CSNs mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after. Before serving in her current role, Colonel Frost was the Director of Foreign Intelligence with the Headquarters of the Army Staff, G-2. Survive and thrive in a fast-moving, technology-driven world, Public Sector Security and Empowerment Division. Terry has over 25 years' experience in the information security field with work ranging from hands on security penetration testing to the build out of complex, state of the art cyber protections. Neal has always taken a human based approach to Security that allows for faster improvement and effective determination of tool use and capabilities. Whether you are aspiring to break into cybersecurity or you are on your journey to becoming a CISO, this session is designed to help you level up in your career. Earn 6-12 CPE credits through 15+ educational elements learning from local and nationally recognized industry leaders. Amy is a registered CPA and Chartered Global Management Accountant (CGMA) and earned both masters and bachelors degrees in Accounting from The University of North Carolina at Greensboro. Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. Veza is the authorization platform for data. WiCyS strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. Best Cybersecurity Healthcare Conferences 2023 (US, EU, UK) CSAs activities, knowledge and extensive network benefit the entire community impacted by cloudfrom providers and customers, to governments, entrepreneurs and the assurance industryand provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. The CISO is like a musical conductor that must pay attention to all the resources at his or her disposalbe it people, tools, technologies, systems, and more. Advisory Council Roundtable Breakfast - (VIP / Invite Only), The Next Generation of Cybersecurity Talent and Tools. verified. Insider threat initiatives require a new, more focused approach. How to identify business processes which can contribute to intentional or unintentional insider threats. Providing presentations by leading national information-management professionals and executives who benefit from management-information systems. one of the premier annual events that has a global appeal, SecureWorld gives its attendees the unique opportunity. By seamlessly integrating with over 200 security and management solutions, Axonius is deployed in minutes, improving cyber hygiene immediately. Business Cyber Risk - Analyzing the Global Impact of Cybersecurity, Law Currently Stephen serves as a Senior Solutions Engineer at Orca helping customers architect and operationalize the Orca platform, as well as providing risk assessment reviews and guidance on security operations overall. Cybereasons behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. United States | Oregon, Portland January 18, 2023 STRONGER: The Cyber Savvy CEO United States | Massachusetts, Boston January 18, 2023 Debunking Common Cyber Risk Management Myths United States | Massachusetts, Boston January 19, 2023 CyberSaint Live Demo: CyberStrong + Risk Presets Audience members will hear about the governments cyber guidance for small and midsized businesses, learn how this can reduce the risk of the most common and harmful cyber threats, understand how to leverage this to protect their businesses, and leave with a completed worksheet that identifies gaps and opportunities for improvements in their companys cyber protections. Justin Harris is a 20+ year technology veteran with a wide range of vertical industry exposure that has a knack for understanding how market trends introduce market needs. She is a 2020 Tropaia Award Winner, Outstanding Faculty, Georgetown SCS. Brett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). He has worked in the following cybersecurity areas: BISO, Third Party Defense, Vulnerability Management, Identity and Access management, Responsible Vulnerability Disclosure, email encryption and general security awareness. Please see the Events page for a listing of upcoming conferences. Join your fellow InfoSec professionals for high-quality, affordable cybersecurity training and collaboration. Salt Security was founded in 2016 by alumni of the Israeli Defense Forces (IDF) to deliver the first, patented API Protection platform to secure APIs. Trade Shows ( 2023 - 3,006 | Mar - 393 ) Consumer Show Conference Virtual Event Corporate Event Annual General Meeting. We continue to innovate as the landscape of work evolves, which makes CrashPlan foundational to organizations data security. Network with peers and subject matter experts, Gain valuable insight from industry professionals and peers, Build cloud security awareness at the community level, Participate in cloud security education and training locally, Participate in CSA research and development, Discuss cloud vulnerabilities and brainstorm solutions. Through live demonstrations, we will show simple techniques used to bypass various controls. North-carolina - Trade Shows, Conferences 2023 - Events in America The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits. Horizon3.ais mission is to help you find and fix attack vectors before attackers can exploit them. https://www.corelight.com. With a client-focused approach to delivery, we recommend the most appropriate solutions to drive digital transformation and modernization for innovation. Charlotte - The Official Cyber Security Summit Come to the Registration desk in the lobby to check-in and get your badge. Headquartered in Silicon Valley, Gigamon operates globally. The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Chris is currently Vice President, Cyber Operations and Analysis, for Dell Technologies. Charlotte Conference Kicks Off Season with Thought Leaders' Expertise, Risk Management: Understanding How to Assess and Communicate Cybersecurity Risks. Our technology is deployed across 1000 customers in nearly 100 countries and is certified for FIPS 140-2 and Common Criteria EAL4+. Other notable roles over last 20 years have been as a Risk Management consultant at Gartner, Chief Scientist for Lockheed Martins Center for Cyber Security Innovation, and Managing Principal in the Professional Security Services practice at Verizon. 12th Annual SecureWorld in Charlotte, NC | March 2nd | #SWCLT23. From prevention to detection and response, to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Some other female speakers that highlighted the day included: He focuses on the development of tactical and strategic data protection plans, and applies his knowledge of core infrastructure security, security program governance, threat and vulnerability management, identity and access management, and application security to enable the improvement of overall security posture. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to theE2D organization, who is helping to eliminating the digital divide! LKNITP & CLTITP Security Leadership Peer Breakfast Our chapter meets bi-monthly and rotates between Greensboro and Winston-Salem meeting sites. Sean is based in Charlotte, North Carolina. Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge. "Join your regional cybersecurity community for high-quality, affordable training and collaboration. Identify existing critical controls needed to develop an Insider Threat Program using a white hat hacking methodology. Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. SecureWorld Boston 2023. Wed | Feb 27, 2019 | 4:33 PM PST Best practices for establishing and then evaluating an effective cybersecurity program everyone is looking for them. SecureWorld Charlotte | Charlotte, NC, United States - Exhpo.com The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Charlotte The organizations founding partners are Cisco, Facebook and Palo Alto Networks. An avid international traveler, Aaron welcomed the opportunity to spend three months in Tel Aviv, Israel training with Check Points research & development teams at the companys global headquarters. Conference Pass - $170 with promo code CONFSW1 ($50 off) Topics discussed are related to the need for management of these critical assets and emphasize why machine identity management must be part of your Zero Trust plan. The Federal Trade Commission, partnering with Department of Homeland Security, has produced cyber guidance for small and midsize businesses. They are constantly retooling and trying new approaches. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney. Candice E. Frost is the Joint Intelligence Operations Center Commander at the United States Cyber Command. "I've been in this space for a while and involved in the threat intelligence feeds and even designed a protocol for sharing threat intelligence data. Our integrated products and platform offer the industrys most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments. Dont forget about the consultants working hard to stay ahead of those wanting to do harm, as well. His highly sought-after expertise is in security advisory services, architecture and solutions engineering, and digital transformation data-centric solutions that drives business value and manages risks. The upcoming SecureWorld event in Charlotte is a great opportunity to true-up your approach to security and meet top specialists in the field. SecureWorld Charlotte: Evaluating an Effective Cybersecurity Program As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. These problems used to be confined within the data center walls but Digital Transformation projects have greatly increased the scope of challenges. United States. Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec All. The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits. Use the promo codes below to register! Event Website: https://events.secureworld.io/details/charlotte-nc-2023/, 501 S College St, Charlotte, NC 28202, United States, March 1, 2023 9:00 am - March 2, 2023 4:30 pm, https://events.secureworld.io/details/charlotte-nc-2023/, Understanding the Threat Surface with API Security, George Jouldjian, Instructor, Real-World Cyber Risk Management and Resilience Planning, Shawn E. Tuma, Instructor. As massive layoffs continue in the tech industry, the economic situation is appearing grim for 2023, but is there good news for cybersecurity professionals? Utilizing fuzzy logic to pull data from systems of record (SOR), complimentary identity governance and administration (IGA) solutions, and SaaS-based, custom, and legacy downstream applications, SecurEnds provides a complete, end-to-end process for UAR, then automates it out of the box. Digital Shadows monitors and manages an organizations digital risk, providing relevant threat intelligence across the widest range of data sources within the open, deep, and dark web to protect their brand, and reputation. Mr. McCloskey holds a B.S. Must be present to win. Best SCADA Conferences 2023 (Updated Weekly) US, EU, India Learn more atokta.com. The 2023 Annual Threat Assessment of the U.S. Intelligence Community examines the worldwide threats to the national security of the United States. West Coast 2022. Brett Price is a Senior Cybersecurity Consultant for the Risk Advisory Services practice at AccessIT Group (AITG). Click here to view registration types and pricing (PDF), Advisory Council Roundtable Breakfast [VIP / Invite Only], Director, North America Systems Engineering, Skybox Security, Cloud Security Alliance Chapter Meeting - Open to all attendees, Sr. Director, Security Solutions, East, Sirius, a CDW Company, [Opening Keynote] How to Become a CISO: Cybersecurity Learning, Growth, and Career Advancement, VP, Cyber Operations and Analysis, Dell Technologies, The Intersection of Cyber Crime + Cyber Defense and What IT Practitioners Can Do, Managing Director, Saperde; Chief of Staff, Philadelphia InfraGard, Developing Cybersecurity Programs with Framework & Architecture Considerations, Managing Principal - Security Services, Insight, Ransomware and the Future of Cyberwarfare. Colonel Frost pivots in 2023 from the United States Army after more than twenty-five years of service. Critical Start simplifies breach prevention by delivering the most effective managed detection and incident response services. Discussion moderated by Avishai Avivi, CISO of SafeBreach. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat. Prior to joining the Association, Amy served as an internal auditor at Duke University. CISOs should come ready to discuss who is next up and what succession plans are in place (or should be) for developing and nurturing next-gen cybersecurity talent. An award-winning technology leader in Financial Services, Margaret has spent nearly 20 years building, designing and protecting Critical Infrastructure financial systems. David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. Outside of work, Rich enjoys long walks on his treadmill desk and formulating creative strategies to pry his teenage boys away from YouTube. During this presentation, we provide an overview of how the cloud service provider requires you to participate in a shared security model and how your organization can retain control of your sensitive data encryption. 7:30 -7:45: Introduction to Chapter and CSA Programs including the Zero Trust Advisory Ali Alwan, Chapter Founder, 7:45 8:20: Demystifying Zero Trust Jose Ferreira, Solutions Architect Manager. Brett is a knowledgeable cybersecurity consultant with over twenty years of experience and an extensive background in security consulting, network engineering/administration and cybersecurity best practices. What do you want to be doing in five, 10, and 20 years? In his role, Frank is responsible for defining, championing, and executing the cybersecurity and regulatory compliance strategies, programs, and initiatives globally, in deep collaboration with IT and business stakeholders. Join our expert panel as they provide insights and takeaways on the state of the information security profession today, including tips for seeing clearly and staying ahead of threats. Cybereason provides security teams with actionable data, enabling fast decision making and proper response. 2023-03-02 2023-03-02. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. ODNI Releases 2023 Threat Assessment of U.S. Intelligence - SecureWorld Booths have staff ready to answer your questions. When we examine the strategic goals and objectives that organizations undertake to promote their growth and success, we can often identify the interlinkage between business objectives and the services cybersecurity provides. COL Frost is the past recipient of numerous fellowships, including Seminar XXI at the Massachusetts Institute of Technology, the Army War College Fellowship with the Central Intelligence Agency, and the Foundation for Defense of Democracies Fellowship. Gigamon is the first company to deliver unified network visibility and analytics on all information-in-transit, from raw packets to apps, across physical, virtual and cloud infrastructure. SecureWorld Charlotte 2023 As 2022 was a record-breaking year with the volume of cyberattacks, data breaches, and phishing scams on the rise, there was also an increase in state-sponsored hacktivism cases. Crane has also been recognized as a subject matter expert in open source intelligence collection and has presented at numerous conferences about using successful analytical techniques. This event has already passed. On occasion, these incidents rise to the level where they become criminal acts that require intervention over and above standard defensive measures. SVP & BISO Rich is Chief Strategist at Veza, where his responsibilities span high-level messaging and positioning, competitive market analysis, product strategy, go-to-market strategy, and evangelism. It is a 1 day event organised by SecureWorld and will conclude on 02-Mar-2023. Semperis solutions are accredited by Microsoft and recognized by Gartner. Aaron Rose is a Cyber Security Evangelist, Security Architect & Member of the Office of the CTO at Check Point Software Technologies. In addition, come ready to discuss what tools you as a cybersecurity professional are deploying to secure your organization, and to hear from supporting vendors what they have to offer and how they are at the ready to assist in the effort. Charlotte, NC 2023 | SecureWorld In this talk, we will examine how the proliferation of ransomware brought us to this point, what it means for current global conflicts, and the implications for the future of cyberwarfare. Look for participating Dash For Prizes sponsors to be entered to win prizes. Our media, powered by TechTargets Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. Headquartered in Winston-Salem, the North Carolina Center for Cybersecurity, a 501(c)3 organization, accelerate regional economic development through applied cybersecurity to foster economic development. We hold regular meetings to discuss issues, threats and other matters that impact their companies. The resulting high-fidelity signal and deep context enables security operations teams to prioritize, investigate and respond to cyber-attacks in progress sooner and faster. Booths have staff ready to answer your questions. Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge. We empower customers to leverage the power of authorization for an identity-first approach to security, addressing critical business needs tied to managing access governance, data lake security, cloud entitlements, privileged access, and more. Zero Trust is considered by many to be a marketing buzzword, but what it really alludes to is having good, basic cybersecurity hygiene. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Cybersecurity Conferences & News | SecureWorld Rubriks big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. How to identify system based behavioral indicators. With their help, we are working smarter and delivering more robust services to our member libraries. Zero trust is based upon the principle of trust nothing, verify everything and focusing on protecting resources regardless of where they are physically or digitally and to never trust anything by default. In addition to exhibiting, we'll be connecting with business leaders from across the country to share cybersecurity best practices and discuss the ways that Envision brings unique value. March 2, 2023 SecureWorld Charlotte. Prior to joining DHS, Mr. McCloskey served as an information security consultant with over 18 years of experience supporting government clients. For more information about Varonis, visit varonis.com. It seems like the market has finally agreed that we need to manage user identities, and thats a good thing. Prior to LEO Cyber Security, he spent 14 years with SPX Corporation and finished his time there as the Manager of Information Security. Why strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams. EVP, Strategy and Professional Development, (ISC), Moving to an Endpoint-Centric Zero Trust Security Model. Challenging our comfort levels by exchanging ideas with peers and business counterparts. TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Security teams can make a measurable improvement to security operations within minutes. As a graduate of Charleston Southern, Cary started his career in the IT world as a network administrator for a healthcare provider. Following the outstanding SecureWorld Boston event, my friends at SecureWorld shared Highlights and Insights from SecureWorld Boston 2023 and were kind enough to include a few quotes from my lunch keynote let me know what you think and please offer your perspective on these ideas: For my friends in the Houston area, get ready, Please share this! Tamika is passionate about improving communication and understanding of information security in the industry. Her awards and decorations include the Bronze Star, Legion of Merit, and Combat Action Badge. SecureWorld Charlotte 2023: In-person: Charlotte North Carolina: estimated. SecureWorld Charlotte Advisory Council members will discuss a few areas that are worth paying attention to, including artificial intelligence, Zero Trust, cloud security, the Internet of Things, quantum computing, and more. Her career in intelligence and cyber, includes operational tours of duty in the Balkans, multiple deployments to Afghanistan, and currently, her work at Fort Meade. Ransomware, Business emails compromise, Cloud mis-configurations, Social Engineering, Insider Threats the list goes on and on. Ferreira helps enterprises develop and maintain proactive security programs. The 2023 event saw a 33 percent increase in Conference Pass attendees over the 2022 event. North Carolina InfraGard membership is comprised of professionals from various size companies of all industries. SecureWorld Charlotte 2023. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. Check our Events page for a full list of conferences, including a Healthcare Virtual Conference on April 12, and SecureWorld Philadelphia on April 19-20 in King of Prussia. The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. ; andpractice your cyber skillsenhancing your security and attack response skills against real-world threats. Sr. Without that critical security perspective, any project, big or small, can open an organization to at best more risk, and at worst catastrophic. The keynotes were full, breakout sessions were overflowing, and the Exhibitor Hall was buzzing from registration opening until the final session. We usually meet on the second Thursday of the odd months from 6-9 p.m. SecureWorld Charlotte 2021 | Events in America Charlotte Conference Kicks Off Season with Thought - SecureWorld Secure your websites, APIs, and Internet applications. Kathleen Moriarty, Chief Technology Officer, Center for Internet Security, has over two decades of experience. Learn which existing or enhanced security layer can provide insider threat profile data. Prior to joining the private sector in 2015, Crane served as an Analyst at the Federal Bureau of Investigation for more than 11 years, providing strategic and tactical analytical support to cyber, financial crime, and violent crime cases. Charlotte Convention Center. At OpenText Security Solutions, he and his team are focused on quality and efficacy to continuously evolve our Advanced Email Threat Protection and Email Continuity Service solutions, equipping customers and partners with security solutions that are needed in today's continuously evolving threat landscape. Increasing Attack Vectors from Overlayed IoT Devices, [Panel] I Can See Clearly Now, the Threats Are Gone, Threat Intelligence: The State of InfoSec Today, Lead Cybersecurity Consultant, Risk Advisory Services, AccessIT Group, Security Architect, US Public Sector, Office of the CTO, Check Point Software Technologies, Fellow and Director of Cybersecurity, Fluor, [Fireside Chat] Your Career in Cybersecurity. Atlantic works extensively with both large enterprises and SMB markets, understanding their business goals before any solution is recommended. Product Manager Email Threat Protection, OpenText Cybersecurity, Chief Marketing Officer, Phosphorus Cybersecurity, Cybersecurity Manager, Fayetteville Public Works Commission, [Lunch Keynote] CISA Services for Cybersecurity Resilience, Chief of Cybersecurity, Region 4, DHS Cybersecurity and Infrastructure Security Agency, Advisory Council Lunch Roundtable (VIP / Invite Only).