Phoenix-Scottsdale Cybersecurity Conference
Thu, Jul 18
|Hilton Scottsdale Resort & Villas
Don't wait for a breach to happen, take action and safeguard your digital assets now! This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the Phoenix Cybersecurity Conference.
Time & Location
Jul 18, 2024, 8:00 AM – 6:00 PM CDT
Hilton Scottsdale Resort & Villas, 6333 N Scottsdale Rd, Scottsdale, AZ 85250, USA
About the event
Don't wait for a breach to happen. Take action and safeguard your digital assets now! This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the Phoenix Cybersecurity Conference. Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors.
Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.
FEATURED SPEAKERS
Derek Melber Chief Strategist at Nanitor Consistency: Driving Security for 2024
Joe Vadakkan President at CSA / Chief Revenue Officer (CRO) at Lightstream Guest Keynote Presentation
Andy Stone CTO - Americas at Pure Storage Protecting Against Cyber Attacks
Bruce Esposito Global Strategist at One Identity The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity
Jerry D. Keely Cyber Security Advisor at Dept. of Homeland Security Cyber Inter-Agency Collaboration Panel
PD Prasad Co-Founder and Chief Product Officer at Lightbeam Protecting Against Cyber Attacks
William Mack SAIC at USSS Cyber Inter-Agency Collaboration Panel
Raymond Neff Field Sales Engineer II at ESET The Importance of Meeting Cyber Insurance Requirements
Michael Saladino Senior Security Solutions Architect at Cymulate Today's Cybersecurity Arsenal
Riley Montgomery SSA Inter-Agency Collaboration Panel
Bradley Lee Solutions Architect at GitLab Shifting Responsibility Left - Transforming Software Security for Innovation and Compliance
YOU CAN’T AFFORD TO MISS THIS CONFERENCE
Education Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.
Access Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.
Experience Spend the day in comfort as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, and a classy networking reception to end the night—all of which is included with your attendance.
CPE Credits Attending the extensive educational sessions will make you eligible for CPE credits, which you can use to further your professional development.
Impact It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.
EVENT SCHEDULE Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data, and find the best solutions for your goals.
6:30 AM - 7:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
7:00 AM - 8:30 AM
Consistency: Driving Security for 2024
Solutions Showcase
Whether you are an SMB, Enterprise, or MSSP, you need to know what your endpoints are running. You need to know your endpoints are secured and have not drifted from running approved software. You need to know your endpoints have the proper patches for the OS, software, and even device drivers. This is only possible with solutions that are dedicated for such tasks. Let 19X Microsoft MVP Derek Melber describe the ideal scenario that every organization can create to help them establish endpoints that can withstand some of the most brutal attacks. This is a combination of keynote and workshop, so bring your thinking caps!
8:45 AM - 9:15 AM
A Zero Trust Journey for Data Security and Enterprise AI
General Sessions
9:15 AM - 9:45 AM
Presentation by Seceon
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
9:45 AM - 10:15 AM
Protecting Against Cyber Attacks
General Sessions
10:40 AM - 11:00 AM
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity
General Sessions
Attack surfaces for enterprises are constantly changing due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. Every day, proactive cybercriminals are exploiting new vulnerabilities with skill. In this context, comprehensive Identity Security is crucial to managing risks. However, maintaining a strong Identity and Access Management (IAM) strategy can be a complex task, given the multitude of tools involved. This session will address how a unified identity security strategy is key to addressing the constantly evolving challenges of today's and tomorrow’s cyber threats.
11:00 AM - 11:30 AM
Cyber Inter-Agency Collaboration Panel
General Sessions
11:20 AM - 11:50 AM
Lunch Break
Solutions Showcase
Meet, Engage, and enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials, and thought Leaders.
12:00 PM - 12:30 PM
Keynote Presentation: Dare to Think Differently About Your Enterprise Security Approach in 2024
General Sessions
Thank goodness 2023 is over! Recession, staff reductions, continued cyber attacks, and more breaches! The time is now to consider changing things up! Traditional security solutions such as basic firewalls, vulnerability management, and endpoint detections is just not sufficient for the onslaught of different tactics by attackers. Let 19X Microsoft MVP Derek Melber guide you through some radical thinking regarding the various aspects of securing your endpoints, servers, data, resource access, and more. Just a hint: good core security starts with good security hygiene! By the time you are finished with this engaging keynote, you will want to start analyzing your current approach and considering how you will revamp your security strategies to make a bigger impact in your overall security risk and hygiene.
12:55 PM - 1:15 PM
Today's Cybersecurity Arsenal: 3 Methods to Effectively Protect Your Infrastructure Against the Rising Tide of Cyber Attacks
General Sessions
Organizations of all shapes and sizes are fighting battles against threat actors. As seen in recent years, cyber-attacks have become more sophisticated, making them harder to detect and mitigate.
Today, CISOs and organizations in general rely on two main methods to verify that their infrastructure, data, and IP are protected. The risk assessment these methods generate might satisfy compliance regulators, but they fail to accurately validate the organization's actual security posture, especially against emerging threats, multi-vector attacks, and APTs.
In this session, you’ll learn about a three-part purple teaming framework that helps you prepare for future bouts… especially when it comes to sophisticated, multi-vector attacks.
1:15 PM - 1:35 PM
Shifting Responsibility Left - Transforming Software Security for Innovation and Compliance
General Sessions
2:35 PM - 2:05 PM
Opportunities & Risks for Industries - Generative AI Models
General Sessions
Generative AI models can perform tasks that traditionally require creativity and human understanding. They learn patterns from existing data during training and can subsequently generate new content, such as texts, images, and music, that follow these patterns. Due to their versatility and generally high-quality results, they, on the one hand, represent an opportunity for digitalization. On the other hand, the use of generative AI models introduces novel IT security risks that need to be considered for a comprehensive analysis of the threat landscape in relation to IT security. we will be diving into risk analysis, measures, and operational models by utilizing Gen AI.
2:25 PM - 2:45 PM
The Importance of Meeting Cyber Insurance Requirements
General Sessions
2:25 PM - 2:45 AM
Session #8
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
3:05 PM - 3:25 AM
Session #9
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
3:30 PM - 4:00 PM
Cyber Executive Roundtable
General Sessions
Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun! It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region. We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.
4:00 PM - 5:00 PM
Networking Reception
Solutions Showcase
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.