The CyberSecurity International Symposium Conference-2017

According to the British insurance company Lloyd's, cyber attacks cost businesses as much as $400 billion each year, which includes direct damage plus post-attack disruption to the normal course of business. Research firm Cybersecurity Ventures estimates that the global cost of cybercrime will grow from $3 trillion in 2015 to $6 trillion by 2021, which includes damage and destruction of data, stolen money, lost property, intellectual property theft, and other areas. As Ginni Rometty, IBM Corp.'s Chairman, President and CEO recently observed, "Cyber crime is the greatest threat to every profession, every industry, every company in the world." *


The CyberSecurity International Symposium, July 10-11, 2017 in Chicago is a unique, focused Forum in which to network with leading cybersecurity professionals, innovators, enterprise CIOs and regulators who are on the front lines of securing critical business and infrastructure networks. The two-day, in-depth conference will examine the latest technologies for enhancing cybersecurity and reducing risk, as well as best practices and key lessons learned to date in the ever-evolving challenge to ensure end-to-end security for organizations of all varieties. Topics to be addressed include:

  • Evolution of cybersecurity threat: recent developments and trends
  • Impact of cyber threat on businesses, government, and critical infrastructure
  • Latest advances in cyber security technologies
  • Implementation best practices and lessons learned
  • Intersection of cyber and physical infrastructure security
  • Assessing and monitoring risk effectively
  • Effectively managing security incidents
  • Key take-aways from recent cyber incidents
  • Internet of Things (IoT) security implications across industries
  • Current state of cybersecurity standards development
  • Developing, coordinating, and implementing critical infrastructure policies
  • Consequence-driven, Cyber-informed Engineering
  • Situational awareness, common vulnerability analysis, and threat assessment
  • Upgrading technology to meet evolving risks
  • Building a culture of security
  • Rapidly sharing threat, vulnerabilities, and mitigation strategies
  • Securing the evolving distribution network

IT advances, communications technologies, and the smart energy grid are changing the landscape of the nation’s critical infrastrucutre and business networks as we know it. But with rapidly changing technology comes rapidly advancing threats. This international Symposium will examine recent and newly emerging threats and vulnerabilities, as well as discuss effective business and technology strategies for meeting the evolving challenge head on. Join us in Chicago to assess your organization’s cyber and physical security risk, and how to effectively safeguard your operations going forward.

Dates and Places: July 10-11, 2017 in Chicago

New Strategies for New Networks: As networks evolve and more end points connect with critical systems, organizations must understand the business and operational risks of the evolving landscape, in order to plan and set policy accordingly

Network with Leaders: The Symposium brings together the most authoritative experts and enterprise IT pratitioners to discuss very latest cyber aecurity innovations and applications for commercial and industrial organizations

Case Studies and Lessons Learned: Through a series of in-depth presentations and panel discussions, the two-day event will look at key cyber and physical security case studies and their implications for today’s business

Objective & Authoritative: The Symposium agenda is driven by practitioners and executives at a range of end user organizations and enterprises — learn directly from peers and thought leaders who are dealing with security on a daily basis

Who Should Attend?

  • Commercial and industrial enterprise IT executives and security compliance managers
  • Regulatory and policy professionals
  • Chief Information Officers, Chief Strategy Officers, and other senior executives overseeing cyber and physical security
  • Communications and network operations professionals
  • Physical infrastructure and systems security managers
  • Planners responsible for compliance and government
  • Analytics and data management professionals
  • Data center managers
  • Critical infrastructure security managers
  • Reasearch and academic professionals
  • Finance and VC representatives