The logo for the empowered cyber resilience summit

Wednesday, October 30 | 9 AM - 6 PM CDT

Resilience Cyber Summit 2024: Defending Against Evolving Threats

Join top industry leaders and experts to strengthen your organization’s cyber resilience.

About the Resilience Cyber Summit

The Empowered Cyber Resilience Summit is designed to equip mid-market CIOs and CTOs with the knowledge and tools needed to tackle today’s evolving cyber threats. Through expert-led sessions, hands-on workshops, and networking opportunities, this event focuses on delivering actionable strategies for strengthening cybersecurity frameworks, mitigating risks, and building resilient organizations capable of thriving in a complex digital landscape.

Thought

LeadershipSpeakers

Workshops & Hands-On Learning

Panel Discussions

Networking Opportunities

Impactful sessions designed to strengthen your organization’s defenses.


Tracks at a Glance

TRACK 1

Emerging Technologies

Explore cutting-edge technologies like quantum computing, blockchain, and AI, and their impact on cybersecurity. Learn about practical steps to adapt to these innovations and protect your organization from future threats.

TRACK 2

Cyber Resilience

Focus on strategies for building strong defenses against cyberattacks, including incident response, Zero Trust Architecture, and AI-powered threat detection. Learn how to create a resilient infrastructure that can adapt to evolving security challenges.

TRACK 3

AI and Automation

Discover how AI and automation are revolutionizing cybersecurity, from AI-powered threat detection to securing AI models. Explore techniques to enhance security operations and streamline responses to emerging threats.

TRACK 4

Data Privacy

Dive into best practices for protecting sensitive data, including data encryption, privacy-enhancing technologies, and incident response planning. Learn how to create robust data privacy programs that comply with evolving regulations.

TRACK 5

Security Compliance

Understand the latest regulations and how to implement comprehensive compliance programs. Learn about governance frameworks, incident response, and leveraging technology to meet regulatory requirements in cybersecurity.

TRACK 6

Cloud Security

Explore the challenges and solutions for securing cloud environments, from Zero Trust Architecture to data protection and encryption strategies. Learn how to maintain visibility, compliance, and security in complex multi-cloud infrastructures.

Agenda

A white background with a few lines on it

Explore a comprehensive agenda that addresses the challenges most critical to technology & service provider professionals. There are 6 tracks to help you deliver on what matters most to you and your organization.

  • Track 1: Emerging Technologies

    Wednesday, March 20, 2024 / 09:00 AM - 09:45 AM CDT


    Preparing for the Quantum Era

    Speaker 1, Speaker 2


    Overview of quantum computing threats to current cryptography NIST's standardization efforts for post-quantum algorithms Practical steps for organizations to achieve crypto-agility


    __________________________________________


    Wednesday, March 20, 2024 / 09:00 AM - 09:45 AM CDT


    Blockchain and Distributed Ledger Technologies in Cybersecurity

    Speaker 1, Speaker 2


    Exploring innovative applications of blockchain for enhancing cyber resilience Case studies on using blockchain for secure supply chain management and identity verification


    __________________________________________



    Wednesday, March 20, 2024 / 09:00 AM - 09:45 AM CDT


    Improve the Execution of Your Evolving Sales Strategy

    Speaker 1, Speaker 2


    Chief sales officers (CSOs) face persistent uncertainty that is disrupted by unplanned market events, shifts in buyer behavior and rapid advancements in artificial intelligence. Successful CSOs are proactive in claiming leadership within the C-suite, refining their sales strategy and aligning commercial.


    __________________________________________



    Wednesday, March 20, 2024 / 09:00 AM - 09:45 AM CDT


    Measure and Realize Value from AI Investments: Impactful Stories

    Speaker 1, Speaker 2


    The potential of artificial intelligence (AI) to deliver value and transform their organizations. This quest will continue nonstop for the foreseeable future. Knowing how to measure impact and how it drives value in your organization is critical to stay ahead. How do you evaluate AI’s value?

  • Track 2: Cyber Resilience

    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    The Future of Identity Protection

    Speaker 1, Speaker 2


    The Future of Identity Protection


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    Building a Comprehensive Incident Response Plan

    Speaker


    Explore best practices for developing an effective incident response plan. Learn how to detect, contain, and manage cyber incidents swiftly. This session covers team roles, communication protocols, and recovery procedures to minimize damage and downtime during a cyberattack.


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Implementing Zero Trust Architecture

    Speaker 1, Speaker 2


    Dive into the principles of zero trust security and its role in cyber resilience. Discover strategies for implementing microsegmentation, continuous authentication, and least privilege access. Learn how to protect your organization's assets in today's distributed work environments.


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    AI-Powered Threat Detection and Response

    Speaker 1, Speaker 2


    Explore the latest advancements in AI and machine learning for cybersecurity. Learn how these technologies enhance threat detection, automate response processes, and improve overall security posture. Discuss real-world applications and potential challenges in implementation.


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Cloud Security Posture Management

    Speaker 1, Speaker 2


    Understand the unique challenges of securing multi-cloud environments. Learn strategies for maintaining visibility, ensuring compliance, and managing security across diverse cloud platforms. Explore tools and best practices for continuous monitoring and risk assessment in the cloud.


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Cybersecurity Risk Management and Governance

    Speaker 1, Speaker 2


    Develop a framework for effective cybersecurity risk management. Learn how to assess, prioritize, and mitigate risks across your organization. Explore strategies for engaging leadership, aligning security with business objectives, and fostering a culture of cyber resilience.

  • Track 3: AI and Automation

    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    AI-Powered Threat Detection and Response

    Speaker 1, Speaker 2


    Explore cutting-edge AI algorithms for proactive threat identification and automated incident response. Learn how machine learning enhances pattern recognition in vast datasets, enabling early detection of subtle indicators of compromise. Discover strategies for implementing AI-driven security tools to augment your SOC team's capabilities and streamline threat mitigation processes.


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    Securing AI Models: Protecting Against Data Poisoning

    Speaker 1, Speaker 2


    Dive into the critical challenge of safeguarding AI models from training data manipulation. Understand the risks of model poisoning and its potential impact on system behavior and output reliability. Explore best practices for data validation, integrity checks, and secure data pipelines to ensure the trustworthiness of AI model training and decision-making processes.


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Ethical AI Hacking: Strengthening Defenses Through Adversarial Testing

    Speaker 1, Speaker 2


    Learn how to leverage ethical hacking techniques specifically tailored for AI systems. Discover methods for simulating adversarial attacks to uncover vulnerabilities in your AI infrastructure. Explore the use of machine learning in automating risk detection and staying ahead of evolving AI-specific threats.


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Building Resilient AI Systems: Incident Response and Recovery Strategies

    Speaker 1, Speaker 2


    Develop a comprehensive incident response plan tailored to AI-specific risks. Learn techniques for rapid containment and isolation of compromised AI systems. Explore strategies for maintaining business continuity during AI-related security incidents and discuss best practices for system recovery and lessons learned integration.

  • Track 4: Data Privacy

    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    Building a Comprehensive Data Privacy Compliance Program

    Speaker 1, Speaker 2


    Explore key components of an effective data privacy compliance strategy. Learn how to create a high-level set of principles and documentation that outlines measures for handling personal data in accordance with applicable laws. Discover the importance of assigning subject matter experts, inventorying personally identifiable information, and establishing robust data protection policies and procedures


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    Implementing Data Encryption and Access Controls

    Speaker 1, Speaker 2


    Dive into essential data protection techniques, focusing on encryption and access controls. Understand how to implement strong encryption methods for data at rest and in transit. Learn about stringent access control mechanisms, including two-factor authentication and role-based access control, to ensure only authorized individuals can access sensitive data


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Data Minimization and Privacy-Enhancing Technologies

    Speaker 1, Speaker 2


    Explore strategies for data minimization to reduce privacy risks. Learn techniques for limiting data collection to necessary and relevant information. Discover privacy-enhancing technologies like data masking and anonymization. Understand how these approaches can help organizations comply with data protection regulations while maintaining data utility for business purposes


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Developing a Robust Incident Response Plan

    Speaker 1, Speaker 2


    Learn how to create an effective data breach response plan and escalation process. Understand the importance of training employees responsible for breach response. Explore strategies for implementing and documenting corrective actions as proactive preventive measures against repeat incidents. Discover best practices for detecting, investigating, and notifying individuals and authorities during a data breach


    __________________________________________



    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Employee Training and Fostering a Culture of Data Privacy

    Speaker 1, Speaker 2


    Understand the critical role of employee education in maintaining data privacy. Learn how to develop and implement comprehensive training programs that cover data privacy policies, procedures, and best practices. Explore strategies for raising awareness about potential security threats and empowering employees to become the first line of defense against data breaches

  • Track 5: Security Compliance

    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    Building a Comprehensive Data Privacy Compliance Program

    Speaker 1, Speaker 2


    Explore key components of an effective data privacy compliance strategy. Learn how to develop a high-level set of principles and documentation outlining measures for handling personal data in accordance with applicable laws. Discover the importance of assigning subject matter experts, inventorying personally identifiable information, and establishing robust data protection policies and procedures.


    __________________________________________


    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    Implementing Cybersecurity Governance Frameworks

    Speaker 1, Speaker 2


    Dive into the essentials of cybersecurity governance, including establishing decision-making hierarchies, accountability frameworks, and risk management strategies. Learn how to align cybersecurity initiatives with broader business goals, develop effective policies, and ensure compliance with relevant regulations and standards like GDPR, HIPAA, and NIST frameworks.


    __________________________________________


    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Navigating Regulatory Compliance in 2024

    Speaker 1


    Explore the latest cybersecurity regulations, including the SEC's new disclosure requirements and the EU's Cyber Resilience Act. Understand the implications of these regulations for your organization and learn strategies for maintaining compliance while balancing security needs with operational efficiency.


    __________________________________________


    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Developing Effective Incident Response and Breach Notification Strategies

    Speaker 1


    Learn how to create a robust incident response plan and breach notification process. Understand the legal requirements for timely disclosure of cybersecurity incidents and explore strategies for mitigating the impact of breaches. Discover best practices for training employees responsible for breach response and implementing corrective actions.


    __________________________________________


    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Leveraging Technology for Compliance Management

    Speaker 1


    Explore how to utilize technology solutions to streamline compliance processes and enhance security. Learn about automation tools for generating compliance reports, centralizing updates from regulatory frameworks, and managing multiple compliance requirements efficiently. Discover strategies for integrating compliance management into your overall cybersecurity infrastructures

  • Track 6: Cloud Security

    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    Implementing Zero Trust Architecture in the Cloud

    Speaker


    Explore the principles of Zero Trust security and how to apply them in cloud environments. Learn strategies for continuous authentication, microsegmentation, and least privilege access. Discover tools and best practices for implementing Zero Trust across multi-cloud and hybrid infrastructures to enhance your overall security posture and protect against evolving threats.


    __________________________________________


    Wednesday, March 20, 2024 / 10:30 AM - 11:00 AM CDT


    AI-Powered Threat Detection and Response

    Speaker


    Dive into the latest advancements in AI and machine learning for cloud security. Understand how these technologies can enhance threat detection, automate response processes, and improve overall security posture. Explore real-world applications of AI in identifying anomalies, predicting potential threats, and streamlining incident response in complex cloud environments.


    __________________________________________


    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Cloud Security Posture Management (CSPM)

    Speaker


    Learn how to maintain visibility and control across multi-cloud environments using CSPM tools and strategies. Discover techniques for continuous monitoring, automated remediation of misconfigurations, and ensuring compliance with security standards. Explore best practices for implementing CSPM to reduce the risk of data breaches and improve overall cloud security governance.

    Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.


    __________________________________________


    Wednesday, March 20, 2024 / 10:30 AM - 11:15 AM CDT


    Cloud Data Protection and Encryption Strategies

    Speaker


    Discover comprehensive approaches to protecting sensitive data in the cloud. Learn about encryption techniques for data at rest and in transit, key management best practices, and data loss prevention strategies. Explore technologies like confidential computing and homomorphic encryption that enable secure data processing in the cloud while maintaining privacy and compliance.

Speakers

A white background with a few lines on it

Get unparalleled, unbiased guidance on emerging technologies, market insights and more at Empowered Cyber Resilience Summit 2024 in Dallas, TX.

Featured Experts

Meet the industry leaders and cybersecurity experts sharing their insights at the summit.

A circle with a person 's face in it on a white background.

First Last

Award Winning Filmmaker, Director, Former Lead Storyteller and Animator at Pixar Studios

A circle with a person 's face in it on a white background.

First Last

Award Winning Filmmaker, Director, Former Lead Storyteller and Animator at Pixar Studios

A circle with a person 's face in it on a white background.

First Last

Award Winning Filmmaker, Director, Former Lead Storyteller and Animator at Pixar Studios

A circle with a person 's face in it on a white background.

First Last

Award Winning Filmmaker, Director, Former Lead Storyteller and Animator at Pixar Studios

Venue

A white background with a few lines on it

Get unparalleled, unbiased guidance on emerging technologies, market insights and more at Empowered Cyber Resilience Summit 2024 in Dallas, TX.

Accommodations


Booking Your Hotel Reservation


You’ll need to register for the conference before you can book your room. To make your reservation, simply sign into your registration profile and select “Book Hotel.” If you haven’t completed your profile, you may be asked to answer a few brief questions before you can make your reservation.

Venue

A large hotel with a swimming pool in front of it.

Hyatt Regency Frisco - Dallas

2615 Preston Road Frisco, Texas, 75034

Registration

A white background with a few lines on it

Join your technology and service provider peers at Empowered Cyber Resilience Summit 2024 in Dallas, TX.

Two ways to register:

A black and white drawing of an envelope on a white background.

events@collectivemarketing.io

A black and white arrow pointing to the right on a white background.

Pricing:

Standard price: $58.73 – $250


For more information, email events@collectivemarketing.io

Sponsorship Opportunities

A white background with a few lines on it

Join your fellow technology and service provider peers as attendees at Empowered Cyber Resilience Summit 2024, in Dallas, TX.

Elevate your brand and connect with key decision-makers in cybersecurity. Showcase your solutions to industry leaders at the Empowered Cyber Resilience Summit—become a sponsor today and drive business growth!

Interested in Sponsorship opportunities?

Ready to Strengthen Your Cyber Resilience?

Register for the Empowered Cyber Resilience Summit and Take the Next Step in Protecting Your Organization

Share by: