Highlight Topics
- Operational Technology
- Third Party Risk Management
- Upskilling Cybersecurity Teams
- Ransomware
- Fraud Prevention & Threat Intelligence
The Cybersecurity Summit: North America Midwest offers a pivotal day of advanced cybersecurity learning and dialogue, catering to a diverse audience of professionals in cybersecurity, manufacturing, and beyond.
Highlighting this event is a distinctive tabletop simulation on Deep Fakes, led by the United States Secret Service and CyberEdBoard, exploring the intricacies of protecting digital ecosystems from advanced threats. Participants in this tabletop simulation will immerse in a scenario involving deepfake technology, focusing on crafting comprehensive incident response strategies and fostering interagency collaboration.
Dive into the heart of cybersecurity innovation at our Summit, where a dynamic array of sessions and workshops await, designed to master the art of cybersecurity in a digital realm that never stands still. Crafted with precision, our agenda cuts through the noise of the cybersecurity world, offering a day rich in enlightening discussions and hands-on collaboration. Here, the forefront of cybersecurity thought converges, promising to equip professionals from all walks with the tools needed to navigate today’s challenges and tomorrow’s opportunities. This event is a must-attend for CISOs and cybersecurity leaders aiming to deepen their understanding of the current and future state of cybersecurity, shining a light on the path to innovation, security, and unparalleled organizational agility.
View our ISMG Event Experience video to see what your peers are saying about their participation.
Chicago
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
This Session will discuss:
The DPO can help the CISO secure data more efficiently by collating only the most necessary data and keeping customers well-informed about the transfer and usage of data.
So, what are some best practices to improve collaboration?
This session will discuss:
Clearly, Modern Application Development, or MAD, processes and innovative, cloud-native approaches are critical for organizations to stay viable.
Not surprisingly, leadership support for MAD initiatives is building – and quickly. But MAD comes with cultural changes and some inherent application security challenges that need to be addressed proactively.
In this live session, we’ll cover what you’ll need to know about MAD, including:
This interactive session is meticulously crafted to mimic a sophisticated cyberattack. It aims to bolster strategic response capabilities and enhance operational readiness against the backdrop of advanced cyberthreats. The focal point of this exercise is a strategically crafted deepfake incident targeting a corporate executive, weaving together elements of social engineering, financial fraud, and the challenges posed by emerging technological threats.
What you will gain from this experience:
Cybersecurity teams need processes and tools to measure ROI and manage data sprawl. What are the best ways to think about optimizing your existing and upcoming data investments, and how have others approached the issue?
In this panel, Randy Lariar, practice director with Optiv’s Big Data and Analytics, discusses what he sees in the market and challenges organizations faced with rationalizing data investments. Top business leaders join Lariar to discuss what has worked for their organizations and their perspectives on how others can successfully decide what data investments are right for them.
By shifting their focus “upstream,” adversaries can infect a single component that is then distributed “downstream” using legitimate software workflows and update mechanisms.
Next-generation cyberattacks targeting open-source software projects have increased 430% year-over-year. The attacks are possible because:
When adversaries deliberately and secretly inject malicious code into open-source projects, they can surreptitiously “set traps” upstream and then carry out attacks downstream. This session explores:
This exclusive panel tackles these questions as well as:
It is time to remove the calendar reminder for our certificate renewal. Health Applications can verify enrollment into corporate management systems without deploying certificates. Learn how this is done with some common asset management solutions.
RSVP here to attend our events. You can opt for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Future Events
Future Events