Event Dates

May 08, 2018
May 10, 2018
Add to Calendar 20180508T0001 20180510T2359 HACK NYC 2018 Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. 

Kinetic cyber attacks are a real and growing threat that is generally being ignored as unrealistic or alarmist. These types of attacks have been validated experimentally in the laboratory environment, they have been used operationally in the context of espionage and sabotage, and they have been used criminally in a number of attacks throughout the world. While these types of attacks have thus far been statistically insignificant, the rapid growth and integration of cyber-physical systems into everything from automobiles to SCADA systems implies a significant kinetic cyber threat in the near future. I...
https://q22018.dryfta.com/
11 Times Square, New York, NY 10036 HACK NYC 2018 events@magegroupe.com

Because the difference between a hard target and a soft target … is everything

Cyber attacks are often called non-violent or non-kinetic attacks, but the simple truth is that there is a credible capability to use cyber attacks to achieve kinetic effects. Kinetic Cyber refers to a class of cyber attacks that can cause direct or indirect physical damage, injury or death solely through the exploitation of vulnerable information systems and processes. 

Kinetic cyber attacks are a real and growing threat that is generally being ignored as unrealistic or alarmist. These types of attacks have been validated experimentally in the laboratory environment, they have been used operationally in the context of espionage and sabotage, and they have been used criminally in a number of attacks throughout the world. While these types of attacks have thus far been statistically insignificant, the rapid growth and integration of cyber-physical systems into everything from automobiles to SCADA systems implies a significant kinetic cyber threat in the near future. It is imperative that the security community begin to take these types of threats seriously and address vulnerabilities associated with cyber-physical systems and other devices that could be utilized to cause kinetic effects through cyber attacks.

Join us in New York City in 2018 across the street from Port Authority a national landmark of transportation and in the heart of New York City, Time Square.  This event will have attendees and speakers from around the WORLD

Be part of defining solutions and illuminate risks aimed at Critical National Infrastructure

  • financial services (banking, clearing);
  • security services (police, military)
  • electricity generation transmission and distribution;
  • gas production, transport and distribution;
  • oil and oil products production, transport and distribution;
  • telecommunications
  • water supply (drinking water, waste water/sewage, stemming of surface water (e.g. dikes and sluices));
  • agriculture, food production and distribution;
  • heating (e.g. natural gas, fuel oil, district heating);
  • public health (hospitals, ambulances);
  • transportation systems (fuel supply, railway network, airports, harbors, inland shipping);

This event is about sharing big ideas on how we will fortify our daily life and economic vitality.  The threat of attack aimed at Critical National Infrastructure is real as services supporting our communities and businesses face common vulnerabilities and an unspoken kinetic threat.  

Content in support of The NIST Cyber Security Framework is aligned to five functional areas;

  • Identify - "Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities."
  • Protect - "Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services."
  • Detect - "Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event."
  • Respond -"Develop and implement the appropriate activities to take action regarding a detected cybersecurity event."
  • Recover - "Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event."

Who Should Attend

 operators preview   Join other information security decision makers, developers, penetration testers, cryptographers, analysts, engineers, and risk professionals. Influence the conversation and sharpen your technical skills. Bring your laptop and get your hands dirty with the latest tools and techniques.  
     
    We provide the platform, you steer the conversation with 1:1 and group sessions using the mobile application. Engage with industry leaders, practitioners, and potential investors to ignite an open conversation in “think tank” style.  Mold how we fortify our critical infrastructure with unmatched east coat networking and learning opportunities
     
sponsors preview    Reach thousands of cybersecurity experts, decision makers, and influencers. Bring your best and brightest minds to the big apple and influence the ability to secure critical infrastructure.  BOF Sessions for government, healthcare, finance, transportation, energy, law, policy and more. 
     
 ticket   Meet face-to-face with the top international talent committed to defining and defending the future of security. Meet with the most influential companies and recruiters who are hiring now. Register online, schedule your meetings in advance and plan to make life-changing connections.

 

*Continuing professional education credits (CPE)


2018 Speakers

Executive Producer | Founder
HACKNYC | ProactiveRISK
CTO Security (Cloud & Enterprise)
Microsoft Corporation
CEO
Gula Tech Adventures
Lead Security Strategist
Adobe Systems Incorporated
Non-Resident Senior Fellow
Atlantic Council
SVP
Bank of America
Cyber Safety Innovation Fellow, Scowcroft Center for Strategy and Security
Atlantic Council
Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) Instructor
Cyber Security Forum Initiative
Lt. Col. James Emerson, USMC (Retired) Chief Operating Officer/Managing Director
iThreat Cyber Group
Senior Manager
Deloitte
Senior Security Architect
IBM
Program Manager
Consortium for IT Software Quality (CISQ)
Founder Director President at Cyber Security Forum Initiative
Cyber Security Forum Initiative
Journalist/Author/Educator
Journalist/Author/Educator
Founder
I Am The Cavalry
Senior Research Scholar
Columbia University
Product Manager
SecurityScorecard
Managing Director, Cybersecurity
HSBC
Chief Information Security Officer
BGC Partners
BioHacking Village Project Manager
DEF CON
Head of Automotive & IoT
Gotham Digital Science
Principal Consultant
SpyderSec
Professor
New York University
Founder, Principal Security Consultant
Lares
Chief of Police
City of Hampton, VA
CEO
TrustedSec
President
LJ Kushner & Associates
Founder & CEO
SCYTHE
VP of Security Solutions
Check Point
Co-Founder and COO
New York Internet
Founder/CEO
Cyberman Security LLC
CMO
CyberSecJobsCom
Firm Partner
Tor Ekeland Law PLLC
EVP, Strategy and Analytics
CAST
Director of Infrastructure
Interfaith Medical Center
Senior Principal Engineer
MITRE Corporation
Technical Director
NCC Group
Security Consultant
NCC Group
Sr. Vulnerability Researcher
CERT / Carnegie Mellon University
Founder, Consultant
ReachRF LLC
Managing Consultant
Spirent Communications
Partner
BWG Strategy
VP, Security Intelligence
Lookout
Chief Operational Risk Officer
Goldman Sachs
CEO
Maven Security Consulting Inc.
Host Intrusion Engineer
Adobe
Trainer
EC-Council

The HACKNYC Team

This event would not be possible without the industry support of "The Team"

Managing Partner
Applied Control Solutions, LLC
Distinguished Engineer
Cisco
Firm Partner
Tor Ekeland Law PLLC
IT Specialist
U.S. Department of Homeland Security
Chief Operating Officer
BSides DE | RedLion
Executive Producer | Founder
HACKNYC | ProactiveRISK
Senior Director
TrapX Security
Senior Principal Engineer
MITRE Corporation
Senior Vice President and Chief Evangelist
Center for Internet Security
Chief Scientist
Flashpoint
International Board of Directors, Chairman for Education & Professional Development
ISSA International
Computer and Information Science
New Jersey Institute of Technology
Leader & Director, DevSecOps (Red Team, Cloud Security, Security Engineering)
Intuit
Principal Engineer at McAfee and SANS Certified Instructor
Assistant Special Agent in Charge (ASAC) - National Security Branch at FBI
Federal Bureau of Investigation (FBI)
Vice President - Technology Risk
Goldman Sachs
Producer
Critical Infrastructure Association of America, Inc.
Executive Director
SAFECode
CSO
Cimpress
Cyber Security Problem Solver | Podcaster
Kivu Consulting | Cyber Security Interviews
Co-Founder, Producer
All Day DevOps
Principal Software Assurance Engineer
MITRE Corporation
Executive Director
NetSPI East Security Labs
Partner
BWG Strategy
Advisory Board
NYU
CISO / Head of Risk and Security Management
Manager
Community Resilience Panel - NIST
CEO
Dragos, Inc.
Vice President - Application Security
Pershing, a BNY Mellon company
Consulting Security Group (C.G.S.) Independent P.P.S.
Executive Protection Institute
Co-Executive Producer / Virtualization Security
VMware , Owasp NYC president
Information Security
Undisclosed
Global Head of Services, Security, and Integration
Nuix
Partnerships & Outreach
NJ Cybersecurity & Communications Integration Cell
Problem Solver
Fortify
Chief Investigator
District Attorney's Office
Founder
Whiteside Security
Founder, Principal Security Consultant
Lares
Assistant Professor
Pace University
Professor
New York University

FAQ

 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG
Tickets  

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.