Don't wait for a breach to happen, take action and safeguard your digital assets now! This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the Chicago Cybersecurity Conference on 10/12/23. Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors.
Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.
thursday, October 12, 202308:00 AM to 06:00 PM
Michael CamachoSpecial Agent, HSI DHS
Cyber Inter-Agency Collaboration Panel
Chuck LauSpecial Agent, HSI DHS
Cyber Inter-Agency Collaboration Panel
YOU CAN’T AFFORD TO MISS THIS CONFERENCE:
Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.
Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.
Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.
By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.
It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.
Session #1General Sessions
In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveil an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.
Malicious actors are attacking companies of all sizes, necessitating an enterprise-quality cyber resiliency strategy and scalable toolset for small and medium sized organizations. The likelihood of ransomware attacks has transitioned from ‘if’ to ‘when,’ and many discover too late that they have gaps in their disaster recovery plans.
Do you have the right people, tools, and testing in place to protect your most valuable asset 24/7 – your data?
Get key insights from Thrive and TitanHQ on the benefits of a multi-layered cybersecurity framework to protect email, cloud, and hybrid IT environments for businesses of any size.
Hear about businesses like yours that found solutions to:
- Protect across the three main attack surfaces – endpoints, network, and cloud/SaaS
- Protect email and end users against spam, phishing, and social engineering attacks
- Use immutable backup for resiliency from ransomware, sophisticated attacks, and data loss
- Detect and respond to cyber threats using actionable recommendations and observations
- Backup and recover Microsoft 365 Exchange, Teams, OneDrive for Business and SharePoint Online
- Build resilient and flexible disaster recovery for any budget
The day of a breach, commonly referred to as "cyber game day," is not the opportune moment to determine your ability to effectively counteract an attack and execute an effective incident response. One must adopt an attacker's mindset as the sole means of honing their craft. It is imperative to assess one's capabilities prior to the actual breach proactively. Learn how to rigorously challenge and evaluate the efficacy of your preventive and detection measures in the face of real-world attacks on a continuous basis. Quantify your security posture and how to ensure confidence in your resilience to everyday threat actors in an ever changing threat landscape.
Protecting Against Cyber AttacksGeneral Sessions
Malware detection fails for zero days and other novel attacks. People are getting better at detecting phishing and other malware, but are not reliable enough to be enterprise grade! We provide protection without relying on detection, and in a form that is largely transparent to the user.
Ransomware in the Enterprise: Cyber resiliency lessons from 1,200 successful attacksGeneral Sessions
Recent years have seen a rapid shift to remote work and to new models for engaging with customers. This rush for deployment has often left gaps in data security that put sensitive data at risk, and ransomware actors have been quick to exploit those gaps. Join this session to learn about your best options for protecting your data, both on-prem and in the cloud. The focus will be on specific, vendor-neutral technical strategies that can be put in place quickly to prevent successful ransomware attacks. Strategies recommended will be informed by the latest data on the mechanics and aftermath of ransomware attacks, drawn from Veeam's 2023 Ransomware Trends Report.
Lunch BreakSolutions Showcase
Keynote Presentation: Making sense of Geopolitical Risks in 2023 – Impact on Cybersecurity & ComplianceGeneral Sessions
There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?
Signed Books by Keynote Speaker Mathieu GeorgeBook Signing: The Cyber Elephant in the Board Room
Cyber-Accountability with the Five Pillars of Security Framework by Mathieu Gorge
Enterprise security and compliance are critical for the long-term viability of any business. In a world that’s increasingly reliant on sensitive data, the stakes are high, and the consequences of a breach catastrophic. Paradoxically, cybersecurity remains an often-thankless job. If done well, it goes unnoticed, but one failure could derail a career.
With security vulnerabilities posing a daily existential threat to businesses, The Cyber Elephant in the Boardroom questions why cybersecurity is relegated to the responsibility of an individual or small siloed team, when the reality is that a truly holistic security approach must be a team effort. To author Mathieu Gorge, change must start at the top.
Before any breach can be reliably prevented across any organization, cyber-accountability must breach the C-suite. In his 20+ years advising company executives around the world, Mathieu Gorge noticed a troubling trend. Despite CxOs overseeing so many critical business functions, few if any felt a responsibility to safeguard the one thing that could fatally compromise every function of the business: cybersecurity. Importantly, it was not because they weren’t willing to act; they simply didn’t know what they didn’t know. There was an inkling that more could be done, but determining the nature of that “more” and how to achieve it was always too daunting. Not anymore.
Informed by Mathieu Gorge’s encounters with CxOs spanning numerous industries, The Cyber Elephant in the Boardroom is a simple-to-understand methodology that leaders can deploy to establish cyber-accountability, starting with company leaders. Related in plain language comprehensible to leaders of any background, the core of Mathieu’s book is his 5 Pillars of Security Framework™.
“It’s a jargon-free, easy-to-implement, industry-agnostic methodology to help C-level executives and board members understand bubbles of risk, build enterprise cybersecurity strategies, and achieve cyber-accountability,” says Gorge.
With Mathieu’s expert advice, any C-level executive or board member can understand their responsibility towards cyber risk, visualize their organization’s current cybersecurity and compliance position, and learn tactics for implementing long-lasting, adaptable cybersecurity strategies.
Cyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do NowGeneral Sessions
What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense?
The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive.
Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.
Risky links come to us in several ways. Slack, LinkedIn, SMS … it is almost unending. In fact, it just may be. The good news is that a link opens mostly in one place, which is the browser. ConcealBrowse will isolate the risky links when they are opening and protect the user from the malware being deployed.
2023 Trends and Directions In CybersecurityGeneral Sessions
With the volumes of data produced by all the signals in the modern enterprise infrastructure humans can no longer meaningfully consume and make sense of it. Meanwhile, attacks on your business are getting more and more sophisticated. Join this session to learn how Elastic applies ML and AI to enable cybersecurity analysts (not data scientists) all around the world and to help them solve this challenge.
Guest Keynote Presentation: Cybersecurity Resources to Increase Resilience and Reduce RiskGeneral Sessions
Cyber Inter-Agency Collaboration PanelGeneral Sessions
Cyber Executive RoundtableGeneral Sessions
Networking Reception & Signed BooksSolutions Showcase
Also receive a free signed copy of Mathieu Gorge's book "The Cyber Elephant in the Boardroom"