Cybersecurity: Get ready for the unpredictable
Create a sound cybersecurity strategy based on the right technology & budgetary insights,
proven practices, and processes for SMEs.

Most companies take nearly 6 months to detect a data breach, even major ones.

An estimated value of a single cybersecurity breach is $3,62 million.

60% of small and midsize businesses close within 6 months after the breach.

There is 67% increase in security breaches in the last 5 years.
“95% of cybersecurity breaches are due to human error.”
Small and medium enterprises need to get ready for the unpredictable. Cybersecurity approaches used so far are not working anymore, and pressures keep rising.
- What activities to outsource and to what particular specialists?
Join us at this must-attend virtual event:
Cybersecurity: Get ready for the unpredictable
Qubit Conference
New York | 21
May 5 - 6, 2021
This virtual event will equip CxOs and cybersecurity teams with the right intel to create a sound cybersecurity strategy based on the right technology & budgetary insights, proven practices, and processes specially tailored for SMEs.
Find out how to bring the smart design of cybersecurity architecture and processes, what to automate & how to properly set up internal and external ownership.
Join the most crucial cybersecurity discussion for SMEs through:
Qubit Conference New York 2021 Agenda
Your proven cybersecurity framework
10:00 - 10:05 AM EST - Opening
10:05 - 10:15 AM EST - Keynote: FBI agent Peter Casson

Peter A. Casson
FBI Supervisory Special Agent – National Security Computer Intrusions
10:15 - 10:25 AM EST - Opening keynote

Kelvin Coleman
CEO/Executive Director at National Cyber Security Alliance (NCSA
10:25 - 11:10 AM EST- Cybersecurity for CxOs: 4 things your board needs to know about cyber risk & being compromised
Cybersecurity teams have owned too much “security pain” in the past. A clear grasp of risk assessment, risk ownership, and risk transfer helps CxOs get to the right business & budgetary decisions.

Marianna Belyavskiy
Senior Vice President, Operational Risk Management at Citibank

Howard Israel
Virtual CISO at Mandiant, FireEye
11:10 - 11:25 AM EST - Keynote: How AI Augments Humans: Closing Skills Gaps & Driving Executive Decisions with Cyber AI

Marcus Fowler
Director of Strategic Threat at Darktrace
When it comes to securing today’s dynamic workforce, demand eclipses supply for skills & expertise. Moreover, board level executives are grappling with the ongoing challenge of translating technical insights into meaningful decision-making, having to strike the perfect balance between mitigating technical risks and accelerating digital transformation, all while maintaining a high level of innovation.
Discover:
- how automation reduces time to triage by up to 92%
- how AI-driven insights build communication between security experts & executives
- how human augmentation with AI secures dynamic workforce & facilitates digital acceleration
- how AI automated an entire investigation into the sophisticated LeChiffre ransomware
11:25 - 12:10 AM EST - Cybersecurity: #1 business priority
How to make cybersecurity a #1 business priority and avoid the risks from the supply chain ecosystem and its vast complexity?

Marcus Fowler
Director of Strategic Threat at Darktrace

Roota Almeida
CISO at Delta Dental of New Jersey and Connecticut

Joseph Tso
Chief Information Security Officer at Scotia bank
12:10 - 12:15 PM EST - Break
12:15 - 1:00 PM EST - The cybersecurity resiliency & strategy framework: How to identify, detect, protect, respond, recover?
The proven cybersecurity strategy fit for your environment can go a long way. Know what to do in-house, what to outsource, set up your budgets right, and get help from the right cybersecurity specialists.

Etay Maor
Senior Director Security Strategy at CATO NETWORKS

Farid Abdelkader
Managing Director IT Audit & Cybersecurity at Protiviti

Steve Vandenberg
Global Black Belt at Microsoft

Ulf Mattsson
Chief Security Strategist at Protegrity
1:00 - 1:45 PM EST - Your business has been breached. Here is your step-by-step playbook on what to do next
Here is a step-by-step guide on how to contain, eradicate and recover from a cyberattack. And a quick action list on how to prepare for future breaches.

Jennifer Gold
Vice President at NY Metro InfraGard

Nick Pelletier
Director, Incident Response at Mandiant, FireEye
1:45 - 2:35 PM EST - Cyber extortion and ransomware: How to confront this challenge?
Ransomware attacks against businesses in 2021 will happen every 11 seconds. This step-by-step guide will help you prepare for such an event based on attacks we have seen so far.

Michelle A. Schaap
Member of Chiesa Shahinian & Giantomasi PC

Ondrej Krehel
CEO, Founder/ Digital forensics lead at LIFARS

Michael Antico
CISO at Clear
People, processes & technology framework
10:00 - 10:15 AM EST - Opening keynote

Caleb Barlow
President and CEO at Cynergistek
10:15 - 11:00 AM EST - Creating a cybersecurity-centric culture
A guideline that will help you inject cybersecurity into your company’s processes and get you ready for the unpredictable.

Jennifer Gold
Vice President at NY Metro InfraGard
11:00 - 11:15 AM EST - Keynote: Cybersecurity – Educating the Enterprise

Jeff Schmidt
CEO at Avertium
Companies that check the box for cybersecurity, security or compliance are unaware or purposefully disregard that the adversary is always moving, shifting and working on a new angle to get through. Proactively changing conversation around cybersecurity will be a driver in demystifying the concepts and making an impact within your organizations and communities.
11:15 - 12:05 PM EST- Modern CISO: Challenges and competences in the remote age
A set of competencies required from your CISO in 2021: World has shifted towards remote work. Rethink the role of your CISO to gain an advantage over exponentially growing threats.

Joseph Tso
Chief Information Security Officer at Scotiabank US

Preetam Sirur
Director Information Security at Vitech
12:05 - 12:10 PM EST - Break
12:10 - 12:55 PM EST - Cyber resilience playbooks
Five strategies that will help you improve your company’s cybersecurity posture and preparedness for incidents.

Tom Brennan
Chairman of CREST USA & CIO at Mandelbaum Salsburg

Serge Suponitskiy
Chief Information Officer at Brosnan Risk Consultants

Paul Vixie
Chairman, CEO and Cofounder at Farsight Security
12:55 - 1:40 PM EST - Think outside the box: ethical hacking, red teaming, application security & cyberattacks simulations
You have deployed the best technology for your mission, you have the right processes in place, and your employees are trained. Ethical hacking and red teaming will tell you how strong your approach really is.

Steve Tran
Chief Information Security Officer at Metro Goldwyn Mayer Studios

Diana Kelley
Co-Founder and CTO at SecurityCurve

Brice Daniels
Director, NE Proactive Services at Mandiant, FireEye
1:40 - 2:10 PM EST - Closing keynote: Inconvenient Necessity: Managing Cyber Risk in Integrated Technology Solutions
We are starting to see deployment of technology that will integrate technology that includes drones, AI, blockchain, smart contracts, and IoT. Each of these innovations presents cyber risks that are an inconvenient necessity that run alongside the perceived benefits of new technology. How do you evaluate and address the cybersecurity risks as these integrated technologies evolve and are implemented in diverse industries.

Justin Daniels
Shareholder at Baker Donelson
Conference Speakers

Marcus Fowler

Marianna Belyavskiy

Farid Abdelkader

Jennifer Gold

Howard Israel

Roota Almeida

Steve Vandenberg

Shyam Sundar Ramaswami

John C. Checco

David Raviv

Caleb Barlow

Brice Daniels

Ron Ongley

Ulf Mattsson

Nick Pelletier

Joseph Carson

Diana Kelley

Kelvin Coleman

Mary Beth Borgwing

Michael Thiessmeier

Paul Vixie

Serge Suponitskiy

Mona Abutaleb

Tony Anscombe

Joseph Tso

Steve Tran

Michelle A. Schaap

Jeff Schmidt

Justin Daniels

Peter A. Casson

Preetam Sirur

Tom Brennan

Michael Antico

Ondrej Krehel

Etay Maor

John Franchi
Please support us in supporting the good cause
You can access this conference free of charge. You will have all conference presentations & panel discussions, live Q&A sessions with experts and recordings of the conference available for free. Please proceed with your registration by selecting “Free access” ticket.
However, you can also purchase a ticket to this event for 99$. By purchasing a ticket to this event, you are not only securing your spot for one of the most relevant cybersecurity discussions, but you are also supporting a good cause. Please proceed with your registration by selecting “Regular” ticket.
Please note that by purchasing any number of tickets, 50% of the amount is donated to the FBI Agents Association Memorial College Fund to benefit the survivors of deceased FBI Agents. Thank you for your support.
Conference Pass
Free access
All presentations & panel discussions
Live Q&A with speakers
Recording from the Conference
Conference Pass
Regular: 99$
All presentations & panel discussions
Live Q&A with speakers
Recording from the Conference
Donation to the FBI Agents Association Memorial College Fund
Why we need a holistic revamp of the cybersecurity approach for SMEs?
Lack of visibility inside the siloed technology environment & supply chain
Immense complexity is brought on by continuously adding new tech-stacks to the highly heterogeneous environments. This practice lacks a holistic approach and creates highly siloed complex environments with a lack of visibility. Putting another piece of AI on top of the existing tech-stack to prevent attacks doesn’t cut it anymore.
Shortage of the cybersecurity talent leading the mission
The shortage of cybersecurity talent is further broadening the security gap. Cybersecurity experts, especially the new kind of CISOs, able to successfully translate cybersecurity to the business needs for CxOs and make it a number 1 business priority in their mindset, are hard to find.
Move towards the status of “security culture” with the cybersecurity-native CxOs
CxOs need the right level of support from their CISOs and security teams to focus on the right challenges at hand and direct budgets into the right activities. But the majority of CxOs still perceive the cybersecurity topic as a technology one. Hence your CISO needs to be eloquent enough to translate the cybersecurity requirements into a business-ready action plan.
Still not convinced to join us?
Note that the USA is the country with the highest:
Remember, no one is immune.
Businesses are leaking enormous sums of money due to security breaches. Even security software companies get breached. Large companies that have security rooted deeply into their business strategy are being targeted and breached as well.
As a wrap-up, just one last question:
How would you justify the impact of lost business opportunities due to the lost trust from customers, devaluation of the trade name, and operational disruption stretching longer than necessary due to the security breach?
Don’t build your cybersecurity strategy on guess work.
Join the most relevant dialogue in the industry and get the right focus on revamping your cybersecurity mission.
Why Qubit Conference?
Watch Charles Tango, CISO at Altria, reflect on why cybersecurity mission cannot evolve solely around technology and why Qubit Conference is a place to be.
“I found Qubit to be one of the most interesting and worthwhile conferences I have attended.”
David Merrick, USA, President at Merrick Solutions
The QuBit Difference
Qubit Conference is a global community of cybersecurity experts and key decision-makers, bringing together a holistic revamp of the cybersecurity domain.
We are creating secure digital experiences for our audiences, enabling them to tackle the most resilient cybersecurity challenges on strategic levels, advancing the state of cybersecurity mission, one conference at a time.
Qubit Conference was founded in 2014 in Slovakia, fostering the cybersecurity mission through relevant & interactive industry debates, courses, and networking for key decision-makers and industry visionaries in CEE. Since the cybersecurity topic is a global one, we are tackling this challenge globally since 2021.

14
Conferences
3461
Printed tickets
47
Countries
372
Speakers
Get your cybersecurity news from the experts you can trust.
Don't build your cybersecurity strategy on guess work.
Siloed cybersecurity environments and processes are the most significant cybersecurity obstacle. Your own employees are your weakest cybersecurity link. The lack of a holistic approach disrupts the advancement in the industry.
Subscribe to our newsletter and learn how to respond to these challenges, one piece of advice from experts your can trust.