After two fantastic and exciting years in Chicago and our first ever event in Atlanta late last year, our US Cyber Security event series will be using 2019 as an investment and R&D year.  The teams at Cyber Security Chicago and Cyber Security Atlanta will spend this time in deep research mode, analysing the changing market and consulting with cyber security teams, analysts, vendors and researchers across the USA with a roadmap of launching an evolved proposition in 2020.

The world of cyber security is changing at an ever faster rate and there is no doubt that securing our new hyper connected world whilst supporting privacy/compliance is increasing in both its complexity and importance. With this in mind, we want to invest more resources in to developing a next generation event, built from the ground up to support businesses in this sensational new world.

As part of our research, we’ll be working with our speakers, visitors, partners and exhibitors to build the perfect event experience and would love to hear from you if you want to become part of our steering committee. In the meantime, we will be producing a monthly newsletter to keep you up to date on latest industry developments and the details of our future shows.

We’ll be back soon.

The Cyber Security Team

Click here to subscribe to our newsletter 

Why Attend?

Invaluable Cyber Security Insight
Cyber Security X Chicago offers invaluable security insight from some of the world's greatest speakers.  
It's all about you!
At Cyber Security X Chicago, we understand that everyone's needs are different. You can build your own personal seminar agenda. 
Gain CPE Credits
You are able to claim CPE credits by attending education sessions and workshops at Cyber Security X Chicago.
Join the community
Join the conversations - Cyber Security X Chicago brings together thousands of cyber security professionals allowing you to overcome security challenges.

Industry Insight

Odds of a Cyber Attack Compared
Odds of a Cyber Attack Compared

The rapid advancement of technology and growing capabilities of the internet has brought us to a much more sophisticated level across different areas: healthcare, business and even our own homes. We’re constantly connected through things like advanced cloud file storage at work to intelligent home assistants in our kitchens. One of the unfortunate trade-offs with our progress includes increased security risks. These connections give hackers more opportunities to invade our privacy and steal our information.

Are you prepared to defend your network?
Are you prepared to defend your network?
Just as employees expect to work in a physically safe space, they also expect that their digital work is taking place on a secure network. They want to feel that their hard work crunching company data will be protected from hackers seeking to steal or manipulate the information, and they want to be able to trust that the files they receive from their coworkers are safe. IS professionals are the knights tasked with protecting their companies’ digital realms from invaders to ensure a safe working community.
IAM and PIM Stop Hackers at the Gate
IAM and PIM Stop Hackers at the Gate

Identity and access management tends to be a balancing act for information technology professionals. They want their networks to be secure, but they don’t want to deal with complaints from fellow employees that it is cumbersome and too time-consuming to log on to a network. For example, frequently changed, hard-to-remember passwords might be a hindrance to workers, but they often are crucial for blocking hackers from accessing a network.

Good Insights From The (Almost) Bad Guys
Good Insights From The (Almost) Bad Guys

With more and more data stored online these days, hackers have plenty of reasons to attack company networks to modify or steal data and even hold it for ransom. Cybint Solutions , a cyber security and legal support organization, estimates that a cyber attack happens every 39 seconds. This means that companies and websites are being bombarded by malicious users. It’s easier for information security professionals to thwart these attacks when they are launched head-on from the outside. Unfortunately, more and more attacks are occurring on the inside through social engineering, which makes them harder to predict and prevent.