Cyber Security Summit - The Teneo Group
The Teneo Group

Cyber Security Summit

August 13 – Mt. Laurel – 10:00 AM to 4:00 PM

Protecting your environment from cybersecurity threats.

You are invited to a full day of learning about today’s evolving cybersecurity challenges and the innovative strategies needed to mitigate them. 

Register


          .   

Theresa MisuracaSenior Cyber Threat Intelligence Analyst, NJCCIC, NJOHSP

Keynote Speaker.

Theresa Misuraca is a Senior Cyber Threat Intelligence Analyst with the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) for the New Jersey Office of Homeland Security and Preparedness (NJOHSP).

She is primarily responsible for creating and publishing high quality intelligence and analysis products and reports, providing awareness and education on the cyber threat landscape and cybersecurity best practices, and providing incident response support.

Aaron RoseCybersecurity Evangelist, Office of the CTO & Security Architecture Leader at Check Point

As a subject matter expert in Artificial Intelligence and Application security, Aaron has dedicated his career to securing organizations and their resources beyond the traditional network firewall.

Passionate about making cybersecurity education accessible to all, Aaron actively engages as a guest lecturer, mentors students, and assists in the development of cybersecurity courses.

Nadav ArbelCo-Founder and CEO, CYREBRO

Tom WebsterAI Security Evangelist, Liminal.AI

The era of generative AI is here. Widespread accessibility, coupled with game-changing productivity benefits means employees are using this powerful technology at work whether we want them to or not. In this session, attendees will learn about the key challenges organizations face with the rapid proliferation of generative AI, explore the importance of adopting a strategy that satisfies both security teams and end users, and hear perspectives on effectively harnessing generative AI safely, securely, and cost-effectively.

 

Rami GammohEmail Security - Check Point Software Technologies

As more and more organizations move their email platforms to the Cloud (O365 & Gmail) there has been a substantial increase in phishing attacks, malicious threats, and data loss.

Protect your cloud email against all zero-day threats, compromised QR codes, and malicious attachments. Extend this protection to collaboration suites – malware, malicious file protection and data loss prevention for SharePoint, Teams, OneDrive, Google Workspace, Slack, etc.

Deep dive into Check Point Harmony’s latest:

Patented API technology  |  DMARC  |  Security Awareness

Jason GarayCybersecurity Advisor - Cybersecurity and Infrastructure Security Agency (CISA)

Cybersecurity Best Practices: Guidance on how to protect networks, systems, and data from cyber threats.

Threat Intelligence: Sharing information about current cyber threats, including new malware, hacking techniques, and vulnerabilities.

Incident Response: Strategies and protocols for responding to cyber incidents, including how to mitigate and recover from attacks.

Regulatory Compliance: Information on compliance with cybersecurity regulations and standards.

Training and Awareness: Programs aimed at increasing cybersecurity awareness and training for both public and private sector employees.

Round Table Peer Discussion

Hear from cybersecurity peers as they discuss some of their current projects and most enlightening solutions to them.

Bring your questions!

Demo Days

BYOD for a hands on session with some of the latest cybersecurity tools.

Attendees must bring their own laptop and power cord. Or join our sponsors to have a walk through of their latest demo environments.

 

AGENDA

9:30 – Registration

10:00 – Program Begins

Lunch

Roundtable

Hands on Demo Days (BYOD)

4:00 – Wrap up

Location:

Westin Mt. Laurel

555 FELLOWSHIP ROAD

MOUNT LAUREL, NEW JERSEY, 08054

 

REGISTER NOW

 

We'll spot-check your infrastructure with a Complimentary Security Checkup

Register Now