd Langusch

    Todd Langusch

    CISSP, CISM, Chief Information Security Officer - CIGL Consulting, Inc.

    William Mangold
    William Mangold

    William Mangold

    Information Technology and Security Manager at MCCA

    Arun DeSouza
    Arun DeSouza

    Arun DeSouza

    CISO & CPO at Nexteer Automotive Corporation

    Collapse This Item

  • Summit Closing Session
Partners Register