Technology 6 min read

Cyber Security Chicago: Agendas, Schedules, and other Details

TierneyMJ /

TierneyMJ /

Today marks the beginning of the 2-day tech event that will bring together some of the greatest minds in cyber defense: the Cyber Security Chicago.

Cyber Security Chicago will offer invaluable security insights beneficial to both IT managers and security specialists.

Hear from some of the most excellent cyber security experts today on how you can strengthen your cyber defense against cyber attacks. It would also cover essential details on how you can recover in case your system has been breached or compromised.

The event will also cover essential details on how you can recover in case your system has been breached or compromised.

Furthermore, Cyber Security Chicago will enable you to gain access to a vast library of knowledge on how you could help protect your employees, organization, and country from cyber terrorism and cyber gangs lurking on the Internet.

This once in a lifetime event will give you and all the attendees the opportunity to network and collaborate with the greatest IT security visionaries and practitioners that are continuously changing the face of cybersecurity today.

#CyberSecurityChicago is kicking off today! @kevinmitnick will be there!Click To Tweet

The Cyber Security Chicago will run for two days starting today, October 18th. The event will be held at the McCormick Place in Chicago and is sponsored by Verisign, BeyondTrust, Cisco Umbrella, IBM Securities, and many more.

This event is organized by Imago Techmedia Event.

Cyber Security Chicago: Speakers

The Cyber Security Chicago has invited some of the best threat and cyber defense experts in the industry to share their knowledge and insight about the current state of our internet security. The organizers already announced the names of over 70 speakers that will join the conference. One of the keynote speakers is Kevin Mitnick, CEO of the Las Vegas-based online security firm, Mitnick Security Consulting.

Kevin Mitnick is a speaker at the Cyber Security Chicago
Kevin Mitnick | Mitnick Security Consulting |

According to his company profile, Mitnick is a famous hacker, author, and top cyber security speaker. Before going white hat, he was included in FBI’s Most Wanted list for hacking into 40 major corporations just for the challenge. However, Mitnick’s joined the good guys and is now a trusted security consultant to the Fortune 500 and governments worldwide.

“Kevin mentors leaders, executives, and staff on both the theory and practice of social engineering, topics on which he is the leading global authority. Kevin also helps consumers—from students to retirees— learn how to protect their information and themselves from harm.” ~ Mitnick Security

Aside from Mitnick, other notable speakers for the Cyber Security Chicago include:

  • Christopher Hadnagy, Chief Human Hacker, Social Engineering Inc.
  • Daniel Wierzbicki, Supervisory Special Agent, Criminal & National Security Cyber Investigation, FBI Chicago Division
  • Sachin Gupta, Principal Cybersecurity Evangelist & Field CTO, Enterprise Cybersecurity Group, Microsoft
  • Keith Smith, VP of Threat Intelligence, Root9B
  • Nicole Eagan, CEO, Darktrace
  • Ed Cabrera, Chief Cybersecurity Officer, Trend Micro
  • Aamir Lakhani, Senior Security Strategy, Fortinet
  • Adam Lewis, Security Lead, Office of the CTO, Motorola Solutions
  • Adrienne McEwan, Cloud Security CSE, Cisco
  • Alex Mathews, Lead Security Evangelist, EMEA Positive Technologies
  • Anders Norremo, CEO, ThirdPartyTrust
  • Andy Ellis, Chief Security Officer, Akamai Technologies
  • Bill Mann, SVP Products/ Chief Product Officer, Centrify Corporation
  • Blake Angove, Director, Technology Services, LaSalle Network
  • Bob Timpany, Chief of Idaho Operations, NCCIC-ICS-CERT, U.S. Department of Homeland Security
  • Bradley Philp, Principal Sales Engineer, Forcepoint CASB
  • Chandler Howell, Director of Engineering Services, Nexum Inc.

For the full list of speakers, go here.

Cyber Security Chicago: Agenda

October 18th

  • Breakfast
  • THE ART OF DECEPTION: How Hackers and Con Artists Manipulate You and What You Can Do About It
  • The State of Internet Security – And Steps to a Safer Future
  • Next-Gen Application Security
  • Six Steps to Secure Access for Privileged Insiders and Vendors
  • The Hidden Threats of Weak IoT Security Within the Enterprise
  • The New Era of Cyber-Threats: The Shift to Self-Learning, Self-Defending Networks
  • Insider Threats
  • No Silver Bullets – Cybersecurity in the Cognitive Era
  • The Future of Authentication with FIDO
  • The Way we Work has Changed. Has Your Security?
  • M2M: Machine Learning and the War Against the Machines
  • IoT and the Physically Dangerous
  • PANEL: The Future of Cyber Security
  • The #1 Threat: Weak or Stolen Credentials – Analyzing and Combating the Risk
  • Cloud, AI, Big Data… OH MY! How the Growing Scale of Systems is Changing the Game
  • Intelligent Security and Deep Visibility with Meraki
  • Layers of Security is Expensive and Isn’t Reliable – So How Can Automated Endpoint Response be the Answer?
  • Cyber Security Awareness: Don’t Become Another Statistic
  • How to Simplify Identity for Your Employees, Contractors, Partners, and Customers
  • The Internet of (Too Many) Connected Things
  • To Pay or Not to Pay, That Should Never Be the Question
  • HUNT: Securing the Commercial Sector Since 2013
  • Adaptive Pentesting & Domain Trust Exploitation
  • Overhauling Your Recruiting and Retention Strategy For Cyber Security

October 19th

  • Breakfast
  • Welcome Address
  • Confessions of a Hacker
  • Machine Learning’s Effect on Cybersecurity
  • How to Avoid Another Equifax-like Data Breach – OSS Management in Your DevOps Process
  • How to Keep a Productive Pace with the Risk in Your Cloud
  • Understanding and Evaluating IoT in Today’s Organization
  • Managing Privilege Risks
  • 7 Steps to Building a SOC with Limited Resources
  • Hack the Planet… For Real This Time
  • Data Segregation, End-to-End Encryption and Blockchain Enabled Chains of Custody: Protecting High Value Data in the Cloud
  • The Way we Work has Changed. Has Your Security?
  • M2M: Machine Learning and the War Against the Machines
  • Why Hackers Still Get In
  • PANEL: The Future of Identity and Access Management
  • The Future of Cyber Technologies, App&Sec, and DevOps: Importance of Application Security in DevOps
  • Brought to You by Check Point
  • Hacking Everything – The Dark Side of the Internet of Things
  • PANEL: The Path From DevOps to DevSecOps

For the full agenda, go here.

Will you be attending the Cyber Security Chicago? How secure is your current Internet network? Let us know your thoughts in the comment section below!

First AI Web Content Optimization Platform Just for Writers

Found this article interesting?

Let Rechelle Ann Fuertes know how much you appreciate this article by clicking the heart icon and by sharing this article on social media.

Profile Image

Rechelle Ann Fuertes

Rechelle is the current Managing Editor of Edgy. She's an experienced SEO content writer, researcher, social media manager, and visual artist. She enjoys traveling and spending time anywhere near the sea with her family and friends.

Comments (0)
Most Recent most recent
share Scroll to top

Link Copied Successfully

Sign in

Sign in to access your personalized homepage, follow authors and topics you love, and clap for stories that matter to you.

Sign in with Google Sign in with Facebook

By using our site you agree to our privacy policy.