Well also shed light on: fake account creation, MFA bypass attacks, and what defensive measures are being adopted to combat these identity security threats. He worked with various Fortune 100 executives to develop sell through software-as-a-service platforms and infrastructure. Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. Times for this Event are in Eastern Time (EDT/EST)The Conference will be open from 11:30AM to 5PM, Tuesday, November 9th and 9AM to 3PM, Wednesday, November 10th. While at Entara, he also established the companys incident response program, which grew into a multi million dollar line of business for the organization. (escapes or false negatives), Are automatic tools enough? Associate Vice President & Chief Information Security Officer at University of Miami Health System. Become a technology alliance partner to help deliver and co-market new integrated solutions. These cookies track visitors across websites and collect information to provide customized ads. Andy Ellis, a graduate of MIT and a former US Air Force officer, designed, built, and brought to market many of Akamais security products. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. MIAMIS HOTTEST CRAFT BEER AND FOOD PAIRING FESTIVAL. The way in which these sponsors use your information is per their own privacy policies and you must unsubscribe directly with them to opt-out. Earn up to8 Continuing Education Creditsby attending the day in full. 5101 Blue Lagoon DrMiami, FL 331261 305-262-1000, Principal, AWS OCISO at Amazon Web Services, Expert Panel Discussion: DevSecOps: Application Security in Hybrid, Multi-Cloud Environments, Global Director of Security Evangelism at Noname Security, Director of Security Engineering at Salt Security, Chief Information Officer at State of Florida, Keynote: Creating Floridas First Cybersecurity Program: Lessons Learned So Far, USPS - Computer Crimes Unit at Office of Inspector General (OIG), Featured Keynote: Pseudonymity: Catching Cyber-Criminals via Crypto-Tracing. In this panel, our experts will talk about what to do first and what to avoid, and where the traps may lie.

If you would not like for your contact information to be shared with our sponsors, you must complete the opt-out form at CyberSecuritySummit.com/opt-out no later than 72 hours before the event.

The pandemic forced many of us to switch to working remotely overnight. But opting out of some of these cookies may affect your browsing experience. Analytical cookies are used to understand how visitors interact with the website. Prior to Wiz, he worked at Palo Alto Networks, PuppetLabs, and Sony Computer Entertainment (he's even in the credits of over twenty video games)! Todays organizations need to understand why they need to be privacy compliant and have strong data protection workflows in place. Subsequently, RV led the cybersecurity business unit at Cyxtera Technologies, where he developed a long-term vision and execution plan. We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. However, by visiting a booth, entering a raffle or attending a speaker session, sponsors will have the ability to access your contact information through the virtual platforms reporting and may send you follow-up communications that way. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. The growing risk of compromise to your customers data specifically via ransomware DEMANDS the most up to date and complete solutions arsenal. We will cover 14 vulnerabilities affecting the popular closed source TCP/IP stack NicheStack. If you do not provide us notice and you do not attend in person, you agree to be invoiced $195 for the cost of the catered breakfast, lunch & cocktail reception. Prior to NetRise Steve ran Global Consulting Sales and later Global Alliances, OEM, Consumer, and MSSP at Cylance/Blackberry. And community leader. Steve is VP at NetRise Inc, and truly innovative platform that leverages machine learning to identify and expose weaknesses and risks in devices with embedded systems. As more and more tech companies pour into the Sunshine State, its vital for cybersecurity leaders to maintain and improve their skills, and stay ahead of the latest trends and threats. Before joining Check Point, Lee held Sales, Management and Business Development positions focused on Emerging Services with technology leaders, including AT&T, HP, IBM, Equinix and NetApp. as one of the Best Festivals and Fairs in Miami, Brew Miami will gather the hottest local brewers and restaurants to offer amazing bites and craft beer pairings, LIVE music, games, a wine garden, and other fun surprises! The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". How self-learning AI:. This exclusive keynote will answer the question Are Criminals Anonymous? While their transactions through crypto-wallets may seem to protect them, savvy investigators who use some of the same tactics your SOC can leverage to counter cybercrime have a lot to share that can benefit cybersecurity leaders across the private sector. Alex is an avid supporter for not for profit causes earning recognition from Boys and Girls Club of Pinellas County in Tampa Bay, FL for digital safety for children program. Director of Strategic Solutions at Arcserve. to your collection. He oversees information security and compliance, leading the cybersecurity division to identify the industrys latest threats and vulnerabilities and intercept them. This cookie is set by GDPR Cookie Consent plugin. Please. 89% of CISOs say microservices, containers, and Kubernetes have created application security blind spots. As the application landscape continues to grow, and the increased use of cloud-native architectures challenges traditional approaches, cybersecurity leaders are often looking for new ways to understand potential vulnerabilities. With faster iterations from Agile Development pushing the DevSecOps Teams to move as quickly as possible, there is ample room for gaps to appear. Managed and Unmanaged IoT devices bring the promise of productivity, efficiency, and collaboration, yet they offer little in the form of needed security and instead are creating new security gaps and risk exposures for organizations. Join this session to dive into the industrys most comprehensive study of TCP/IP vulnerabilities. Stay connected with whats happening in security. Jamie Portell, Special Agent, USPS, OIG, CCU will share for the first time with the Miami Cybersecurity Conference audience details of the take-down of Wall Street Market. This Dark Web marketplace was one of the biggest networks for contraband sales of various goods. Chief Information Security Officer at Florida International University. Secure Miami conference sponsors gained VIP admission to Brew Miami which included a sample cup, early access to the festival, and access to our exclusive VIP area. These conferences gather cyber professionals from the local community and feature extensive training sessions, live Q&A panels, access to solution providers, and networking opportunities. Your information is kept confidential and will never be shared with or sold to any third-party vendors. Unexpected Low-Code Security Automation Use Cases Webinar on 8/10 @ 11am ET: Register Now. This cookie is set by GDPR Cookie Consent plugin. The 2021 Auth0 State of Secure Identity report highlights the latest trends in identity security, including what types of attacks Auth0 has observed, the characteristics of these attacks, what industries are most affected, and the adoption rates for identity protection technologies., During this session, well provide greater insight into which industries are:, Most highly targeted by credential stuffing attacks, Most highly targeted by SQL injection attacks, Leading the way in MFA adoption to improve overall security posture. These cookies ensure basic functionalities and security features of the website, anonymously. Named by TravelMag as one of the Best Festivals and Fairs in Miami, Brew Miami will gather the hottest local brewers and restaurants to offer amazing bites and craft beer pairings, LIVE music, games, a wine garden, and other fun surprises! United States Cybersecurity Magazine and its archives. - Miami - LIVE ONLINE, The Academy, Computer Training Centers Miami, FL. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Create the perfect ransomware tool kit. The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. Mr. Schmekel is responsible for directing the Enterprise Security Office, reporting to the CIO. Grant will share experiences that will benefit cybersecurity leadersbe they in the public or private sectors. Hell talk about cutting bureaucracy, budgeting, staffing, working with solution providers, and motivating teams to strive for a meaningful mission. In addition, via our newsletter, you will hear from cybersecurity subject matter experts, and will be notified of the release of the next issue of the magazine! The ACFE South Florida Chapter is proud to partner with the Official Cyber Security Summit this year for the Virtual Inaugural Miami / South Florida Cyber Security Summit held on Tuesday, September 14. Paul has also been published in many scientific journals, including the Journal of Foundations in Computer Science and the Journal of Analytical Biochemistry. IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. Save Free IT Courses & Certifications - Miami - IN PERSON OR ONLINE! In this panel, our experts will discuss some of the various approaches to address these issues. Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. The future of automation is low-code. Prior to Tenable, he was at SCD Information Technology where he managed all aspects of networks for small and mid-size business clients. Special Agent Portell will also talk about some of the key Advanced Persistent Threats (APTs) important to organizations, especially those active in South Florida. Introduce yourself to OneXafe 4400, our immutable storage appliance. After graduating from Berkeley Law School and kickstarting her career at elite international law firm Greenberg Traurigrepresenting large companies like Walmart and HBOKristen has since launched her own innovative law firm, CORPlaw. Prior to that, he spent 20 years in the security industry, starting with the intelligence services in the United Kingdom, he then went on to hold the role of Global CSO for a number of large public and private sector organizations including Fujitsu, Monster Worldwide, Wolseley Group PLC and CDK Global. Malware Threats Q3: An Analysis of 113M Files & the Evasive, Unknown Malware Inside, See the latest trends in malware delivery via files, Learn common techniques that hackers use to evade detection-based security tools, View real, recent examples of evasion techniques from the billions of malicious files that Votiro processes each year, Low Hanging Fruit -- How Better AD Visibility Improves Your Defense against All Types of Attackers (including Ransomware! Necessary cookies are absolutely essential for the website to function properly. He is also a member of the New Gen Tech program with Pinellas Education Foundation in Tampa Bay, FL. Professionals registered that are in a Sales / Marketing capacity are prohibited from attending & soliciting at any of our events. Snehal Antani is an entrepreneur, technologist and investor. Prior to joining Pentera as SVP, Americas Sales, Patrick held several senior leadership roles over the past 20 years with successful high-growth companies such as Voltaire (acquired by Mellanox, today NVDA), Anbolt (acquired by AAPL), and Excelero. Elements of Risk Management 1 Day Training in Miami, FL, Risk Assessment and Management 1 Day Training in Miami, FL, Salesforce Admin 201 & App Builder Certification Training in Miami, FL, Your version of Internet Explorer is not longer supported. Should I Buy an EDR, PAM, or DLP? Ivanti Neurons for Zero Trust Access (nZTA) creates a secure connection from the device to web-based, on-premises and in the cloud applications, which enhances security, productivity, and compliance while dramatically improving administrative and end user experiences. His leadership helped propel the Fortune 1000 company from its start as a content delivery network into an industry powerhouse with a billion-dollar dedicated cybersecurity business. Valid password must be minimum of 8 characters in length, contain mix of alphabetic characters and numbers, and not include the user id. Corporate Social Responsibility, The #1 Trusted Low-Code Security Automation platform, Leading the future of security automation. Your contact information will only be shared with a limited number of exhibiting event sponsors for legitimate business interests. Fey has also been executive vice president and general manager for enterprise products at McAfee and chief technology officer of Intel Security, where he drove the companys long-term strategic vision and innovation in the enterprise network, endpoint and analytics security segments by focusing on high-growth market opportunities and field execution.Fey holds a degree in Engineering Physics and Mathematics from Embry-Riddle Aeronaut. Subject to Approval: All registrations are reviewed by the Cyber Summit Management team. To opt-out from these communications, you must unsubscribe directly with those sponsors. Is your organization invested in the right defenses so that it does not fall victim to this costly and dangerous attack?. Save Learn Cybersecurity and Get Certified for Free ! We had an amazing time and hope you did too. Join Cybereasons Kraig Faulkner as he discusses the challenges faced by todays ransomware attacks and how to stay on top of these types of threats. Dimitri Sirota is the CEO and co-founder of BigID - a modern data intelligence platform for privacy, security, and governance - and a privacy, security, and identity expert. Before joining US Special Operations, Snehal was CTO & SVP at Splunk, held multiple CIO roles at GE Capital, after starting his career as a Software Engineer at IBM. As a 20-year cybersecurity expert, Sean has worked with some of the worlds largest companies in architecting and deploying security and compliance solutions including DLP, endpoint security, SIEM, encryption, and more. as one of the Best Festivals and Fairs in Miami, Brew Miami gathers the hottest local brewers and restaurants to offer amazing bites and craft beer pairings, LIVE music, games, a wine garden, and other fun surprises! Automatic Vulnerability Discovery: False Promise for the DevSecOps World? Dr. Ange worked at the National Aeronautics and Space Administration (NASA) at the Kennedy Space Center, FL. With this sudden rise in threat activity, along with more sophisticated threat actors, we have entered a new age of cybersecurity that demands we confront threats with renewed resilience, agility and innovation. Andy was inducted into the CSO Hall of Fame in 2021. This makes identity an interesting attack vector for threat actors, and highlights the importance of authentication and authorization in preserving trust and security. Save Internet of Things - Business Perspectives Training in Fort Lauderdale, FL to your collection. Frank Passman has spent the last seven years with Tenable serving as a trusted advisor to organizations deploying vulnerability management solutions utilizing risk-based prioritization to increase operational efficiency and reduce exposures across the modern attack surface. Are you at risk? Join Henry Frith, VP of Customer Success, as he overviews the statistics from 113M files analyzed and explains the stealthy ways that malware enter networks via weaponized files and links and evade both employees and detection solutions:, Digital identities control access to an ever-growing number of applications, services, and critical systems. Named by TravelMag as one of the Best Festivals and Fairs in Miami, Brew Miami gathers the hottest local brewers and restaurants to offer amazing bites and craft beer pairings, LIVE music, games, a wine garden, and other fun surprises! Over her 20 years of experience in the field of information and network security, Helvetiella Longoriass innovation and leadership have played a critical role in the development and enhancement of FIUs network. Paul is co-founder, CEO and Co-Chair of iboss, a leading Zero Trust cloud security company which protects organizations globally from breaches and data loss. Please fill out the registration form below to secure your admission to the Cyber Security Summit. Paul Martini holds over 230 patents in cloud cybersecurity and is a trusted expert on Zero Trust, a modern cybersecurity architecture designed to prevent ransomware, breaches and data loss by making all applications private. Craig is a Certified CISO and a Certified CISSP. to [emailprotected] or fill out our Call for Speakers form here. Tickets are limited, email us at [emailprotected] to get access to your complimentary VIP ticket for Brew Miami. Patrick Guay is a cybersecurity speaker, and influencer working closely with CISOs of fortune 500 companies globally to shape their cybersecurity strategies and technology stacks. VP, Cybersecurity & Trustworthiness at Covail. Learn more about the Swimlane Medley Partner Program today. He is CEO & Co-founder ofHorizon3.ai, a cybersecurity company using AI to deliver autonomous penetration Testing. As Associate VP and CISO of Miami Health System (UHealth), he is responsible for setting the roadmap and strategy for the protection of information assets and patient information. Analytical cookies are used to understand how visitors interact with the website. These cookies do not store any personal information. How Do I Know? Global Director, Technical Enablement at Cylera. Copyright 2022 Secure Miami | Powered by Secure Miami, Secure Miami 2021 Photos (virtual edition). This website uses cookies to improve your experience while you navigate through the website.
The cookie is used to store the user consent for the cookies in the category "Analytics". Ben is responsible for leading all technical aspects of Illumios MSP/MSSP program including enablement, product innovation, and sales engineering. It does not store any personal data. With the proliferation of data-driven digital business growing at an exponential pace, so is the pace of cyber security threats and attacks, such as ransomware. Swimlane is designed and Regarding automatic vulnerability discovery: How much can we expect? We encourage you to attend this invitation-only event, rated Top 50 InfoSec Conference to Attend Worldwide! Prior to joining UHealth, he served as CISO at Mount Sinai Medical Center, and Vice President of IT at American Bank. Michael Fey leads Island Technology as Co-Founder and CEO, relying on his extensive experience in cyber security, enterprise software and cloud technology. Once you complete the registration process, you will be redirected to PayPal's secure payment page for fee-based tickets: Access to all Interactive Panels & Discussions, and Network with Industry Professionals over a Catered Breakfast, Lunch & Cocktail Reception. While at Blue Coat, Fey led the company to aggressive growth, resulting in its acquisition by Symantec in 2016 for $4.65 billion. Security Software & Services Wind River. Legal advocate.
Youll sit alongside thought leaders and luminaries, and hear from experts to gather insights on the latest insights in cybersecurity. By registering for this event, you acknowledge that the Cyber Security Summit will share your information with a limited number of exhibiting sponsors of this event You may opt-out from having your contact information shared with our sponsors by completing the opt-out form no later than 72 hours before the event. Shawn leads a team of Cyber Threat Hunters and Analysts who assist organizations in searching for, identifying and analyzing threats and risks present in their environment. We are debilitated by too many choices and similarity of products in security where even experienced practitioners find it difficult to understand the rapid technological evolution and the trade-offs in play., When clear objectives, goals, and decision-making criteria are not present, people often make buying decisions based on less scientific considerations: what they perceive everyone else is buying, unsubstantiated gut feelings, pre-existing relationships with vendors or sales individuals, or even who invites them to the best parties or nominates them for the most coveted industry awards.. The practice of information security is maturing rapidly. Prior to Entara, Ben was the CISO at Brooks Kushman P.C., a nationally recognized intellectual property law firm. He brings decades of experience to the field of cybersecurity and is an enthusiastic proponent of DevSecOps. This exclusive conference connects C-Suite & Senior Level Executives who are responsible for protecting their companies from all types of cyber crime, insider threats, ransomware & maintaining compliance with information security experts. These vulnerabilities can cause Denial of Service or Remote Code Execution, allowing attackers to take targeted OT and ICS devices offline or take control of them. Spanning a 23-plus year career as an accomplished and well-respected systems engineer and public speaker, Shawn's strong mix of technical acumen, architectural expertise, and passion for operational efficiencies has established him as a trusted advisor to ForeScouts customers since joining in 2016. Brew Miami which includes a sample cup, early access to the festival starting at 5pm, and access to our exclusive VIP area. Attend the Miami Cybersecurity Conference and stay on top of your organizations security needs. Discover the latest in Swimlane content, from videos to white papers and upcoming events. Director Systems Engineering at Cybereason, Submit your bio for consideration to participate on our CISO RoundTable. RV founded Easy Solutions, a global organization focused on the prevention and detection of electronic fraud. The 2022 agenda is designed to not only shape discussions to support guidance on breach prevention, but also to provide practical insights and tools required to aid security leaders in tackling the common security challenges were facing in this new era. Todays Autonomous, Self-Learning defenses are capable of identifying and neutralizing security incidents in seconds, not hours before the damage is done. Internet of Things - Business Perspectives 1 Day Training in Miami, FL, New CISSP Certification Training in Miami ,FL, CISA - Certified Information Systems Auditor Trainin in Fort Lauderdale, FL, Fort Lauderdale, FL Fort Lauderdale, FL, Internet of Things - Business Perspectives Training in Fort Lauderdale, FL, For venue details reach us at info@mangates.com Fort Lauderdale, FL, ONF-Certified SDN Associate (OCSA) 1 Day Training in Miami, FL, Learn Cybersecurity and Get Certified for Free ! Active in internet policy and governance circles, Andy supported Akamai CEOs in roles on the NIAC and NSTAC, as well as directly served on the FCCs Communications Security, Reliability, and Interoperability Council. Cybersecurity is core to its mission, as the battlefield for warfare moves to the modern age. Protecting citizens, assets, information and infrastructure is the building block for stable government services.
We also use third-party cookies that help us analyze and understand how you use this website. Achieve the 3-2-1-1 best practice, by adding another layer of backup via the retention of immutable data. This presentation will discuss ways to make the best choices to maximize defense coverage with appropriate resource allocation. Kristen dedicates her spare time to mentoring students She teaches law and business at the undergraduate and graduate levels as an adjunct professor at Florida International University. This information is used internally by the Cyber Security Summit to manage your registration and processing Certificates of Attendance, as well as a means of sharing invitations to future events produced by the Cyber Security Summit. This presentation will discuss key challenges with improving AD security and offer real solutions. You are welcome to share this invitation with your IT Security Team and other Senior Level colleagues who would benefit from attending this event. A new addition to the new Arcserve. As CISO, he has managed the County's information security and risk reduction programs and strategies including, policy, compliance, investigations and incident response, operational security services and identity & access management for the past 14 years. Previously, Ryan spent several years at industry-leading extended Service Provider Entara, where he served as a Director of Sales, VP, and ultimately CEO. With over ten years of leadership experience across technology, risk, cybersecurity, and compliance, Ben serves as the Head of MSP/MSSP and IR Technical at Illumio.
How many are still undetected? Save Elements of Risk Management 1 Day Training in Miami, FL to your collection. Law school professor. Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. Join us & learn about the latest cyber security threats facing your company, best cyber hygiene practices, solutions to protect against a cyber attack, and much more all from the comfort and safety of your home/office. Save Risk Assessment and Management 1 Day Training in Miami, FL to your collection. Low-code condition builder makes it easy to build modular, repeatable playbooks, Case management, dashboards and reporting to combine human and machine intelligence, Help for deployment, management and optimization, User certification programs to develop skills and insights, Support programs and user communities for help when you need it.
Sitemap 8