Cyber Solutions Summit And Expo

Cybersecurity Solutions Summit

Cyber Solutions Summit And Expo

Buying and selling into the lucrative cybersecurity marketplace can be a painful experience, on both sides. 

Practitioners, CISOs and vendors cleared by SecurityWeek editors will examine the intricacies of vendor identification and evaluation, budgeting, examining SLAs and T&Cs and managing the complex sales and procurement pipelines across industries.

Platinum SponsorsOkta

Torq

Gold Sponsors

Process Unity

Abnormal Security

  • July 19, 2022 11:00AM ET
    Fireside Chat: David Tsao, VP, Security Engineering, Marqeta

    The global cybersecurity marketplace can be daunting to navigate, even for the most mature and well-funded security programs. There are thousands of vendors selling products and services across dozens of product categories, making it extremely difficult for CISO (buyers) to manage procurement and evaluation processes.

    In this fireside chat, veteran security leader David Tsao will discuss the frustrations associated with identifying cybersecurity tools and services to boost cyber resilience and insurability and share lessons on the frameworks used to find, assess, pilot and contract with cybersecurity vendors.

  • July 19, 2022 11:30AM ET
    Using Customer Identity Solutions to Stand Up Against Security Attacks

    Customer Identity solutions are cornerstones of protecting our connected world, ensuring that only authorized users - employers, contractors, partners, and customers - can access the resources they need. Security attacks are on the rise and we analyze how and why these identity attacks are able to penetrate. Today we will share best practices around threat mitigation that we see on our platform.

  • July 19, 2022 12:00PM ET
    Lightening Round

    Join us for a security "shark tank" style session and hear how leading security firms are solving some of cybersecurity's biggest challenges. Each company will have 3 minutes on the virtual stage to tell their story.

  • July 19, 2022 12:15PM ET
    Break - Please Visit Expo Hall

    Visit the virtual expo hall to learn about innovative solutions to help solve some of your biggest security and compliance challenges. Visit booths, interact and earn points for a chance to win great prizes!

  • July 19, 2022 12:30PM ET
    Aligning Third-Party Risk & Cybersecurity

    Each day organizations face new threats that jeopardize their critical networks. Gaining visibility into the security risks your supply chain or third-party vendors pose to your organization is a growing priority among cybersecurity leaders. Next-generation cybersecurity practices will require organizations to align both internal and external cybersecurity risk processes to create a standardized process to facilitate effective third-party cyber risk mitigation.  Join this session to explore the intersection of third-party risk management and internal cybersecurity practices. We’ll review new strategies and outline the steps to mature your program. You will learn how to:

    • Map external third-party risk to internal cybersecurity controls
    • Evaluate control effectiveness against both internal and external risks
    • Prioritize cyber/third-party risk projects based on control gaps and domain inefficiencies
    • Build a united cybersecurity program that protects against internal and external threats
  • July 19, 2022 1:00PM ET
    What to Automate First in your SOC

    We often hear that the hardest part of automation is simply figuring where to start and how to know if you're doing it right. In this presentation we explore the Torq template library, showing how anyone can use these pre-built elements to start automating security tasks right away, using best practices by default.

  • July 19, 2022 1:30PM ET
    Don’t Wreck on Your Test Drive: Tips for Getting the Most Out of Your Next Proof of Value

    You get dozens of emails each week from vendors claiming to solve your problems—everything from threat detection to phishing prevention to hair loss, which if we’re honest, only happened because you started pulling it out over your log monitor solution. Vendors are knocking on your door every single day, but how do you know which ones are worth your time?

    Join this session with Mick Leach, Head of Security Operations at Abnormal Security, where he’ll provide you with tips for separating the contenders from the pretenders and give insight into how you can best evaluate new technologies on an even playing field. You’ll learn:

    • What your team needs to accomplish before you ever even speak to a vendor
    • How to best short-list solutions based on the problem you’re trying to solve
    • Why you need an exhaustive list of success criteria, even when you don’t want one
    • And how to most effectively test products during a proof of value

    Throughout the session, Mick will provide you with a blueprint on how to run a successful proof of value with your next cybersecurity vendor. With insights from his nearly two decades in evaluating cybersecurity solutions, this is a session you won't want to miss.

  • July 19, 2022 2:00PM ET
    Okta Demo: Auth0 Credential Guard

    Join this session to see how Auth0, a product unit within Okta, helps enterprises prevent account takeover attacks by detecting and resetting stolen passwords faster. Credential Guard upgrades Auth0’s existing breached password detection with a dedicated security team, and support for more than 35 languages and 200+ countries and territories to reduce breach detection time.

  • July 19, 2022 2:00PM ET
    Torq Demo: Automating Security Responses in Minutes

    In this Torq Demo we will show you how Torq's no-code solution can help you gain faster time to value to automate any part of your security response, incident handling, threat hunting, and vulnerability management.

  • July 19, 2022 2:20PM ET
    Abnormal Security Walk-through

    Join this session to see how how Abnormal's AI-based cloud email security platform protects the modern workforce against the full spectrum of attacks.

  • July 19, 2022 2:20PM ET
    Cybersecurity Program Management Demo

    Join this session to see how ProcessUnity’s Cybersecurity Program Management (CPM) can centrally manage an organization’s entire cybersecurity program with prepackaged mapped content, automated workflows, assessments and dynamic reporting. The solution enables the CISO to inventory and assess high-value assets; map them to threats, risks, policies and control standards; automate reviews; and capture evidence of compliance — all on a predefined schedule.

  • Networking and Expo

    Visit the virtual expo hall to learn about innovative solutions to help solve some of your biggest security and compliance challenges. Visit booths, interact and earn points for a chance to win great prizes!

Buying and selling into the lucrative cybersecurity marketplace can be a painful experience, on both sides.

Buyers are overwhelmed by vendor cold calls, unsolicited LinkedIn outreach, buzzword-overuse and confusing product descriptions. For sellers with high-quality products and innovative solutions, cutting through the noise and bringing clarity to the buying process can be quite a challenge.

In this SecurityWeek virtual summit, we will bring together a range of reputable buyers and sellers for a transparent discussion on the security technology procurement and decision-making process.

Practitioners, CISOs and vendors cleared by SecurityWeek editors will examine the intricacies of vendor identification and evaluation, budgeting, examining SLAs and T&Cs and managing the complex sales and procurement pipelines across industries.

This event is a must-attend for CISOs, security directors, security architects, threat hunters, incident response teams, and vendor relationship management specialists.

Presentations and Workshops will focus on:

  • Managing SLA’s and T&C’s
  • Managing the Vendor Journey - Cold Calls Through PoCs
  • Managing bake-offs, POCs and Demos
  • Procurement and Budgeting
  • People vs Tech: Figuring out the balance
  • Third Party Supply Chain and Attack Surface Reduction
  • Managing Analyst Relationships (Gartner, Forrester, etc.)

Event Details
  • Start Date
    July 19, 2022 11:00 am

  • End Date
    July 20, 2022 3:00 pm