top of page
Brought to you by:
KEYNOTE SPEAKER | LIVE HACKING
View A Live Hacking On Stage,
where you will see one of Nettitude's Lead Penetration Testers hack into a business's computer network and steal private data and information. Be prepared to be shocked and dismayed at how easy it is. Learn how to avoid being in a hacker's sight.
PCI Compliance – tips and tactics how to secure your payments, uphold your reputation, and stay ahead of the curve.
Registration, Networking Breakfast
Leah Freiman CEO, ItCon
talking about the cause and need of cybersecurity
Moshe Marc Gelbtuch CPA/CFF Roth&Co
Surviving a sophisticated cyber-crime; a personal account of how cyber criminals were able to hack his business bank accounts
Witness a live hacking as our Anonymous Hacker breaches the computer security of a representative small business. See for yourself how the threat of hacking is all too real, and all too simple for a professional hacker.
Mordy Fried CEO, Keystone Cyber Protection
Join Mordy in a friendly interactive workshop on cyber security.
A panel of CTOs CISOs of Corporate Environments discuss the techniques and strategies they use to keep their companies’ data and information safe and secure. They are at the frontline and know all too well how cyber-criminals threaten the very future of their companies.
Break Snack and Drinks will be served
Nathan Berger CEO, Digacore
Understanding why having an MSP is so important for your company and the risks and problems a company faces when they don't have one.
Joe Apfelbaum, MC
Welcome and Introductions
Learn how to have the mindset of a disrupter to dominate your industry. Use it to reveal the true potential of your company to be the leader everyone is chasing after.
Gourmet Lunch & Networking
Understanding the internal threats in your business. How to address them while at the same time making sure not to cross over the border of your employees personal privacy. Doing it right.
Break and Networking
Joe Apfelbaum CEO, AJAX Union
Closing Remarks and Raffle
Mike Semel CSO, Semel Consulting
Learn how as an executive you can side sweep expensive and embarressing cyber headaches. How to approach security and compliance as business problems with technical solutions.
Leah Freiman CEO, ItCon
You are the weakest link in your network – end user training. Learn how to make end users part of your security solution as opposed to only less of a problem. The bonus of Social Engineering and Data Aggregation to jumpstart your security program.
Understanding the true definition of leadership and what it entails including the importance of taking responsibility on everything in your company.
bottom of page