Join the Conference

Time left for the beginning

#MEETUP 2020

At the country's largest gathering of IT industry leaders, there is no limit to the contacts you can make!

Great Location

The location will feature expanded amenities and large scale video screens.

4 Large Stages

The location will feature 2 great stages and large scale video screens.

Top Speakers

Great Speakers from alla over the World will be teaching during the Meeting.

Speakers

We've gathered experts from all corners of the world and the industry to put together the education program.

  • Melissa Moore

    Company inc.

  • Steve Ryan

    Company inc.

  • Melanie Crouch

    Company inc.

  • Andrew Fish

    Company inc.

  • Martin Aniston

    Company inc.

  • Sharon River

    Company inc.

  • Sandra Rea

    Company inc.

  • Michelle Winter

    Company inc.

WORKSHOPS

Convention workshops offer attendees multiple opportunities for intensive learning experiences.

Melissa Moore

Online Trust and Identity

Sed facilisis justo vitae risus viverra vulputate. Mauris vel ipsum dignissim diam viverra condimentum. Donec sodales, diam eget mattis condimentum, quam neque tempus purus, dictum viverra risus nisl quis metus.

50mins

Saloon A

Beginner

About Melissa Moore

She is a technologist, strategist, and futurist focused on online identity, privacy, and security.

site.com

Steve Ryan

Understanding of the Current Advanced Security Issues

The seminar will feature some of the giants of the security industry, offering up-to-date perspectives on fundamental security topics.

45mins

Saloon B

Beginner

About Steve Ryan

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Melanie Crouch

A Short History of Attacks on Finance.

This talk is a rollercoaster ride through the history of financial cybercrime and fills you in on 9 years of cybercrime, including the soap like events around actors.

45mins

Saloon C

Beginner

About Melanie Crouch

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Andrew Fish

Cyber Risk in the Supply Chain

Global market growth for technology has put the cyber supply chain at risk for exposure to vulnerabilities. Seventy-six percent of all data breaches result from the introduction of security deficiencies by a third party.

120mins

Saloon D

Intermediate

About Andrew Fish

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Martin Aniston

Staying Secure As Users and Resources Disperse.

As users go mobile, data centers shift from on-premises to cloud, and Internet of Things (IoT) makes remote resources part of the network. Martin Aniston will explore how to maintain central policy and central reporting, even as security enforcement points disperse.

60mins

Saloon A

Intermediate

About Martin Aniston

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Sharon River

Automated Risk Reduction or Manual Action?

This session will focus on active response from a machine and human perspective. SOC analysts are challenged every day to respond to a glut of security incidents and escalations.

60mins

Saloon B

Expert

About Sharon River

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Sandra Rea

Security on Offense.

In pro sports we avow, "Defense wins championships." But without offense it's hard to score the points needed to triumph--cyber security is no different. Sandra Rea looks at how we change the game, stay relevant, and ensure trust is the foundation of digital life.

45mins

Saloon A

Beginner

About Sandra Rea

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Michelle Winter

Enhancing Cloud Trust.

As pressures to accelerate cloud computing climb higher than ever, relationships between vendors, enterprises and governments have evolved to ones comprised of trust and concern in equal measure. How should companies shape their plans? Join Michelle Winter for a review of companies cyber security strategy to help leaders innovate aggressively while managing business risk.

60mins

Saloon A

Beginner

About Michelle Winter

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Melissa Moore

Evolution of Hackers and Reverse Incident Response.

Today’s hackers are evolving and adapting. Understanding their motivation and capabilities will help deter them. Investigating a breach through a hacker’s eyes brings a new perspective to information security.

120mins

Saloon C

Intermediate

About Melissa Moore

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

themecube.net

Steve Ryan

Advancing Information Risk Practices Seminar

Many challenges face today’s Risk Management programs, including how to risk rank security gaps, handling business interactions and forming a qualified resource pool.

60mins

Saloon A

Advanced

About Steve Ryan

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

themecube.net

Melissa Moore

An Inside Look at Cyber Insurance

This seminar will be packed with useful information from a series of respected industry leaders. Discussing successes and pitfalls, these leaders have set out to challenge conventional ideas and pursue cutting edge tactics.

45mins

Saloon A

Beginner

About Melissa Moore

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Steve Ryan

Leveraging Threat Analysis Techniques.

Many challenges face today’s Risk Management programs, including how to risk rank security gaps, handling business interactions and forming a qualified resource pool.

45mins

Saloon A

Beginner

About Steve Ryan

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Melanie Crouch

Combating Cyber Risk in the Supply Chain

Global market growth for technology has put the cyber supply chain at risk for exposure to vulnerabilities. Seventy-six percent of all data breaches result from the introduction of security deficiencies.

45mins

Saloon B

Intermediate

About Melanie Crouch

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Andrew Fish

Open Garages: Learn How Technology Drives Your Car

Join The Cavalry and Open Garages to learn more about how we are prioritizing cyber safety in areas that affect public safety and human life. Get hands-on experience with automotive computers by controlling a vehicle Electronic Control Unit (ECU),

120mins

Saloon B

Intermediate

About Andrew Fish

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

Martin Aniston

Best Practice or Bust? Test Your Approach to Third-Party Risk

More than half of all security breaches originate from a third-party breach. This highly interactive whiteboard session will focus on participants sharing lessons learned for extending internal security practices to vendors to reduce third-party risk.

60mins

Saloon DA

Intermediate

About Martin Aniston

An information security professional with over nine years of consulting experience in the security and risk management field and 13 total years of IT-related support.

site.com

The complete conference program 2020 is now available as a download.

The annual growth rates for Internet access have continued to climb, particularly in developing regions. An increasing amount of this access is coming via broadband technology, providing the advantages of faster download speeds and always-on availability to the Internet.

download pdf

Accomodation

Ready to join the Conference?
Book your stay right now!

Amazing Hotel in Manhattan

hotel

address

156 Upper East Side 32nd Street, New York, NY 10001
1 212 736-3800
4.9 mi / 7.9 km from Downtown

more information

Accomodation Alternatives

Choose the accomodation for you.

Register now!

The registration includes attendance for the concerts Monday through Wednesday.

One Day

$ 69

GET ACCESS TO 6 WORKSHOPS

  • Convention Kit
  • Coffee break
  • Ethnic Lunch
  • 2 WORKSHOPS
  • Gadgets
  • Badge
  • Food Coupon
  • Free Park

Two Days

$ 89

GET ACCESS TO 12 WORKSHOPS

  • Convention Kit
  • Coffee break
  • Ethnic Lunch
  • 6 WORKSHOPS
  • Gadgets
  • Badge
  • Food Coupon
  • Free Park

All Concerts

$ 129

GET ACCESS TO ALL WORKSHOPS

  • Convention Kit
  • Coffee break
  • Ethnic Lunch
  • 10 WORKSHOPS
  • Gadgets
  • Badge
  • Food Coupon
  • Free Park

Contact us

We are happy to hear from you!

  • Your Address 2345 - New York NY
  • +00 0101010101
  • +00 0101010101
  • www.site.com
  • info@yoursite.com
  • Rss Feed