Because when you secure your data, you secure your applications, and you secure your business. Gigamon is the first company to deliver unified network visibility and analytics on all information-in-transit, from raw packets to apps, across physical, virtual and cloud infrastructure. She presented new research that reveals where cybersecurity roles fit in among the economic uncertainty. Our integrated products and platform offer the industrys most advanced PAM solution, enabling organizations to quickly shrink their attack surface across traditional, cloud and hybrid environments. Description: Join your regional cybersecurity community for high-quality, affordable training and collaboration. Frost will hang up her uniform in early April after 25 years of service, to which she received an ovation of applause from the greater Charlotte cybersecurity professionals community in attendance. ), Different paths in cybersecurity (Red Team, Blue Team, GRC, and more). Candice E. Frost is the Joint Intelligence Operations Center Commander at the United States Cyber Command. Check our Events page for a full list of conferences, including a Healthcare Virtual Conference on April 12, and SecureWorld Philadelphia on April 19-20 in King of Prussia. Introduce yourself and your company to our team and and we'll pay your admittance to this amazing event. Infrasec Forum 2023 Poland | Warsaw February 9, 2023 S4x23 United States | Florida, Miami February 13, 2023 Airport Safety and Security Conference 2022 Germany | Munich February 16, 2023 For more information about Varonis, visit varonis.com. Threat methods and controls utilized are very comprehensive and effective for those who are typically in the office, but what about the remote workforce of today? Frank is the CISO at EnPro Industries (NPO). If weve learned one thing from the pandemic its that cybercriminals do not take breaks. Corelight Sensors run on open-source Zeek (formerly called Bro) and simplify Zeek deployment and management while expanding its performance and capabilities. The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Economic Uncertainty: What Lies Ahead for Cybersecurity Professionals? With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. Weve got to get our developers on board, as well, as its got to be secure before it goes to market. EVP, Strategy and Professional Development, (ISC), Moving to an Endpoint-Centric Zero Trust Security Model. Ferreira helps enterprises develop and maintain proactive security programs. It is our goal to improve and extend information sharing between private industry and the government. He is a member of the ISACA, serves on the Advisory Board for SecureWorld Charlotte and recently completed a Masters degree in Cybersecurity. He is also an information systems officer in the US Coast Guard Auxiliary. Charlotte, NC 2022 | SecureWorld TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Envision | SecureWorld Charlotte While in the New York Field Office, Chris ran point on several large-scale multi-national criminal investigations targeting transnational organized crime groups. Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. Must be present to win. SecureWorld charlotte. What is most important: education, experience, certifications, or who you know? In this session you will learn that ZeroTrust No one vendor, product, or technology will get you to zero trust. SecureWorld Events Terry has over 25 years' experience in the information security field with work ranging from hands on security penetration testing to the build out of complex, state of the art cyber protections. 2023 edition of SecureWorld Charlotte will be held at Charlotte Convention Center, Charlotte starting on 02nd March. Chad is an experienced information security leader with an extensive background in security engineering, project management, network administration and compliance. BeyondTrust is the worldwide leader in Privileged Access Management (PAM), empowering organizations to secure and manage their entire universe of privileges. Select a time that works for you and lets talk. As a graduate of Charleston Southern, Cary started his career in the IT world as a network administrator for a healthcare provider. In addition, she covers critical infrastructure, election security, and the security of local and state governments. For the full story on how Gigamon can help you to run fast, stay secure and innovate, please visitwww.gigamon.com. Varonis detects insider threats and cyberattacks by analyzing file activity and user behavior; prevents disaster by locking down sensitive data; and efficiently sustains a secure state with automation. Our media, powered by TechTargets Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. Top Trade Show List by Industry Mar 2023 - Events in America Formerly as the Security Innovations Principal in Dell Technologies Office of the CTO, Kathleen worked on ecosystems, standards, and strategy. Booths have staff ready to answer your questions. We will explore some of these challenges, approaches taken by your fellow leaders, and outcomes. Some other female speakers that highlighted the day included: Tamika Bass drove up from her home base in Atlanta to deliver her session on "Risk Management: Understanding How to Assess and Communicate Cybersecurity Risks" to more than 70 attendees. Well discuss and show how using newer tools and techniquesthat include split trust, ubiquitous data encryption, and contextual accessreduce and mitigate implicit trust in your cloud provider along with allowing you to manage your own encryption and manage access to your data in the cloud. Our technology continuously assesses, remediates and monitors devices and works with disparate security tools to help accelerate incident response, break down silos, automate workflows and optimize existing investments. Innovation to deploy security following scalable architectural patterns for security management is paramount. AccessIT Group is your partner in cybersecurity. Enhance procedures required to identify insider threat exposures. She also discussed how to communicate risks to executive leadership. Terry specializes in helping organizations devise the right cybersecurity strategies to help manage vulnerabilities and mitigate risks across IT, OT, and hybrid cloud environments. Justin Harris is a 20+ year technology veteran with a wide range of vertical industry exposure that has a knack for understanding how market trends introduce market needs. The BeyondTrust Universal Privilege Management approach secures and protects privileges across passwords, endpoints, and access, giving organizations the visibility and control they need to reduce risk, achieve compliance, and boost operational performance. 247 Charlotte Agenda Speakers Sponsors Partners Photos ThreatLockers combined Application Whitelisting, Ringfencing, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. McCloskey's lunch topic of "CISA Services for Cybersecurity Resilience" was chock full of links to resources that security leaders of any organization could and should take advantage of. How to identify business processes which can contribute to intentional or unintentional insider threats. The keynotes were full, breakout sessions were overflowing, and the Exhibitor Hall was buzzing from registration opening until the final session. Semperis patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. They collaborateoften better than we do. Devo, formerly Logtrust, is a technology company that developed the first real-time big data-in-motion software, which collects and analyses big data in real-time. Being a resource for each other, and personal networking. Learn which existing or enhanced security layer can provide insider threat profile data. Brett has experience working with enterprise and mid-market customers across various industry sectors such as healthcare, banking, industrial, retail, pharmaceutical and insurance. Security teams can make a measurable improvement to security operations within minutes. Rated 5.0 by 1 person. Colonel Frost pivots in 2023 from the United States Army after more than twenty-five years of service. Before serving in her current role, Colonel Frost was the Director of Foreign Intelligence with the Headquarters of the Army Staff, G-2. We are a 501c4 Non-Profit entity, and donate a significant portion of our sponsorship dollars to theE2D organization, who is helping to eliminating the digital divide! In addition to #GartnerIAM TX, the SecurEnds team will also be attending SecureWorld in Boston . Gigamon is the first company to deliver unified network visibility and analytics on all information-in-transit, from raw packets to apps, across physical, virtual and cloud infrastructure. Mar 02, 2023. Your email address will not be published. LKNITP & CLTITP Security Leadership Peer Breakfast Charlotte, NC 2023 | SecureWorld Watch this video for more: FBI Special Agent Brian Cyprian will deliver the opening keynote. His initial foray into the world as security was as a firewall admin with a large MSSP. 12th Annual SecureWorld in Charlotte, NC | March 2nd | #SWCLT23. Reduce the stress of meeting compliance with regulatory standards by first taking advantage of a prescriptive and easy to follow Framework. Around the same time, Forrester, a market research company that provides advice on technology began promoting ZTN as a worthwhile consideration for enterprise security teams. 2023-03-02 2023-03-02. In addition, come ready to discuss what tools you as a cybersecurity professional are deploying to secure your organization, and to hear from supporting vendors what they have to offer and how they are at the ready to assist in the effort. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Discussion moderated by Avishai Avivi, CISO of SafeBreach. Amy is responsible for driving organization-wide strategy and global product innovation for education and professional development experiences for (ISC) members and other cybersecurity professionals at all career stages. North-carolina - Trade Shows, Conferences 2023 - Events in America She is also the recipient of the Billington Cybersecurity Workforce Development Award, Business Council for Peace Lifetime Mentorship Award, and the Lifetime Achievement Award in Muscatine, Iowa. Our solutions offer multilevel security architecture, Infinity Total Protection with Gen V advanced threat prevention. The resulting high-fidelity signal and deep context enables security operations teams to prioritize, investigate and respond to cyber-attacks in progress sooner and faster. Some were already there and found new ways to thrive. CrashPlan provides peace of mind through secure, scalable, and straightforward endpoint data backup. Speakers from public and private agencies and the law enforcement communities are invited. United States. Using the cloud native Arctic Wolf Platform, we provide security operations as a concierge service. Registration is quick and easy. Visitwww.vectra.ai. 46 people interested. Rich is Chief Strategist at Veza, where his responsibilities span high-level messaging and positioning, competitive market analysis, product strategy, go-to-market strategy, and evangelism. Horizon3.ais mission is to help you find and fix attack vectors before attackers can exploit them. Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NEA and Split Rock Partners. Akeyless unique combination of innovative technology and cloud-native architecture, enables enterprises to fastly secure DevOps, cloud workloads, and legacy environments, while meeting compliance and regulations. During her tenure in the Dell EMC Office of the CTO, Kathleen had the honor of being appointed and serving two terms as the Internet Engineering Task Force (IETF) Security Area Director and as a member of the Internet Engineering Steering Group from March 2014-2018. United States | Oregon, Portland January 18, 2023 STRONGER: The Cyber Savvy CEO United States | Massachusetts, Boston January 18, 2023 Debunking Common Cyber Risk Management Myths United States | Massachusetts, Boston January 19, 2023 CyberSaint Live Demo: CyberStrong + Risk Presets Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. SVP & BISO Sean is based in Charlotte, North Carolina. Semperis solutions are accredited by Microsoft and recognized by Gartner. APIs are used in modern web applications and provide rich interactive experiences for users. Simon resides in Pittsburgh, Pennsylvania. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly. At OpenText Security Solutions, he and his team are focused on quality and efficacy to continuously evolve our Advanced Email Threat Protection and Email Continuity Service solutions, equipping customers and partners with security solutions that are needed in today's continuously evolving threat landscape. Prior to SentinelOne, he was a Senior Product Manager at Microsoft in the Azure Security engineering division. Exhibitors will showcase security technologies, IT based services, leading security equipments associated with this field. Prior to joining Dell, Chris served at the first CISO for the Wendy's company, where he spent five years growing and maturing the Information Security organization, with responsibility for the security of over 6,800 restaurants as well as a massive e-commerce platform. Vitaliy has been in multiple customer facing roles to address cybersecurity challenges in organization of all sizes. Contact us today! "I've been in this space for a while and involved in the threat intelligence feeds and even designed a protocol for sharing threat intelligence data. Learn the methodologies utilized by individuals within the organization that would be defined as insider threat activity, How to identify system based behavioral indicators, Learn which existing or enhanced security layer can provide insider threat profile data, Learn how areas of the organization, i.e. Margaret White is currently Senior Vice President, Business Information Security Officer (BISO) for Wells Fargos Enterprise Functions. Key Take-Away: in Information Security and Assurance. Attend a local chapter meeting, meet FBI officials from your area and help protect your nations infrastructure. Chris has been appointed by three different U.S. Presidents and two different Governors as a US Selective Service Board Member. Chris has over 25 years experience in the IT field and is a Certified Information Systems Security Professional (CISSP). It will also position North Carolina as a leader in cybersecurity workforce development at the community level to help existing businesses meet the global demand for a more secure supply chain. Trade Shows ( 2023 - 3,006 | Mar - 393 ) Consumer Show Conference Virtual Event Corporate Event Annual General Meeting. Vectrais the leader in hybrid cloud threat detection and response. He has thrived in the following cybersecurity based arenas: BISO, Third Party Defense, Vulnerability Management, Identity and Access management, Responsible Vulnerability Disclosure, email encryption and general security awareness. CSAs activities, knowledge and extensive network benefit the entire community impacted by cloudfrom providers and customers, to governments, entrepreneurs and the assurance industryand provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. Rob is an active supporter and advocate for those impacted by disabilities and is an advocate in the Women in Technology and Operations (WIT&O) organization. Previously, he has served in security management roles at Neiman Marcus and IBM. George has conducted network and application penetration tests for clients worldwide, including Fortune 500 companies, and conducted Internet of Things (IoT) security reviews for commercial devices. Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Candice was instrumental in the integration of women into combat arms and served close to half of her career in infantry divisions. Charlotte, North Carolina. Our technology is deployed across 1000 customers in nearly 100 countries and is certified for FIPS 140-2 and Common Criteria EAL4+. AccessIT Group is your partner in cybersecurity. Our chapter meets bi-monthly and rotates between Greensboro and Winston-Salem meeting sites. In addition, she covers critical infrastructure, election security, and the security of local and state governments. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. How do you decide which ones are of the most concern to your organization? This fireside chat discusses: Even if you are satisfied in your current role, learn how to make yourself recession proof.. She is a member of the Executive Advisory Council for AFCEA DC. Its a huge task, but we dont have to do it alone. Neal has always taken a human based approach to Security that allows for faster improvement and effective determination of tool use and capabilities. The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits. We are the local (ISC)2 chapter here in central North Carolina. March 22 - 23, 2023. She has been a speaker on cybersecurity threats at various conferences, including DEF CON, the Diana Initiative, ShmooCon Hacker Conference, PacSec Tokyo, and in presentations to Capitol Hill. Tego is an engineering-led, forward thinking technology team that creates competitive advantage by solving problems and delivering results with remarkable efficiency. This includes nation-states, for cash, and to use the demand for cash to obfuscate activities like espionage and sabotage. In her keynote, Col. Candice Frost covers known hacking groups, their methods, motivations, and relationship to greater geopolitical developments. Toby Zimmerer is a Director of Cybersecurity Due Diligence in the Transaction Advisory Services Practice of RSM US, where he assists organizations with identifying and addressing the potential cybersecurity risks during mergers and acquisitions. Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Based in North Carolina, Tego has a strong commitment to fostering long term relationships and delivering unparalleled support. We are trusted by 20,000 customers, including 78 of the Fortune 100, and a global partner network. Zero Trust is considered by many to be a marketing buzzword, but what it really alludes to is having good, basic cybersecurity hygiene. . Akeyless unique combination of innovative technology and cloud-native architecture, enables enterprises to fastly secure DevOps, cloud workloads, and legacy environments, while meeting compliance and regulations. He has also consulted as a virtual CISO for many industries and companies around the world. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Established in 1941, The Institute of Internal Auditors (IIA) is an international professional association with global headquarters in Altamonte Springs, Florida, USA. With more than 20 years of experience in IT, his expertise includes IT/OT convergence, audit and compliance, data breaches, and incident management. The Charlotte ISSA chapter is committed to providing the Information Security professionals of Charlotte opportunities to grow both technically and professionally through training, meetings and summits. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. For over 25 years, Mike has specialized in both offensive and defensive cybersecurity, and GRC (Governance, Risk, and Compliance). deepwatchs cloud SecOps platform and relentless customer focus are redefining the managed security services industry. SecureWorld Charlotte 2023 As 2022 was a record-breaking year with the volume of cyberattacks, data breaches, and phishing scams on the rise, there was also an increase in state-sponsored hacktivism cases. From prevention to detection and response, to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Our global foot print of organizations using Certes technology has helped customers to meet national, international or industry-specific regulations. Join our expert panel as they provide insights and takeaways on the state of the information security profession today, including tips for seeing clearly and staying ahead of threats. To learn more about ThreatLocker visit: www.threatlocker.com. Ransomware, phishing, and BEC grab the headlines, but your run-of-the-mill cyberattacks cant be ignored because of the shiny new thing garnering all the attention. Great things happen when people make a connection. ", CISA Services for Cybersecurity Resilience, Moving to an Endpoint-Centric Zero Trust Security Model, Increasing Attack Vectors from Overlayed IOT Devices, There's a Bad Moon On the Rise Are You Ready? IT practitioners and cybersecurity professionals contend with cyber incidents daily. The Brite team is committed to proactively protecting communities and organizations through innovative technology solutions delivered by our talented team. See the list of past SecureWorld cybersecurity conferences. In addition to his organizational involvement, he regularly presents at industry conferences and contributes to industry publications such as InfoSec Magazine and PenTest Magazine. Conference Pass - $170 with promo code CONFSW1 ($50 off) Chris began his Secret Service career out of the New York Field Office spending time between the Fraud Squad and Electronic Crimes Task Force where he earned the designation NITRO Agent for specialized training in network intrusions.