Time left for the beginning
At the country's largest gathering of IT industry leaders, there is no limit to the contacts you can make!
The location will feature expanded amenities and large scale video screens.
The location will feature 2 great stages and large scale video screens.
Great Speakers from alla over the World will be teaching during the Meeting.
We've gathered experts from all corners of the world and the industry to put together the education program.
Convention workshops offer attendees multiple opportunities for intensive learning experiences.
Melissa Moore
Sed facilisis justo vitae risus viverra vulputate. Mauris vel ipsum dignissim diam viverra condimentum. Donec sodales, diam eget mattis condimentum, quam neque tempus purus, dictum viverra risus nisl quis metus.
50mins
Saloon A
Beginner
She is a technologist, strategist, and futurist focused on online identity, privacy, and security.
site.com08.45
Steve Ryan
The seminar will feature some of the giants of the security industry, offering up-to-date perspectives on fundamental security topics.
45mins
Saloon B
Beginner
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comMelanie Crouch
This talk is a rollercoaster ride through the history of financial cybercrime and fills you in on 9 years of cybercrime, including the soap like events around actors.
45mins
Saloon C
Beginner
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comAndrew Fish
Global market growth for technology has put the cyber supply chain at risk for exposure to vulnerabilities. Seventy-six percent of all data breaches result from the introduction of security deficiencies by a third party.
120mins
Saloon D
Intermediate
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comMartin Aniston
As users go mobile, data centers shift from on-premises to cloud, and Internet of Things (IoT) makes remote resources part of the network. Martin Aniston will explore how to maintain central policy and central reporting, even as security enforcement points disperse.
60mins
Saloon A
Intermediate
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comSharon River
This session will focus on active response from a machine and human perspective. SOC analysts are challenged every day to respond to a glut of security incidents and escalations.
60mins
Saloon B
Expert
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.com10.00
Sandra Rea
In pro sports we avow, "Defense wins championships." But without offense it's hard to score the points needed to triumph--cyber security is no different. Sandra Rea looks at how we change the game, stay relevant, and ensure trust is the foundation of digital life.
45mins
Saloon A
Beginner
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.com10.45
Michelle Winter
As pressures to accelerate cloud computing climb higher than ever, relationships between vendors, enterprises and governments have evolved to ones comprised of trust and concern in equal measure. How should companies shape their plans? Join Michelle Winter for a review of companies cyber security strategy to help leaders innovate aggressively while managing business risk.
60mins
Saloon A
Beginner
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comMelissa Moore
Today’s hackers are evolving and adapting. Understanding their motivation and capabilities will help deter them. Investigating a breach through a hacker’s eyes brings a new perspective to information security.
120mins
Saloon C
Intermediate
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
themecube.netSteve Ryan
Many challenges face today’s Risk Management programs, including how to risk rank security gaps, handling business interactions and forming a qualified resource pool.
60mins
Saloon A
Advanced
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
themecube.netMelissa Moore
This seminar will be packed with useful information from a series of respected industry leaders. Discussing successes and pitfalls, these leaders have set out to challenge conventional ideas and pursue cutting edge tactics.
45mins
Saloon A
Beginner
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comSteve Ryan
Many challenges face today’s Risk Management programs, including how to risk rank security gaps, handling business interactions and forming a qualified resource pool.
45mins
Saloon A
Beginner
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comMelanie Crouch
Global market growth for technology has put the cyber supply chain at risk for exposure to vulnerabilities. Seventy-six percent of all data breaches result from the introduction of security deficiencies.
45mins
Saloon B
Intermediate
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comAndrew Fish
Join The Cavalry and Open Garages to learn more about how we are prioritizing cyber safety in areas that affect public safety and human life. Get hands-on experience with automotive computers by controlling a vehicle Electronic Control Unit (ECU),
120mins
Saloon B
Intermediate
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comMartin Aniston
More than half of all security breaches originate from a third-party breach. This highly interactive whiteboard session will focus on participants sharing lessons learned for extending internal security practices to vendors to reduce third-party risk.
60mins
Saloon DA
Intermediate
An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.
site.comThe annual growth rates for Internet access have continued to climb, particularly in developing regions. An increasing amount of this access is coming via broadband technology, providing the advantages of faster download speeds and always-on availability to the Internet.
download pdfReady to join the Conference?
Book your stay right now!
156 Upper East Side 32nd Street, New York, NY 10001
1 212 736-3800
4.9 mi / 7.9 km from Downtown
Choose the accomodation for you.
72
countries
38
speakers
126
programs
495
attenders
The registration includes attendance for the concerts Monday through Wednesday.
One Day
$ 69
GET ACCESS TO 6 WORKSHOPS
Two Days
$ 89
GET ACCESS TO 12 WORKSHOPS
All Concerts
$ 129
GET ACCESS TO ALL WORKSHOPS
Melissa Moore
"I've attended the 2017 conference and i've learned so much that i decided to subscribe for the 2020 meetings as well".
Michael Thomas
"Wow, it has been a great experience and i've learnt so much, this meeting definitely worth the money".
Katy Perry
"I've attended the 2017 conference and i've learned so much that i decided to subscribe for the 2020 meetings as well".
We are happy to hear from you!