Chicago Cybersecurity Conference

  • Conference

Embark on a journey of cybersecurity excellence at the Chicago Cybersecurity Conference, a paramount convergence where you'll unlock invaluable insights for masterfully navigating the ever-evolving landscape of cyber threats in 2024. Immerse yourself in the collective wisdom shared by industry vanguards and influential trailblazers, while directly engaging with representatives from elite global providers of cybersecurity solutions.

Embrace the Chicago Cybersecurity Conference as your pivotal juncture to forge connections with peers and industry virtuosos, all within an engaging in-person environment. Engrossing discussions will span a diverse spectrum of topics, from the forefront of cybersecurity challenges to ingenious strategies meticulously designed to fortify your organization against the unrelenting prowess of cyber adversaries.

Uncover the full array of intricately tailored offerings, meticulously crafted by Data Connectors exclusively for the Chicago Cybersecurity Conference, ready and waiting for your exploration!

Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall

thursday, June 27, 2024

07:00 AM to 05:00 PM

Venue:

Hyatt Rosemont

6350 N. River Road
Rosemont, IL  60018

Get Directions

  • Days
  • hrs
  • min
  • sec

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
08:00 AM to 09:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
09:00 AM to 09:35 AM
Beyond red, yellow and green, bringing context to API Security
General Sessions
datatheorem-1
Richard Smith
Director at Data Theorem
Add to Calendar 06/27/2024 09:00 AM 06/27/2024 09:35 AM Beyond red, yellow and green, bringing context to API Security

As the need for an API Security program continues to grow, organizations are seeing new challenges emerge. Like any security tool, understanding what is a real threat in the noise of red, yellow and green alerts is always a challenge. In this workshop, we will review how to bring context to your API security programs to produce actionable results.

As the need for an API Security program continues to grow, organizations are seeing new challenges emerge. Like any security tool, understanding what is a real threat in the noise of red, yellow and green alerts is always a challenge. In this workshop, we will review how to bring context to your API security programs to produce actionable results.

09:35 AM to 10:05 AM
Ransomware: The New High Seas Piracy
General Sessions
Maggie MacAlpine
Director of Cybersecurity Partnerships and Evangelism at Seceon
Add to Calendar 06/27/2024 09:35 AM 06/27/2024 10:05 AM Ransomware: The New High Seas Piracy

Ransomware has emerged as a pervasive threat in recent years, wreaking havoc and causing millions in damages across global organizations. Its rampant proliferation shows no signs of slowing down, with a diverse range of perpetrators adopting it as a powerful tool for asset seizure and extortion. From criminal syndicates to activists and even sanctioned governments, ransomware is utilized for various nefarious purposes, including acts of cyber warfare. 


However, this threat isn't novel;it draws eerie similarities to historical high seas piracy. In this talk, we will delve into the historical, economic, and geo-political parallels between modern ransomware cartels like DarkSide and Conti and the marauding pirates and privateers of the 17th and 18th centuries, offering insights into the evolution and implications of this digital menace.

Ransomware has emerged as a pervasive threat in recent years, wreaking havoc and causing millions in damages across global organizations. Its rampant proliferation shows no signs of slowing down, with a diverse range of perpetrators adopting it as a powerful tool for asset seizure and extortion. From criminal syndicates to activists and even sanctioned governments, ransomware is utilized for various nefarious purposes, including acts of cyber warfare. 


However, this threat isn't novel;it draws eerie similarities to historical high seas piracy. In this talk, we will delve into the historical, economic, and geo-political parallels between modern ransomware cartels like DarkSide and Conti and the marauding pirates and privateers of the 17th and 18th centuries, offering insights into the evolution and implications of this digital menace.

10:30 AM to 11:00 AM
The Current Threat Landscape and Why It Requires a Unique Approach
General Sessions
Lyle Kelly
System Engineering Manager – Central Region US at Forescout
Add to Calendar 06/27/2024 10:30 AM 06/27/2024 11:00 AM The Current Threat Landscape and Why It Requires a Unique Approach

The modern cyber threat landscape is dynamic and constantly evolving, with new threats and vulnerabilities emerging regularly. For this reason, it is important to understand what the current threat landscape looks like, what the benefits are of having collaborative high fidelity intelligence regarding it and, how this will impact us today. Finally, it’s vital to understand what the required capabilities are for companies to address these threats and what the benefits of a unique and comprehensive approach are.

The modern cyber threat landscape is dynamic and constantly evolving, with new threats and vulnerabilities emerging regularly. For this reason, it is important to understand what the current threat landscape looks like, what the benefits are of having collaborative high fidelity intelligence regarding it and, how this will impact us today. Finally, it’s vital to understand what the required capabilities are for companies to address these threats and what the benefits of a unique and comprehensive approach are.

11:00 AM to 11:30 AM
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity
General Sessions
Bruce Esposito
Global Strategist at One Identity
Add to Calendar 06/27/2024 11:00 AM 06/27/2024 11:30 AM The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity

Attack surfaces for enterprises are constantly changing due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. Every day, proactive cybercriminals are exploiting new vulnerabilities with skill. In this context, comprehensive Identity Security is crucial to managing risks. However, maintaining a strong Identity and Access Management (IAM) strategy can be a complex task given the multitude of tools involved. This session will address how a unified identity security strategy is key addressing the constantly evolving challenges of today and tomorrow’s cyber threats.

Attack surfaces for enterprises are constantly changing due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. Every day, proactive cybercriminals are exploiting new vulnerabilities with skill. In this context, comprehensive Identity Security is crucial to managing risks. However, maintaining a strong Identity and Access Management (IAM) strategy can be a complex task given the multitude of tools involved. This session will address how a unified identity security strategy is key addressing the constantly evolving challenges of today and tomorrow’s cyber threats.

11:30 AM to 12:00 PM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
Kenrick Bagnall
President, CISO & Co-Founder at CyberNexus
Daniel Honore
Milwaukee Advisor at CISA
Robert Kotarski
Supervisory Special Agent at FBI
Mike Prado
Deputy Assistant Director at DHS Cyber Crimes Center (C3)
12:05 PM to 12:35 PM
Cybersecurity – Thriving in the Next Decade + Lunch Break
Solutions Showcase
CyberNexus Transparent
Kenrick Bagnall
President, CISO & Co-Founder at CyberNexus
Add to Calendar 06/27/2024 12:05 PM 06/27/2024 12:35 PM Cybersecurity – Thriving in the Next Decade + Lunch Break

The global spend on cybersecurity has topped $220 Billion and is forecasted to reach $300 Billion by 2026. Despite this we hear about new major data breaches each week and organizations are left scrambling to respond and remediate with limited resources and in many cases with very little that resembles a plan. The next decade will bring force multipliers that will only serve to compound these and many other challenges. This presentation will take a retrospective view at where cybersecurity professionals have come from, where the next decade may take them, and how CyberNexus advocates with cyber pros and organizations to secure the future. 

The global spend on cybersecurity has topped $220 Billion and is forecasted to reach $300 Billion by 2026. Despite this we hear about new major data breaches each week and organizations are left scrambling to respond and remediate with limited resources and in many cases with very little that resembles a plan. The next decade will bring force multipliers that will only serve to compound these and many other challenges. This presentation will take a retrospective view at where cybersecurity professionals have come from, where the next decade may take them, and how CyberNexus advocates with cyber pros and organizations to secure the future. 

12:35 PM to 01:05 PM
Keynote Presentation: The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power
General Sessions
event-simple-logo
Ed Adams
President & CEO of Security Innovation
Add to Calendar 06/27/2024 12:35 PM 06/27/2024 01:05 PM Keynote Presentation: The Many Colors of Cybersecurity - Maximizing your team’s Cyber Power

In the cybersecurity world, Red, Blue, and Purple teams have established their roles in fortifying defenses and improving organizational resiliency. However, the spotlight often bypasses a crucial player—the Yellow Teams—operating at the intersection of development, IT, and the cloud. 

Using the familiar color wheel analogy, this insightful discussion describes the yellow team’s pivotal role in fortifying software and infrastructure by seamlessly integrating Red and Blue techniques – improving tech resiliency. Key topics include: 

  • Unveiling the essentials for tech-savvy professionals to integrate security 
  • Crafting a vibrant palette: transforming Yellow Teams into dynamic orange and green forces 
  • The collective advantage: reducing risk via confident, resilient teams

 

In the cybersecurity world, Red, Blue, and Purple teams have established their roles in fortifying defenses and improving organizational resiliency. However, the spotlight often bypasses a crucial player—the Yellow Teams—operating at the intersection of development, IT, and the cloud. 

Using the familiar color wheel analogy, this insightful discussion describes the yellow team’s pivotal role in fortifying software and infrastructure by seamlessly integrating Red and Blue techniques – improving tech resiliency. Key topics include: 

  • Unveiling the essentials for tech-savvy professionals to integrate security 
  • Crafting a vibrant palette: transforming Yellow Teams into dynamic orange and green forces 
  • The collective advantage: reducing risk via confident, resilient teams

 

12:00 PM to 12:20 PM
Book Signing / Ed Adams: See Yourself in Cyber
General Sessions
See Yourself in Cyber
Ed Adams
President & CEO of Security Innovation
Add to Calendar 06/27/2024 12:00 PM 06/27/2024 12:20 PM America/Los_Angeles Book Signing / Ed Adams: See Yourself in Cyber

Book Signing by Keynote Speaker and Author Ed Adams: In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent.

Location of the event

Book Signing by Keynote Speaker and Author Ed Adams: In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization—inhabiting a variety of roles not traditionally associated with cybersecurity—can contribute to improving its cybersecurity backbone. You’ll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You’ll also find out how improving your firm’s diversity and inclusion can have dramatically positive effects on your team’s talent.

01:30 PM to 02:05 PM
You Need a Password Manager - Here's why and what to Look For
General Sessions
Jerome Ferrara
Principal Product Specialist at LastPass
Add to Calendar 06/27/2024 01:30 PM 06/27/2024 02:05 PM You Need a Password Manager - Here's why and what to Look For

 How individuals and organizations manage access to the services they use can be the first line of defense against bad actors. Learn ways to mitigate this risk and simplify the user experience at the same time.

 How individuals and organizations manage access to the services they use can be the first line of defense against bad actors. Learn ways to mitigate this risk and simplify the user experience at the same time.

02:05 PM to 02:20 PM
Data resilience best practices in a ransomware world
General Sessions
Gary Sussman
Data Resilience Expert and Sales Engineer at ArcServe
Add to Calendar 06/27/2024 02:05 PM 06/27/2024 02:20 PM Data resilience best practices in a ransomware world

 Data breaches are skyrocketing. Ransomware is rampant. The threat landscape is more dangerous than ever. However, with the right strategies, you can build your organization's strongest defense against data disasters. In his presentation, Gary Sussman will address the escalating threat of ransomware. He will outline a comprehensive ransomware prevention strategy and delve into the enhanced 3-2-1-1 backup structure designed to bolster data resilience.

 Data breaches are skyrocketing. Ransomware is rampant. The threat landscape is more dangerous than ever. However, with the right strategies, you can build your organization's strongest defense against data disasters. In his presentation, Gary Sussman will address the escalating threat of ransomware. He will outline a comprehensive ransomware prevention strategy and delve into the enhanced 3-2-1-1 backup structure designed to bolster data resilience.

02:20 PM to 02:50 PM
Protecting Against Cyber Attacks
General Sessions
Dennis Hall
Director, CIAM at Descope
Lyle Kelly
System Engineering Manager – Central Region US at Forescout
Brett Cunningham
Co-Founder at SecuritySnares
Jonathan Davis
Director of Field Strategy at Silverfort
03:10 PM to 03:30 PM
Session #7
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
03:30 PM to 03:50 PM
Session #8
General Sessions
event-simple-logo
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
03:50 PM to 04:20 PM
Guest Keynote Presentation: Growing Threat of Online Child Sexual Exploitation and Abuse (CSEA)
General Sessions
event-simple-logo
Mike Prado
Deputy Assistant Director (SES), HSI Cyber Crimes Center (C3)
Add to Calendar 06/27/2024 03:50 PM 06/27/2024 04:20 PM Guest Keynote Presentation: Growing Threat of Online Child Sexual Exploitation and Abuse (CSEA)
04:30 PM to 05:00 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo
Ed Adams
President & CEO at Security Innovation
Kenrick Bagnall
President, CISO & Co-Founder at CyberNexus
Toby Miller
vCISO at The SWYM Group
Sebastiaan Gybels
CIO & CISO at CoinFlip
David Wooden
IT Director at Se-Kure
Keith Powell
Director, Security Specialist at Microsoft
Chandra Pandey
Founder and CEO at Seceon
05:00 PM to 06:00 PM
Networking Reception
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.

Gold Partners

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.