Ways to convince Your Boss Ways to Save Submit Your Talk
X

Submit Your Talk

Overview of the event

Cyber security systems and principles are designed to safeguard websites and web applications from attackers seeking to disrupt, delay, alter or redirect the flow of data. These attackers vary in target, motive, levels of organization, and technical capabilities, requiring public and private organizations to adopt ever-increasing measures to prevent cyber attacks.

Governments maintain cyber security measures to protect the integrity of critical infrastructure for financial systems, public health, science, and safety institutions, and defense, aerospace, and intelligence agencies.

Private enterprises use cyber security and online data protection help prevent lost revenues, harm to brand reputation, and potential fines or legal liabilities.

The Conference aims to help achieve cooperative solutions and industry teaming to defend against the ever-growing cyber threat.

Learning outcomes:

Protection , Mitigation, Understanding, Sharing, Gaining, Knowing and Optimizing.



Facts & Figures About The Event

7 Speakers
7 Topics
50 Tickets

Conference Schedule

Cyber Security Summit, Denver

X Topic Abstract

Emerging Risks with current technology trends like Cloud Transformation, MicroServices/Container architecture adoption, Workflow Automation tools, bots for hire (RPA's), And emerging/new attack vectors targeting Biomedical systems, IoT devices, and Industrial Systems require Automation and a Governance Centric, Session management approach

Speaker profile

For more than 25 years, Cameron Williams has helped enterprise clients like IBM, Wells Fargo (WAMU), Sony, BP, KPMG, Boeing, Spirt Aero, LAM, and dozens others keep their data safe and secure from data breaches, hacks, ransomware, and spear-phishing. As OverWatchID’s CTO, Cam leads all product design and product development, and is responsible for ensuring that that OverWatchID’s cloud-based converged identity security platform is meeting existing and future threats to identity security.
Cam has leveraged his deep expertise in high-profile data breach mitigation efforts on behalf of the entertainment industry, oil and gas, finance, high tech, and other Fortune 500 firms. Prior to co-founding OverWatchID, Cam held senior positions with InteliSecure, Juniper Networks, Pulse Secure, Virtela Technology Services, IBM, and MCI. Cam studied computer science at North Carolina State University and pre-med at Penn State University. Cam lives in Denver with his daughter Alaura and dog Zoe. He is a competitive Ironman and is an internationally ranked parathlete.

X Topic Abstract

Let's not kid ourselves that cybercrime is accidental or opportunistic, or conducted by teenagers with too much time on their hands. It is highly organized and increasingly conducted by nation states for political, social or economic reasons. WannaCry and Nyetya (Not-Petya) the two most globally destructive malware variants ever propagated have been attributed to North Korea’s Shadow Brokers and Russia’s GRU (ГРУ). In fact, most cyber-attacks can be attributed to 4 countries. A growing number of attacks from nation-state cyber-military units continue to push at the boundaries of cyber war, carefully calculating that their actions will not cause a kinetic or economic response from those attacked or those appalled at their actions.
Meanwhile, our insatiable appetite for IoT devices has expanded the attack surface for attackers. Everything from connected cars and homes, to voting systems, to biomedical equipment keeping our sick and elderly alive. There are now more ‘connected IoT devices’ on the planet than humans!
But cyberattacks are increasingly becoming automated using AI to get past cyber defenses and removing the human constraint factor that prevents an attack from going too far. ‘Offensive AI’mutates itself as it learns about its environment to stealthily mimic humans to avoid detection. It is the new cyber offensive weapon of choice and will automate responses to defensive measures rather like playing chess with a computer – it learns as it goes. But increasingly the intent of attacks is not just to steal information but to change it in such a way that integrity checking is impossible.

• Did George W. Bush really win Florida? Did the Russians put Trump in power? Our faith in federal and state election systems has been systematically eroded by AI bots.
• Did a physician really update a patient’s medical record or did ‘Offensive AI’ do it?

Can a doctor or nurse trust the validity of the electronic medical information presented to them? Ransom of patient lives may not be too far away – especially those connected to networked medical devices, and especially at times of heightened global tensions.
AI is already being used very effectively for cyber defense. Advanced malware protection that inoculates the LAN and responds in nano-seconds to anomalous behavior patterns. Biomedical security tools that use AI to constantly manage and secure the rising number of healthcare IoT devices as they connect and disconnect from hospital networks. AI-powered attacks will outpace human response teams and outwit current legacy-based defenses. ‘Defensive AI’ is not merely a technological advantage in fighting cyberattacks, but a vital ally on this new battlefield and the only way to protect us all from the cyber criminals of the future.

Speaker profile

Richard Staynings is a globally renowned thought leader, author, public speaker and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He servesas a board member of AEHIS – (the Association for Executives in Healthcare Information Security) and on the InternationalHIMSS Privacy and Cybersecurity Committee where he has assisted hundreds of health systems globally in their cybersecurity risk management transformation efforts.
A recovering CIO, CISO, &CTO, Richard currently serves as Chief Security Strategist for Cylera, a New York based Healthcare IoT Security Innovator.
With more than 25 years’ experience of both cybersecurity leadership and client consulting in healthcare, Richard has lived in over 30 countries and helped deliver innovative solutions to organizations in all of them. Some of his global successes include work for: Amgen, Cisco, CSC, PwC, Intel, Microsoft, and Zurich Financial, to name a few.
After spending many years based out of the UK, Australia and various parts of Asia, Richard has for the past 20 years been based here in Colorado. When he’s not flying between clients and conferences, Richard enjoys most things between mountaineering and scuba diving. Although he doesn’t get to spend a lot of time at home, Richard is active in the local Denver-Boulder community and serves on several local boards in a pro-bono capacity.

About:https://richard.staynings.com/
Blog: https://www.cyberthoughts.org/
Linkedin: https://www.linkedin.com/in/richardstaynings/
Twitter: @rstaynings @cylera_
Company: https://www.cylera.com/


X Topic Abstract

In the past 5 years we have seen a great surge in the number of devices on our home and enterprise networks. As we all add light bulbs and door bells and thermostats to our networks, we greatly increase the risk of cyberattack because the Internet is a very dangerous place. In this talk, you will gain an understanding of the risks, hear real world examples of IoT attacks and learn how to greatly reduce the risk of attack on your home and work networks.

X Topic Abstract

Cybersecurity specialists often react to public cyber incidents with an incredulous "How did they let that happen?". These quite public incidents have been the result of unpatched systems (Equifax), inappropriate access (Capital One, Target), insufficient encryption (a much-too-long list) and other “table stakes” matters. So then, how did so many bright, hard-working professionals fail prey to these lapses in judgment, process, and execution? During this session we will explore:

· Lessons from like-kind disasters in other industries; e.g., business, airlines, and nuclear power.
· The difference between complicated and complex/tightly coupled systems
· What to watch out for (e.g., Get-There-Itis)
· Techniques to address complexity – lessons from Nobel Prize laureates, billionaires, physicians, and human behavior specialists
· Recommendations to address the cultural, project and process design shortcomings leading to cybersecurity "incidents";

e.g., weak signals, proper pre-partems, true value of diversity, and prudent checklists.

Speaker profile

Adam began his career as an aerospace engineer working on cruise missiles, the Space Shuttle, and hypersonic missiles. Super fun to blow stuff up. Next, he worked at Southwest Airlines as Director of Purchasing and then as Director of Information Systems. Later, he worked for Yum! as VP of Application Development. In 2000 he joined KPMG and built a successful practice serving some of the most successful global companies - departing as the Practice Director for companies in capital equipment, industrial mfg. and aerospace/airlines. Adam left to join World Vision in 2006 as global CIO, building an IT function from ~25 staff to over 900 staff in 85 countries. Leading the global innovation for development function, his team raised missions of dollars to find, grow and scale solutions in health care, education, agriculture, technology services, etc. The best "job" ever.

Having lived and worked in over 60 countries, he's helped identify, develop and/or bring to market innovative ideas in areas such as student/staff capacity development, digital marketing solutions, ERP and IoT solutions in the mining industry, food production automation, and innovative guest experiences. Adam is currently consulting to companies on IT and product development/innovation, and is an adjunct professor atÉcole des pontsParisTech university. While he's passionate about learning new technologies and development methods, he's also passionate about the "human dimensions of change". When it's hunting season, you can find him most weekends being humbled by an Elk in the Rocky Mountains.





Our Sponsors

Use this opportunity to improve the visibility of your organization

Instant Sponsorship
Avail instant sponsorship at just USD 2000

Instant sponsorship includes
• Branding of your company as Bronze Sponsor – Company's Logo on the event page with cross link to your website.
• One Speaking Slot (45 min -non sales talk).
• 10% discount on registration fee for any delegate from your organization.
• Full day attendance at the event with lunch
• 1 x Roll up stand / Brochure distribution at the event
• Online Interview post of your company's senior executive at our media portal

For Silver, Gold Platinum & Titanium Sponsorship opportunites, please request for Sponsorship Brochure via email at contact@1point21gws.com, naveen@1point21gws.info

Our Sponsors


Media Partners


                       

Digital Marketing Partner




Marketing Partner




Our Past Sponsors


Media Partner



Sponsors






Our Speakers


Cameron Williams

Founder/CTO/Interim CEO

OverWatchID


Richard Staynings

Chief Security Strategist

Cylera


Chuck Davis

Director of Cybersecurity

Hikvision USA


Adam Bricker

Vice President, Information Technology

Westmoreland Coal Company





Our Pricing

Group of 3 or more(Early Bird)
USD 300 Till June 16
Group of 3 or more(Standard)
USD 349 Till August 23
Individual(Early Bird)
USD 409 Till July 23
Individual (Standard)
USD 469 Till August 23


Our Testimonial



FAQs

Who can attend Cyber Security Summit in Denver?

This program should appeal to anyone who has a role regarding personal or confidential information – whether the information is that of a customer, employee, patient, student, job applicant or it is a trade secret or other proprietary information. Highly recommended for:

Board members
CEOs
CIOs
CFOs
HR
Information technology staff
PR departments
In-house and general counsels
Insurance and risk managers
Security Systems Integrators
IT and Cybersecurity Leaders
Integration Engineers
Product Developers and Manufacturers
Senior Technology Business Executives
Security Specifiers and Engineers
Security Consultants
Anyone who is responsible for the cybersecurity of integrated security systems!

Why to attend Cyber Security Summit in Denver?

Following are the three key questions you and your cyber security organization or cyber security department and cyber security center of excellence should be solving for now: How do we as testers and cyber security company evolve and thrive in SMAC & IoT world?
From tooling to skilling and from strategies to fundamental values what needs to change and how? What are solutions and services available in market which I can leverage? Cyber Security Summit 2019 is an attempt to seek and share answers to these basic questions.

What will you learn about?

Learn latest techniques and skills required to test disruptive technologies from industry stalwarts themselves Latest trends, concepts, processes and tools for cyber security in SMAC & IoT Recognize, understand and acknowledge challenges in cyber security emerging technologies. Meet and network with fellow cyber security experts from leading companies.Learn how to adapt and adopt these changes quickly and swiftly within a team and also across the enterprise.

Are there any prerequisites to attend this program?

No

Do I need to register for the event?

Yes, all conference attendees must register in advance to attend the event.