Welcome to Cyber Security X Chicago 2019

Now in its third year, Cyber Security X Chicago is the leading cyber security event in the Chicago region, providing the latest in information security from around the world, driven by the needs of the security community.

Cyber Security X Chicago opens for two days of technical trainings (September 23-24) followed by the two-day main conference (September 25-26) featuring top-level content, the expo hall & more. 

Why Attend?

Invaluable Cyber Security Insight
Cyber Security X Chicago offers invaluable security insight from some of the world's greatest speakers.  
It's all about you!
At Cyber Security X Chicago, we understand that everyone's needs are different. You can build your own personal seminar agenda. 
Gain CPE Credits
You are able to claim CPE credits by attending education sessions and workshops at Cyber Security X Chicago.
Join the community
Join the conversations - Cyber Security X Chicago brings together thousands of cyber security professionals allowing you to overcome security challenges.

Industry Insight

Odds of a Cyber Attack Compared
Odds of a Cyber Attack Compared

The rapid advancement of technology and growing capabilities of the internet has brought us to a much more sophisticated level across different areas: healthcare, business and even our own homes. We’re constantly connected through things like advanced cloud file storage at work to intelligent home assistants in our kitchens. One of the unfortunate trade-offs with our progress includes increased security risks. These connections give hackers more opportunities to invade our privacy and steal our information.

Are you prepared to defend your network?
Are you prepared to defend your network?
Just as employees expect to work in a physically safe space, they also expect that their digital work is taking place on a secure network. They want to feel that their hard work crunching company data will be protected from hackers seeking to steal or manipulate the information, and they want to be able to trust that the files they receive from their coworkers are safe. IS professionals are the knights tasked with protecting their companies’ digital realms from invaders to ensure a safe working community.
IAM and PIM Stop Hackers at the Gate
IAM and PIM Stop Hackers at the Gate

Identity and access management tends to be a balancing act for information technology professionals. They want their networks to be secure, but they don’t want to deal with complaints from fellow employees that it is cumbersome and too time-consuming to log on to a network. For example, frequently changed, hard-to-remember passwords might be a hindrance to workers, but they often are crucial for blocking hackers from accessing a network.

Good Insights From The (Almost) Bad Guys
Good Insights From The (Almost) Bad Guys

With more and more data stored online these days, hackers have plenty of reasons to attack company networks to modify or steal data and even hold it for ransom. Cybint Solutions , a cyber security and legal support organization, estimates that a cyber attack happens every 39 seconds. This means that companies and websites are being bombarded by malicious users. It’s easier for information security professionals to thwart these attacks when they are launched head-on from the outside. Unfortunately, more and more attacks are occurring on the inside through social engineering, which makes them harder to predict and prevent.