Today marks the beginning of the 2-day tech event that will bring together some of the greatest minds in cyber defense: the Cyber Security Chicago.

Cyber Security Chicago will offer invaluable security insights beneficial to both IT managers and security specialists.

Hear from some of the most excellent cyber security experts today on how you can strengthen your cyber defense against cyber attacks. It would also cover essential details on how you can recover in case your system has been breached or compromised.

The event will also cover essential details on how you can recover in case your system has been breached or compromised.

Furthermore, Cyber Security Chicago will enable you to gain access to a vast library of knowledge on how you could help protect your employees, organization, and country from cyber terrorism and cyber gangs lurking on the Internet.

This once in a lifetime event will give you and all the attendees the opportunity to network and collaborate with the greatest IT security visionaries and practitioners that are continuously changing the face of cybersecurity today.

#CyberSecurityChicago is kicking off today! @kevinmitnick will be there!Click To Tweet

If you wish to attend this tech event, you may still get your ticket here.

The Cyber Security Chicago will run for two days starting today, October 18th. The event will be held at the McCormick Place in Chicago and is sponsored by Verisign, BeyondTrust, Cisco Umbrella, IBM Securities, and many more.

This event is organized by Imago Techmedia Event.

Cyber Security Chicago: Speakers

The Cyber Security Chicago has invited some of the best threat and cyber defense experts in the industry to share their knowledge and insight about the current state of our internet security. The organizers already announced the names of over 70 speakers that will join the conference. One of the keynote speakers is Kevin Mitnick, CEO of the Las Vegas-based online security firm, Mitnick Security Consulting.

Kevin Mitnick is a speaker at the Cyber Security Chicago
Kevin Mitnick | Mitnick Security Consulting | mitnicksecurity.com

According to his company profile, Mitnick is a famous hacker, author, and top cyber security speaker. Before going white hat, he was included in FBI’s Most Wanted list for hacking into 40 major corporations just for the challenge. However, Mitnick’s joined the good guys and is now a trusted security consultant to the Fortune 500 and governments worldwide.

“Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees— learn how to protect their information and themselves from harm.” ~ Mitnick Security

Aside from Mitnick, other notable speakers for the Cyber Security Chicago include:

  • Christopher Hadnagy, Chief Human Hacker, Social Engineering Inc.
  • Daniel Wierzbicki, Supervisory Special Agent, Criminal & National Security Cyber Investigation, FBI Chicago Division
  • Sachin Gupta, Principal Cybersecurity Evangelist & Field CTO, Enterprise Cybersecurity Group, Microsoft
  • Keith Smith, VP of Threat Intelligence, Root9B
  • Nicole Eagan, CEO, Darktrace
  • Ed Cabrera, Chief Cybersecurity Officer, Trend Micro
  • Aamir Lakhani, Senior Security Strategy, Fortinet
  • Adam Lewis, Security Lead, Office of the CTO, Motorola Solutions
  • Adrienne McEwan, Cloud Security CSE, Cisco
  • Alex Mathews, Lead Security Evangelist, EMEA Positive Technologies
  • Anders Norremo, CEO, ThirdPartyTrust
  • Andy Ellis, Chief Security Officer, Akamai Technologies
  • Bill Mann, SVP Products/ Chief Product Officer, Centrify Corporation
  • Blake Angove, Director, Technology Services, LaSalle Network
  • Bob Timpany, Chief of Idaho Operations, NCCIC-ICS-CERT, U.S. Department of Homeland Security
  • Bradley Philp, Principal Sales Engineer, Forcepoint CASB
  • Chandler Howell, Director of Engineering Services, Nexum Inc.

For the full list of speakers, go here.

Cyber Security Chicago: Agenda

October 18th

  • Breakfast
  • THE ART OF DECEPTION: How Hackers and Con Artists Manipulate You and What You Can Do About It
  • The State of Internet Security – And Steps to a Safer Future
  • Next-Gen Application Security
  • Six Steps to Secure Access for Privileged Insiders and Vendors
  • The Hidden Threats of Weak IoT Security Within the Enterprise
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks
  • Insider Threats
  • No Silver Bullets – Cybersecurity in the Cognitive Era
  • The Future of Authentication with FIDO
  • The Way we Work has Changed. Has Your Security?
  • M2M: Machine Learning and the War Against the Machines
  • IoT and the Physically Dangerous
  • PANEL: The Future of Cyber Security
  • The #1 Threat: Weak or Stolen Credentials – Analyzing and Combating the Risk
  • Cloud, AI, Big Data… OH MY! How the Growing Scale of Systems is Changing the Game
  • Intelligent Security and Deep Visibility with Meraki
  • Layers of Security is Expensive and Isn’t Reliable – So How Can Automated Endpoint Response be the Answer?
  • Cyber Security Awareness: Don’t Become Another Statistic
  • How to Simplify Identity for Your Employees, Contractors, Partners, and Customers
  • The Internet of (Too Many) Connected Things
  • To Pay or Not to Pay, That Should Never Be the Question
  • HUNT: Securing the Commercial Sector Since 2013
  • Adaptive Pentesting & Domain Trust Exploitation
  • Overhauling Your Recruiting and Retention Strategy For Cyber Security

October 19th

  • Breakfast
  • Welcome Address
  • Confessions of a Hacker
  • Machine Learning’s Effect on Cybersecurity
  • How to Avoid Another Equifax-like Data Breach – OSS Management in Your DevOps Process
  • How to Keep a Productive Pace with the Risk in Your Cloud
  • Understanding and Evaluating IoT in Today’s Organization
  • Managing Privilege Risks
  • 7 Steps to Building a SOC with Limited Resources
  • Hack the Planet… For Real This Time
  • Data Segregation, End-to-End Encryption and Blockchain Enabled Chains of Custody: Protecting High Value Data in the Cloud
  • The Way we Work has Changed. Has Your Security?
  • M2M: Machine Learning and the War Against the Machines
  • Why Hackers Still Get In
  • PANEL: The Future of Identity and Access Management
  • The Future of Cyber Technologies, App&Sec, and DevOps: Importance of Application Security in DevOps
  • Brought to You by Check Point
  • Hacking Everything – The Dark Side of the Internet of Things
  • PANEL: The Path From DevOps to DevSecOps

For the full agenda, go here.

Will you be attending the Cyber Security Chicago? How secure is your current Internet network? Let us know your thoughts in the comment section below!

banner ad to seo services page

LEAVE A REPLY

Please enter your comment!
Please enter your name here