SLED/FED & GRC

  • Virtual Summit

Join cybersecurity experts at the SLED/FED & Compliance Live Virtual Cybersecurity Summit to gain crucial insights on combating cyber threats in 2024. Featuring renowned professionals and global solution providers, this event offers Live interactive sessions on protecting your organization.

Admission is free with a promo code, and attendees will have access to Live presentations, keynotes, panel discussions, and an exhibit hall. This event is not a job fair but is for professionals seeking to learn about the latest cybersecurity solutions and threats and for those who influence purchasing decisions.

This event is not a job fair or a career opportunity event. It's designed for professionals seeking to learn about the latest cybersecurity solutions and threats and for those who influence or make purchasing decisions. Sponsors and exhibitors are sales engineers and marketing executives, not hiring personnel. 

If you’re interested in career advancement, visit our CyberNexus.World membership portal with access to our jobs board.  

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
09:00 PM to 09:40 AM
Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet and engage with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
09:40 AM to 10:10 AM
Opportunities & Risks for Industries - Generative AI models
General Sessions
CSA-HS-2024-1
Joe Vadakkan
President, CSA - Southwest Arizona Chapter
Add to Calendar 07/25/2024 09:40 AM 07/25/2024 10:10 AM Opportunities & Risks for Industries - Generative AI models

Generative AI models can perform tasks that traditionally require creativity

and human understanding. They learn patterns from existing data during training and can subsequently generate new content, such as texts, images, and music, that follow these patterns. Due to their versatility and generally high-quality results, they, on the one hand, represent an opportunity for digitalization. On the other hand, the use of generative AI models introduces novel IT security risks that need to be considered for a comprehensive analysis of the threat landscape in relation to IT security. we will be diving into risk analysis, measures 

and operational model with utilizing Gen AI

Generative AI models can perform tasks that traditionally require creativity

and human understanding. They learn patterns from existing data during training and can subsequently generate new content, such as texts, images, and music, that follow these patterns. Due to their versatility and generally high-quality results, they, on the one hand, represent an opportunity for digitalization. On the other hand, the use of generative AI models introduces novel IT security risks that need to be considered for a comprehensive analysis of the threat landscape in relation to IT security. we will be diving into risk analysis, measures 

and operational model with utilizing Gen AI

10:10 AM to 10:30 AM
Presentation By Arcserve
General Sessions
Stacey Budd
Data Resilience Evangelist at Arcserve
Add to Calendar 07/25/2024 10:10 AM 07/25/2024 10:30 AM Presentation By Arcserve

Data breaches are skyrocketing. Ransomware is rampant. The threat landscape is more dangerous than ever. However, with the right strategies, you can build your organization's strongest defense against data disasters. In his presentation, Stacey Budd will address the escalating threat of ransomware. He will outline a comprehensive ransomware prevention strategy and delve into the enhanced 3-2-1-1 backup structure designed to bolster data resilience.

Data breaches are skyrocketing. Ransomware is rampant. The threat landscape is more dangerous than ever. However, with the right strategies, you can build your organization's strongest defense against data disasters. In his presentation, Stacey Budd will address the escalating threat of ransomware. He will outline a comprehensive ransomware prevention strategy and delve into the enhanced 3-2-1-1 backup structure designed to bolster data resilience.

10:30 AM to 11:00 AM
Cybersecurity in Education Panel Discussion
General Sessions
event-simple-logo
Michael Gioia
Chief Information Security Officer at Babson College
Michael Spaling
Manager, Information Security at University of Alberta
Nick Gicinto
CISO at William Jewell College
Kate Thompson
Adjunct Instructor at Tulsa Tech
11:15 AM to 11:35 AM
A Healthier View on Compliance
General Sessions
Jason Kikta
CISO/SVP of Product at AUTOMOX
Add to Calendar 07/25/2024 11:15 AM 07/25/2024 11:35 AM A Healthier View on Compliance

Too often, we regard compliance as an anchor, not a sail to our goals. We will explore the types of compliance and the root causes of negative attitudes towards it. More importantly, we will discuss strategies around using compliance to your advantage and how you can balance it with security imperatives.

Too often, we regard compliance as an anchor, not a sail to our goals. We will explore the types of compliance and the root causes of negative attitudes towards it. More importantly, we will discuss strategies around using compliance to your advantage and how you can balance it with security imperatives.

11:35 AM to 12:05 PM
Cybersecurity in Government Panel Discussion
General Sessions
Shannon Lawson
CISO at The City of Phoenix
Seema Patel
Deputy CISO, Assurance & Architecture
George Fisher
Vice President Channel Sales at Seceon
12:05 PM to 12:25 PM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:25 PM to 12:45 PM
Control Privilege Before It Controls You
General Sessions
CyberFox-HS-2024
Bill Morgan
Director, Technical Sales Enablement at CyberFox
Add to Calendar 07/25/2024 12:25 PM 07/25/2024 12:45 PM Control Privilege Before It Controls You

In any security best practice framework, the principle of least privilege is a cornerstone. Yet, due to the complexities of managing Windows environments today, admin access is more prevalent than ever. Shockingly, 9 out of 10 successful breaches stem from privilege misuse. 

In any security best practice framework, the principle of least privilege is a cornerstone. Yet, due to the complexities of managing Windows environments today, admin access is more prevalent than ever. Shockingly, 9 out of 10 successful breaches stem from privilege misuse. 

12:45 PM to 01:15 PM
The Human Factor in Cybersecurity
General Sessions
cisa_logo-e1610926927469-3
Kelly Hills
Cyber State Coordinator (CSC) Region 9 – AZ at CISA
Add to Calendar 07/25/2024 12:45 PM 07/25/2024 01:15 PM The Human Factor in Cybersecurity

When determining overall cyber risk, we must examine all aspects of Threat Accessibility. This forces us to not only reconcile the convergence of physical and cyber security, but it also forces us to embrace it and succeed. Moving beyond mainstream IoT, this presentation looks at the challenges presented by technologically advanced end points used in physical security and discusses opportunities to embrace these advancements to harden the infrastructure and reduce the overall attack surface

When determining overall cyber risk, we must examine all aspects of Threat Accessibility. This forces us to not only reconcile the convergence of physical and cyber security, but it also forces us to embrace it and succeed. Moving beyond mainstream IoT, this presentation looks at the challenges presented by technologically advanced end points used in physical security and discusses opportunities to embrace these advancements to harden the infrastructure and reduce the overall attack surface

01:30 PM to 02:10 PM
CISA Panel
General Sessions
DHS CISA-1
Robert Graham
Cybersecurity Advisor, Region 7 at CISA
Jennifer Lotze
Cybersecurity State Coordinator for Minnesota
Ernesto Ballesteros
Cybersecurity State Coordinator of Texas CISA
Shaheen Chaudhri
Cybersecurity Advisor (Chicago), Region 5 at CISA
02:10 PM to 03:00 PM
Networking Reception
General Sessions
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.

Gold Parnters

  • CyberNexus-HS-2024

Silver Partners

Exhibiting Partners

Affiliate Partners

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

The Summit is a unique remote conference tailored exclusively for invited Executives seeking innovative solutions to safeguard their company’s critical data and infrastructure. This forward-thinking event offers our top notch fully immersive and interactive virtual platform for business leaders to stay up to date with the latest developments in the cyber threat landscape. Attendees will have the opportunity to evaluate cutting-edge solutions through direct connections with emerging and established solution providers, subject matter experts, and influential cyber thought leaders.

blue-five-dot
8-10 CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.