Registration

Thu. Jun 29

Registration for qualified senior cybersecurity professionals. Subject to approval.

I agree to Data Connectors Terms and Conditions *

Price: $150.00

ENTER VIP CODE HERE


Event Schedule

Times for the Detroit Cybersecurity Conference are in Central Time (CDT/CST).

The Conference will be open from 8:00 AM to 6:30 PM Thursday, June 26th.

  • Welcome to the Detroit Cybersecurity Conference
  • Welcome / Introductions
  • Compliance & Automation in Cybersecurity 8:30 am
    Add to Calendar20230629 8:30 am20230629 8:50 amAmerica/New_YorkCompliance & Automation in Cybersecurity

    Managing compliance needs as a continuous, organizational process (as opposed to a reactive response), amid the ever-increasing myriad of industry regulations and legislation has become a full time job for most CISOs.  Automation – including artificial intelligence and machine learning will help, and are perhaps more critical than ever. As CRPA comes into play and brings the US closer to GDPR, there are also a number of touchpoints where the CDO and CISO interplay will be crucial over the coming months. 

    This session will discuss the current issues with regard to compliance, monitoring, and reporting.  Policy decisions and regulations that have kept CISOs busy of late, and what we can expect more of in 2023 will also be addressed.

    400 Renaissance Dr W
    Detroit, MI 48243

    .

    Managing compliance needs as a continuous, organizational process (as opposed to a reactive response), amid the ever-increasing myriad of industry regulations and legislation has become a full time job for most CISOs.  Automation – including artificial intelligence and machine learning will help, and are perhaps more critical than ever. As CRPA comes into play and brings the US closer to GDPR, there are also a number of touchpoints where the CDO and CISO interplay will be crucial over the coming months. 

    This session will discuss the current issues with regard to compliance, monitoring, and reporting.  Policy decisions and regulations that have kept CISOs busy of late, and what we can expect more of in 2023 will also be addressed.

    Click to Expand

    Collapse This Item

  • How to Win Your Penetration Test: Tips, tricks, and theories for getting the most value out of an offensive security test. 8:50 am
    Add to Calendar20230629 8:50 am20230629 8:50 amAmerica/New_YorkHow to Win Your Penetration Test: Tips, tricks, and theories for getting the most value out of an offensive security test.

    We may be biased, but Penetration Tests are the Swiss Army knife of information security. There is no more effective way to find your gaps, gauge your ability to detect and respond, or protect your crown-jewels than by running a live-fire exercise. However, don’t just buy the penetration test and wait for the results;there are numerous things you can do to ensure you wring out every last drop of value.

    Please join us for a candid conversation with some of the best offensive security minds on the planet. What you’ll learn:

    • Major test types, and what questions they might help you answer
    • How to get more than just findings
    • Why you want to make your pen testers life hard
    400 Renaissance Dr W
    Detroit, MI 48243

    Presented by SecureWorks

    We may be biased, but Penetration Tests are the Swiss Army knife of information security. There is no more effective way to find your gaps, gauge your ability to detect and respond, or protect your crown-jewels than by running a live-fire exercise. However, don’t just buy the penetration test and wait for the results;there are numerous things you can do to ensure you wring out every last drop of value.

    Please join us for a candid conversation with some of the best offensive security minds on the planet. What you’ll learn:

    • Major test types, and what questions they might help you answer
    • How to get more than just findings
    • Why you want to make your pen testers life hard
    Click to Expand

    Speaker:

    Ross McDougall
    Ross McDougall

    Ross McDougall

    Security Engineer at Secureworks

    Collapse This Item

  • 4G/5G Network Security 9:45 am
    Add to Calendar20230629 9:45 am20230629 10:15 amAmerica/New_York4G/5G Network Security

     Protecting organizational infrastructure, networks, and hardware devices is a never ending pursuit these days. There is a secure network solution that offers a simple to manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers. This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and how to provide any-to-any connectivity. Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.

    400 Renaissance Dr W
    Detroit, MI 48243

    Presented by CradlePoint

     Protecting organizational infrastructure, networks, and hardware devices is a never ending pursuit these days. There is a secure network solution that offers a simple to manage alternative to complex VPN infrastructures for securely connecting sites, vehicles, IoT, and remote workers. This session will cover how to secure remote sites with ease, reduce attack surfaces by building undiscoverable network resources, and how to provide any-to-any connectivity. Learn how to unlock operational agility through built-in tunnel orchestration and simplified configuration. It’s all about end-to-end WAN and network security services that tightly integrate with routing and security devices to establish encrypted connections to access applications and resources in the cloud or data center.

    Click to Expand

    Speaker:

    Tom Stasko
    Tom Stasko

    Tom Stasko

    North American Engineering Manager at Cradlepoint

    Collapse This Item

  • IAM + WFH - Authentication vs Authorization 10:15 am
    Add to Calendar20230629 10:15 am20230629 10:35 amAmerica/New_YorkIAM + WFH - Authentication vs Authorization

    The “perimeter” concept for organizational security… The castles and moats analogy no longer applies… As we all went to Work From Home quickly – we tested the boundaries of identity and authentication.

    Join this session to discuss the concepts and trends shaping identity and authentication, from IAM to passwordless, and PAM to zero-trust. 

    400 Renaissance Dr W
    Detroit, MI 48243

    Presented by Cohesity

    The “perimeter” concept for organizational security… The castles and moats analogy no longer applies… As we all went to Work From Home quickly – we tested the boundaries of identity and authentication.

    Join this session to discuss the concepts and trends shaping identity and authentication, from IAM to passwordless, and PAM to zero-trust. 

    Click to Expand

    Collapse This Item

  • Protecting Against Cyber Attacks 10:45 am
    Add to Calendar20230629 10:45 am20230629 11:15 amAmerica/New_YorkProtecting Against Cyber Attacks

    For every new technology that cybersecurity professionals invent, it’s only a matter of time before malicious actors find a way around it. During this panel discussion, you’ll get the inside track on solutions and suggestions for protecting against the constantly evolving threats we’re all facing every day.  Take advantage of the knowledge and expertise of the panelists on this stage to learn the most up-to-date methods of guarding your company against cyber attacks.

     

    400 Renaissance Dr W
    Detroit, MI 48243

    .

    For every new technology that cybersecurity professionals invent, it’s only a matter of time before malicious actors find a way around it. During this panel discussion, you’ll get the inside track on solutions and suggestions for protecting against the constantly evolving threats we’re all facing every day.  Take advantage of the knowledge and expertise of the panelists on this stage to learn the most up-to-date methods of guarding your company against cyber attacks.

     

    Click to Expand

    Collapse This Item

  • How AI Can Think Like An Attacker 11:35 am
    Add to Calendar20230629 11:35 am20230629 12:05 pmAmerica/New_York How AI Can Think Like An Attacker

    In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveiled an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

    400 Renaissance Dr W
    Detroit, MI 48243

    Presented by Darktrace

    In the face of skyrocketing cyber risk, detecting and responding to attacks is no longer enough. Organizations must take proactive steps to prevent threats before they happen, and to recover if compromised. In this session, Darktrace unveiled an ambitious new approach to security, with core engines powering AI technologies to prevent, detect, respond, and ultimately heal from attacks across all areas of their digital environment. Together, these engines combine to strengthen organizations’ security posture in a virtuous AI feedback ‘loop,’ which provides powerful end-to-end, bespoke, and self-learning solutions unique to each organization.

    Click to Expand

    Speaker:

    Ryan Soohoo
    Ryan Soohoo

    Ryan Soohoo

    Cyber Security Executive at Darktrace

    Collapse This Item

  • Cyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do Now. 12:05 pm
    Add to Calendar20230629 12:05 pm20230629 12:25 pmAmerica/New_YorkCyber Ready: Overview on Zero Trust, What Comes Next and What You Can Do Now.

    What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense? 

    The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive. 

    Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.

    400 Renaissance Dr W
    Detroit, MI 48243

    Presented by Ridge IT Cyber

    What does it mean to be in a constant state of Cyber Readiness? What is Zero Trust architecture and how do you get there from a state of legacy networks and security? How can Battle-Tested Systems convert your organization from defense to offense? 

    The new era of Cyber Security requires an organization to be Cyber Ready, not just passively prepared. We will present what that journey looks like and how it is driven by a Zero Trust framework and Battle-Tested Systems. Continuous improvement is key, and, on too many occasions, organizations believe they are protected and do not try to improve their systems until an actual, potentially catastrophic breach has occurred. This moment of epiphany is entirely avoidable, and we will show you that path to being proactive. 

    Posture Matters, and in this presentation, we will answer all these questions as well as some of your own. We will show you the why, the how, and what you can do right now to fortify your perimeter against the increasingly sophisticated attacks of today and tomorrow while in any stage of your Zero Trust Journey.

    Click to Expand

    Speaker:

    Chad Koslow
    Chad Koslow

    Chad Koslow

    CEO and Co-Founder at Ridge IT Cyber

    Collapse This Item

  • Lunch Break
  • Keynote Presentation: Mathieu Gorge 1:00 pm
    Add to Calendar20230629 1:00 pm20230629 1:40 pmAmerica/New_YorkKeynote Presentation: Mathieu Gorge

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

    400 Renaissance Dr W
    Detroit, MI 48243

    Making sense of Geopoltical Risks in 2023 – Impact on Cybersecurity & Compliance

    There are four main bubbles of risks: IT, Financial, Reputation/Brand, Geopolitical. We will discuss the impact of current geopolitical changes that have made 2022 a year filled with warfare, cybersecurity, compliance and data protection issues. Looking forward in 2023 what can we expect and how do we make sure we are prepared to deal with these evolving geopolitical changes?

    Click to Expand

    Speaker:

    Mathieu Gorge
    Mathieu Gorge

    Mathieu Gorge

    CEO, VigiTrust

    Collapse This Item

  • Signed Books by Keynote Speaker Mathieu Gorge 1:50 pm
    Add to Calendar20230629 1:50 pm20230629 2:10 pmAmerica/New_YorkSigned Books by Keynote Speaker Mathieu Gorge400 Renaissance Dr W
    Detroit, MI 48243

    .

    About the Book:

    The Cyber Elephant in the Board Room
    The Cyber Elephant in the Board Room

    The Cyber Elephant in the Board Room

    Cyber-Accountability with the Five Pillars of Security Framework by Mathieu Gorge

    Collapse This Item

  • Total Microsoft 365 Protection: From Email Security to Data Protection 2:05 pm
    Add to Calendar20230629 2:05 pm20230629 2:40 pmAmerica/New_YorkTotal Microsoft 365 Protection: From Email Security to Data Protection

    Please join Barracuda Networks to learn about the latest modern day email threats and ways to protect your company and employees. Email remains the #1 threat vector for all serious threats and ransomware attacks. Learn how you can stay ahead of cybercriminals to protect your business and data and remediate and recover when threats arrive.

    400 Renaissance Dr W
    Detroit, MI 48243

    Presented by Barracuda Networks

    Please join Barracuda Networks to learn about the latest modern day email threats and ways to protect your company and employees. Email remains the #1 threat vector for all serious threats and ransomware attacks. Learn how you can stay ahead of cybercriminals to protect your business and data and remediate and recover when threats arrive.

    Click to Expand

    Speaker:

    Michael McClendon
    Michael McClendon

    Michael McClendon

    Sr. Solutions Architect at Barracuda Networks

    Collapse This Item

  • Zero Trust, UEBA, and You: The Power of Human Insight in Cybersecurity 2:35 pm
    Add to Calendar20230629 2:35 pm20230629 2:55 pmAmerica/New_YorkZero Trust, UEBA, and You: The Power of Human Insight in Cybersecurity

    In this presentation, we will discuss the synergies between Zero Trust and User and Entity Behavior Analytics (UEBA) in addressing human-related security threats. Zero Trust is an effective approach to securing access to applications and resources, but it still requires a comprehensive strategy to addressing human-related security threats. UEBA uses machine learning algorithms to detect and respond to anomalous behavior in users and devices, providing an additional layer of security to Zero Trust. We will provide practical insights on how to implement Zero Trust and UEBA, including key considerations such as data privacy, compliance, and governance. Attendees will gain an understanding of how these technologies can be used to build a comprehensive and proactive approach to cybersecurity.

    400 Renaissance Dr W
    Detroit, MI 48243

    Presented by Manage Engine

    In this presentation, we will discuss the synergies between Zero Trust and User and Entity Behavior Analytics (UEBA) in addressing human-related security threats. Zero Trust is an effective approach to securing access to applications and resources, but it still requires a comprehensive strategy to addressing human-related security threats. UEBA uses machine learning algorithms to detect and respond to anomalous behavior in users and devices, providing an additional layer of security to Zero Trust. We will provide practical insights on how to implement Zero Trust and UEBA, including key considerations such as data privacy, compliance, and governance. Attendees will gain an understanding of how these technologies can be used to build a comprehensive and proactive approach to cybersecurity.

    Click to Expand

    Speaker:

    Ray Manash
    Ray Manash

    Ray Manash

    Manager - Customer Success at Manage Engine

    Collapse This Item

  • Cloud Clarity in 2023: Strategy, Execution & Alignment 3:15 pm
    Add to Calendar20230629 3:15 pm20230629 3:35 pmAmerica/New_YorkCloud Clarity in 2023: Strategy, Execution & Alignment

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this session, attendees will hear about creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment. 

    400 Renaissance Dr W
    Detroit, MI 48243

    .

    Securely optimizing the cloud for better business outcomes is the product of clear communication of terms and expectations, alignment with business processes and functions, and partnerships among multiple internal and external stakeholders. “Activity” does not equal “progress.”  In this session, attendees will hear about creating definitional clarity, building adaptability, and creating cross-functional, business-wide alignment. 

    Click to Expand

    Collapse This Item

  • Guest Keynote Presentation: Jermaine Stanley 3:35 pm
    Add to Calendar20230629 3:35 pm20230629 4:05 pmAmerica/New_YorkGuest Keynote Presentation: Jermaine Stanley

    This will be a conversation with businesses and organizations leaders on why Diversity, Equity, & Inclusion STILL matters, now more than ever. 

     

    During his keynote, Jermaine, who is originally from Detroit, weaves in personal experiences as an Afro Latino working in corporate America and how it has shaped his career. He also discusses how expectations and challenges shaped his career. Jermaine also discusses the role of technology, like artificial intelligence (AI), is playing in this conversation. 

    By the time the session is over, attendees will be able to answer the following: 

    • Why DEI STILL matters! 
    • Why now more than ever? 
    • Technology’s role in the conversation.
    400 Renaissance Dr W
    Detroit, MI 48243

    Why Diversity, Equity, and Inclusion STILL Matters, No More Than Ever

    This will be a conversation with businesses and organizations leaders on why Diversity, Equity, & Inclusion STILL matters, now more than ever. 

     

    During his keynote, Jermaine, who is originally from Detroit, weaves in personal experiences as an Afro Latino working in corporate America and how it has shaped his career. He also discusses how expectations and challenges shaped his career. Jermaine also discusses the role of technology, like artificial intelligence (AI), is playing in this conversation. 

    By the time the session is over, attendees will be able to answer the following: 

    • Why DEI STILL matters! 
    • Why now more than ever? 
    • Technology’s role in the conversation.
    Click to Expand

    Speaker:

    Jermaine Stanley
    Jermaine Stanley

    Jermaine Stanley

    Founder at Stanley Consulting Group

    Collapse This Item

  • Cyber Executive Panel 4:05 pm
    Add to Calendar20230629 4:05 pm20230629 4:35 pmAmerica/New_YorkCyber Executive Panel

     Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun!  It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region.  We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    400 Renaissance Dr W
    Detroit, MI 48243

    .

     Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun!  It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region.  We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Panel Participants:

    Todd Langusch
    Todd Langusch

    Todd Langusch

    CISSP, CISM, Chief Information Security Officer at CIGL Consulting, Inc.

    Collapse This Item

  • Cyber Inter-Agency Collaboration Panel 4:50 pm
    Add to Calendar20230629 4:50 pm20230629 5:10 pmAmerica/New_YorkCyber Inter-Agency Collaboration Panel

    We hear it all the time – cybersecurity is everyone’s responsibility. That’s why it’s so important for officials from all levels and sectors of government to collaborate in their approach, which is why they’re with us today.  In this panel, representatives from local and federal agencies are here to talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region, nationally, and worldwide.

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    400 Renaissance Dr W
    Detroit, MI 48243

    .

    We hear it all the time – cybersecurity is everyone’s responsibility. That’s why it’s so important for officials from all levels and sectors of government to collaborate in their approach, which is why they’re with us today.  In this panel, representatives from local and federal agencies are here to talk about what their organizations are doing to support the advancement of cybersecurity preparedness in the region, nationally, and worldwide.

     

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Collapse This Item

  • Conference Closing Session 5:25 pm
    Add to Calendar20230629 5:25 pm20230629 5:35 pmAmerica/New_YorkConference Closing Session

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    400 Renaissance Dr W
    Detroit, MI 48243

    .

    Submit your bio for consideration to participate in one of our Cyber Executive Panels

    to [email protected] or fill out our Call for Speakers form here.

    Click to Expand

    Collapse This Item

  • Happy Hour Networking Reception 5:30 pm
    Add to Calendar20230629 5:30 pm20230629 6:30 pmAmerica/New_YorkHappy Hour Networking Reception400 Renaissance Dr W
    Detroit, MI 48243

    .

    Collapse This Item

  • Community Partner Dinner 6:45 pm
    Add to Calendar20230629 6:45 pm20230629 7:05 pmAmerica/New_YorkCommunity Partner Dinner400 Renaissance Dr W
    Detroit, MI 48243

    .

    Collapse This Item

Partners Register