SlideShare a Scribd company logo
1 of 11
Download to read offline
SEPTEMBER 25
HILTON HOTEL
1335AVENUE OFTHEAMERICAS
NEWYORK CITY
CyberSummitUSA.com
...MISSION
The 2013 Cyber Security Summit will connect C-Suite executives in need of
innovative solutions to protect their business & critical infrastructure.
CONNECT & EDUCATE
Our Exclusive Audience
Company leaders from around the globe.
CTO - 23%
CISO - 29% CEO - 21%
Government - 9%
CIO - 18%
Summit Location: New York - The Epicenter of Global Commerce
The world headquarters for business, culture, entertainment, finance, real estate,
technology & development
Business Development: Grow your market share
1
Key Factors
• Client acquisition
• Direct access to key decision makers
• Showcase / launch your latest solutions
• Executive audience engagement
• Competitive analysis
• Break into new markets & regions
• Create new strategic alliances
• Network with industry leaders
• Enhance your brand’s exposure
• Access to government officials
• Invaluable cyber education
and much more...
...FIGURES
CYBER STATISTICS
2
Web-based crime incurs annual costs of $114 billion to U.S. companies. The U.S.
government is expected to spend $10.5 billion a year on information security by 2015.
Analysts have estimated the worldwide market to be as much as $140 billion a year.
Cyber Crime Annual Costs & Expenditures
68% of all businesses reported that employees cannot identify fraudulent attacks on the
corporate network. Cybercrime is the fastest growing crime trend the United States.
Corporate Cyber Attacks
Over the last five years, the trend of intellectual property theft, government data,
financial information, social media & SEO poisoning, infrastructure & digital espionage,
along with hactivism & mobile security, has increased by an estimated 50%.
Identity Theft & Digital Espionage
$114
Billion
50%
68%
97% of cyber attacks on business during 2012 were avoidable. 85% of those attacked
took approximately two weeks to discover that they had been breached.
Cyber Security Protection
97%
...DETAILS
SUMMIT CONTENT
3
The 2013 Cyber Security Summit will enlighten its global executive audience
with expert keynote addresses & stimulating interactive panel discussions.
FAST TRACKS
$ Pentagon
Finance
Cyber threats in the
financial industry
include eCommerce,
customer data,
eBanking & executing
reliable transactions.
Identity theft is the
fastest growing
crime worldwide.
Experts will share
case studies and
provide knowledge
on how to safeguard
personal data.
Identity
Theft
Protecting enterprise
data in the cloud
along with threat
research and
actionable
intelligence shall
be shared by
industry experts.
Big
Data
Solution providers
will cover all areas
of defense against
cyber attacks on
corporate IT
infrastructure.
Business
Protection
Communications
leaders will brief
the vulnerabilities
& solutions for the
complex challenges
of the mobile
telecommunications
industry.
Mobile
Security
Cyber Defense
Defense experts
discuss the current
state of global sabotage
& espionage, as its
importance is as
critical as land, sea, air
and space operations.
Social Media
In the world of social
networks, user data is at
extreme risk. This panel
discusses privacy, SEO
poisoning, information
protection, malware &
backdoor infiltration.
...CLIENTS
The 2013 Cyber Security Summit is produced by TechExpoUSA.com, the
nation’s leader in professional hiring events for the defense & intelligence industry.
With over 20 years experience and production of over 1,000 events globally, our team is poised
to build an effective educational & solutions focused forum to combat cyber terrorism.
INDUSTRY EXPERIENCE
4
Active Clients
...SPEAKERS
Past Speakers
Some of the world’s most accomplished professionals have led our events.
With over 20 years experience and production of over 1,000 events globally, our team is poised
to build an effective educational & solutions focused forum to combat cyber terrorism.
OUR INDUSTRY EXPERTS
5
Rick Geritz
Chairman, CyberMaryland
Founder & CEO, LifeJourney
Co-Founder, National Cyber
Security Hall of Fame
Shawn Henry
President, Crowdstrike
Former FBI Executive Assistant Director
Sherri Ramsay
Sr. Advisor to CyberPoint’s CEO
Former Director of the NSA
CSS Threat Operations Center (NTOC)
William M. Jimenez
Dir. of Staff & Business Operations, Dept.
of Defense Cyber Crime Center (DC3)
Adam Meyers
Director of Intelligence,
CrowdStrike
Cory Hall
Cyber Programs Cyber Architect,
Lockheed Martin
Jeff Tjiputra
Academic Director of Computer Networks
& Security and of Cybersecurity, UMUC
Larry Letow
President & CEO - Convergence Technology
Chairman, Tech Council of MD
Co-Founder, National Cyber Security Hall of Fame
Richard Bejtlich
Chief Security Officer,
MANDIANT
Paul de Souza
Founder Director,
Cyber Security Forum Initiative
Michael Kaiser
Executive Director,
National Cyber Security Alliance
...ACTIVATION
EXHIBITION & SPONSORSHIP
6
Sponsorship & Exhibiting Opportunities
Connect, Market & Sell to our exclusive C-Level audience at 2013 Cyber Security Summit.
Select your participation level.
STANDARD EXHIBIT: $5,000
GOLD SPONSOR: $10,000
• 10’ x 10’ Exhibit space: Includes tables & chairs as desired. Area pipe, draped & carpeted
• Breakfast & lunch provided for up to four (4) company representatives
• Four (4) complimentary conference passes (valued at $800)
• Logo placement & company description in the official conference program
• Logo & link to company website on CyberSummitUSA.com exhibitor page
• 10’ x 20’ Exhibit space: Includes tables & chairs as desired. Area pipe, draped & carpeted
• Breakfast & lunch provided for up to six (6) company representatives
• Eight (8) complimentary conference passes (valued at $1,600)
• Half page advertisement in official conference program
• Distribution of your company literature at summit entrance
• Logo placement & company description in the official conference program
• Logo & link to company website on CyberSummitUSA.com sponsor page
• The full database of conference attendees
PLATINUM SPONSOR: $15,000 – Limited to 4 companies
• 10’ x 30’ Exhibit space: Includes tables & chairs as desired. Area pipe, draped & carpeted
• Breakfast & lunch provided for up to eight (8) company representatives
• Ten (10) complimentary conference passes (valued at $2,000)
• Distribution of your company literature at summit entrance
• Full page advertisement in official conference program
• Logo placement & company description in the official conference program
• Logo & link to company website on CyberSummitUSA.com sponsor page
• The full database of conference attendees
• Speaking slot on conference panel (to be approved by Cyber Summit Management)
1
2
3
...ACTIVATION
EXHIBITION & SPONSORSHIP
7
Sponsorship, Speaking & Cocktail Reception Opportunities
Limited exclusive sponsorship packages are available providing elevated visibility, recognition
and exposure at The 2013 Cyber Security Summit. We can also create a customized activation.
PRESENTING SPONSOR: $25,000 – Limited to 4 companies
• 20’ x 20’ Exhibit space: Includes tables & chairs as desired including pipe, drape & carpeting
• Breakfast & lunch provided for up to ten (10) company representatives
• Fifteen (15) complimentary conference passes (valued at $3,000)
• Distribution of your company literature at summit entrance
• Full page advertisement in official conference program
• Logo placement & company description in the official conference program
• Logo & link to company website on CyberSummitUSA.com sponsor page
• The full database of conference attendees
• Company highlight on signage in the designated speaker area
• Speaking slot on conference panel (to be approved by Cyber Summit Management)
4
TITLE SPONSOR: $50,000 – Limited to 1 company
• Official Sponsor of The 2013 Cyber Security Summit New York City
• 20’ x 20’ Exhibit Space: Includes 6’ tables & chairs as desired with pipe, drape & carpeting
• Official sponsor of Cyber Summit Cocktail Reception immediately following the event
• Breakfast & lunch provided for up to twenty five (25) company representatives and guests
• Twenty five (25) complimentary conference passes (valued at $5,000)
• Distribution of your company literature at summit entrance
• Two page spread (page 1 & 2) in official conference program
• Logo placement & company description in the official conference program
• Logo placement on front page of official conference program
• One (1) full webpage dedicated to your company on CyberSummitUSA.com
• Logo and/or company name listed on all print & digital conference invitations/communications
• The full database of conference attendees
• One (1) keynote presentation (Content to be approved by Cyber Summit Management Team)
• Logo included on all conference signage
• Your company’s literature will be placed on all audience seating during the keynote
5
...ACTIVATION
ADDITIONAL OPPORTUNITIES
8
Exposure & Branding Sponsorships
Gain direct exposure & brand awareness with unique sponsorship options.
Please contact our team to inquire about customized branding avenues.
LUNCH SPONSOR: $25,000
CONFERENCE BAG SPONSOR: $5,000
• Exclusive sponsorship of The 2013 Cyber Security Summit luncheon
• Branding & signage at the lunch and summit
• Logo placement & company description in conference program guide
• Logo & link to company website on CyberSummitUSA.com sponsor page
• Speaking opportunity during lunch
• Exclusive sponsorship with your company logo on conference attendee registration bags
(bags to be provided by company)
• Bags will be distributed to all attendees at the summit entrance
• Logo placement & company description in conference program
• Logo & link to company website on CyberSummitUSA.com sponsor page
LANYARD SPONSOR: $3,500
• Exclusive sponsorship with your company logo on official conference lanyard
• Lanyards will be distributed to all attendees & speakers during the summit
• Logo placement & company description in conference program
• Logo & link to company website on CyberSummitUSA.com sponsor page
A
B
C
OFFICIAL PROGRAM GUIDE ADVERTISING
• One half page color advertisement (4” x 5”) - $1,000
• One full page color advertisement (8” x 10”) - $2,000
D
...REGISTRATION
SECUREYOUR PARTICIPATION
9
The 2013 Cyber Security Summit • Sept. 25th
Hilton New York
The Grand Ballroom
1335 Avenue of the Americas
New York, NY 10019
Set up time: Sept. 24 • 4pm-8pm
Summit time: Sept. 25 • 8am-5pm
Cocktail Reception: Sept. 25 • 5pm-6:30pm
Exhibitor Move-out: Sept. 25 • 5pm-9pm
Company Name: ___________________________________ Website: _ ______________________________
Company Name to be used in program guide & signage: __________________________________________
Contact Name: ________________________________________ Title: ______________________________
Address: _____________________________________________ Email: _____________________________
City: ________________________________________________ State: _________ Zip: _______________
Tel: _________________________ Mobile: _____________________ Fax: ___________________________
Exhibitor Information
1. Standard Exhibit: $5,000
2. Gold Sponsor: $10,000
3. Platinum Sponsor: $15,000 (limited to 4 companies)
4. Presenting Sponsor: $25,000 (limited to 4 companies)
5. Title Sponsor: $50,000 - (limited to 1 company)
Participation Level Additional Opportunities
A. Lunch Sponsor: $25,000
B. Conference Bag: $5,000
C. Lanyard Sponsor: $3,500
D. Program 1/2 Page: $1,000
Program Full Page: $2,000
Payment Information (By signing below, exhibitor agrees to terms & conditions on page 10.)
Credit Card #: _______________________________________ Exp. Date: _________ Card Type: ________
Cardholder’s Name: ______________________________________ Billing Tel: ________________________
Authorized Signature: _____________________________________ Billing Email: ______________________
Billing Address: _______________________________City: ________________ State: _____ Zip: _________
CONTACT INFO
NMATHEW@TECHEXPOUSA.COM / 212.655.4505 ext. 225
FAX BACKTO 212.655.4501 OR
SCANTO NMATHEW@TECHEXPOUSA.COM
Total Investment:____________________
...AGREEMENT
TERMS & CONDITIONS
10
The 2013 Cyber Security Summit • September 25 • New York, NY
PAYMENT & CREDITS
Payment can be made by credit card or by check. If by check, please make payable to Job Expo International & mail to 276 5th Avenue, Suite 906, NY,
NY 10001. All sales are final, however if you provide 60 days notice before September 25, 2013, we will credit your company with 100% of your payment
towards exhibit space at the 2014 Cyber Security Summit. If you provide less than 60 days notice, you will receive a 50% credit towards exhibit space at
the 2014 Cyber Security Summit. Payment is due prior to event. Invoices over 30 days are subject to 2.5% monthly interest.
APPLICABLE LAWS
The rights, duties, and obligations of the parties, and the validity, interpretation, performance, and legal effect of the Agreement shall be governed and
determined by the laws of the State of New York.
SEVERABILITY
Any terms, clauses or conditions which are subsequently adjudged invalid or illegal shall be stricken from these Terms and Conditions never included and
all remaining valid and legal conditions, clauses, and terms will there upon comprise these Terms & Conditions.
FORCE MAJEURE
Should any circumstance beyond the control of, and not the fault of,the conference co-hosts prevent or materially affect the Cyber Security Summit from
being held as scheduled, or the exhibit space not being available for use here in specified due to war, governmental action or order, act of God, fire,
strikes, acts of terrorism, labor disputes or any other cause beyond the control of the conference co-hosts,this Agreement shall immediately terminate and
no fees shall be returned.
EVENT ADVERTISING
By participating in the Cyber Security Summit, your company is allowing the organizer to use your company’s name, brand and logo in all marketing,
advertising and social media outreach in order to promote the event. It is understood your logo and company name will be listed on the event’s official
website and included on the official press release as well as any and all communications referring to the event.
CANCELLATION OF EXHIBITION
Organizer may cancel all or any part of the exhibition or reduce the amount of space allocated to the exhibition for any reason in its sole discretion. If the
exhibition is canceled in its entirety, this agreement shall automatically terminate, and organizer shall refund to exhibitor all space rental fees to exhibitor.
Refunds shall not be made for partial cancellation or reductions in the size or scope of the exhibition.
EXHIBITOR EXPULSION
Organizer hereby reserves the right to eject and remove an exhibitor or its exhibit without notice for violation of any of the terms of this agreement without
the organizer being deemed guilty of trespassing in any manner whatsoever, in which case the space rental fees paid by the exhibitor shall be retained by
the organizer as liquidated damages. Exhibitor agrees to such additional terms and conditions as the organizer may deem necessary for the proper
conduct of the exhibition.
INSURANCE
All property of the exhibitor is understood to remain under its custody and control, in transit to or from or within the confines of the Hilton Hotel, subject to
the rules and regulations of the conference. Exhibitor agrees to carry liability and automotive insurance against injury to the person and property of others
in the amount of at least $2,000,000 and shall name the conference co-hosts and the Hilton Hotel as additional insureds on such insurance policy (ies).
Exhibitor shall provide conference co-hosts with certificates evidencing such insurance coverage with return of the registration package.
DATABASE
The database that you will be recieving post-event is for your company’s use only and may not be shared with any other company/organization/person.
The database is seeded with names to monitor improper use.
SHIPPING
It is understood that all shipping costs are the responsibility of the exhibitor. All materials of the exhibitor should be fully insured for any loss, theft or
damage, before, during and after the event. It is understood that the organizer assumes no liability for any of the exhibitors property.

More Related Content

Viewers also liked

P6 Release 8 Installation Orientation
P6 Release 8 Installation OrientationP6 Release 8 Installation Orientation
P6 Release 8 Installation Orientationp6academy
 
Archiving Oracle Primavera project plans with software development tools
Archiving Oracle Primavera project plans with software development toolsArchiving Oracle Primavera project plans with software development tools
Archiving Oracle Primavera project plans with software development toolsGunther Pippèrr
 
Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...
Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...
Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...Markus Michalewicz
 
VMware Interview questions and answers
VMware Interview questions and answersVMware Interview questions and answers
VMware Interview questions and answersvivaankumar
 
Fastest Growing Web API Categories: Last 6 Months
Fastest Growing Web API Categories: Last 6 MonthsFastest Growing Web API Categories: Last 6 Months
Fastest Growing Web API Categories: Last 6 MonthsProgrammableWeb
 
ProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb
 
Oracle Application Express enabled to use central User Management (LDAP) (in ...
Oracle Application Express enabled to use central User Management (LDAP) (in ...Oracle Application Express enabled to use central User Management (LDAP) (in ...
Oracle Application Express enabled to use central User Management (LDAP) (in ...Carsten Muetzlitz
 
Doag 2104 manuskript_hadoop_oracle_integration_gunther_pipperr_v02
Doag 2104 manuskript_hadoop_oracle_integration_gunther_pipperr_v02Doag 2104 manuskript_hadoop_oracle_integration_gunther_pipperr_v02
Doag 2104 manuskript_hadoop_oracle_integration_gunther_pipperr_v02Gunther Pippèrr
 
Der oracle dba_und_seine_passwoerter
Der oracle dba_und_seine_passwoerterDer oracle dba_und_seine_passwoerter
Der oracle dba_und_seine_passwoerterGunther Pippèrr
 
Oracle no sql-doag-datenbank_konferenz_juni_2014
Oracle no sql-doag-datenbank_konferenz_juni_2014Oracle no sql-doag-datenbank_konferenz_juni_2014
Oracle no sql-doag-datenbank_konferenz_juni_2014Gunther Pippèrr
 
Oracle connection manager_cman_doag_sig_security_mai_2015
Oracle connection manager_cman_doag_sig_security_mai_2015Oracle connection manager_cman_doag_sig_security_mai_2015
Oracle connection manager_cman_doag_sig_security_mai_2015Gunther Pippèrr
 

Viewers also liked (16)

21 Sinstudio Comunicacion
21   Sinstudio Comunicacion21   Sinstudio Comunicacion
21 Sinstudio Comunicacion
 
Less05 Network
Less05 NetworkLess05 Network
Less05 Network
 
P6 Release 8 Installation Orientation
P6 Release 8 Installation OrientationP6 Release 8 Installation Orientation
P6 Release 8 Installation Orientation
 
Archiving Oracle Primavera project plans with software development tools
Archiving Oracle Primavera project plans with software development toolsArchiving Oracle Primavera project plans with software development tools
Archiving Oracle Primavera project plans with software development tools
 
Open source as a strategic weapon and the morfeo case
Open source as a strategic weapon and the morfeo caseOpen source as a strategic weapon and the morfeo case
Open source as a strategic weapon and the morfeo case
 
Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...
Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...
Oracle RAC 12c (12.1.0.2) Operational Best Practices - A result of true colla...
 
VMware Interview questions and answers
VMware Interview questions and answersVMware Interview questions and answers
VMware Interview questions and answers
 
Fastest Growing Web API Categories: Last 6 Months
Fastest Growing Web API Categories: Last 6 MonthsFastest Growing Web API Categories: Last 6 Months
Fastest Growing Web API Categories: Last 6 Months
 
ProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research ReportProgrammableWeb's eSignature API Research Report
ProgrammableWeb's eSignature API Research Report
 
Oracle Application Express enabled to use central User Management (LDAP) (in ...
Oracle Application Express enabled to use central User Management (LDAP) (in ...Oracle Application Express enabled to use central User Management (LDAP) (in ...
Oracle Application Express enabled to use central User Management (LDAP) (in ...
 
Doag 2104 manuskript_hadoop_oracle_integration_gunther_pipperr_v02
Doag 2104 manuskript_hadoop_oracle_integration_gunther_pipperr_v02Doag 2104 manuskript_hadoop_oracle_integration_gunther_pipperr_v02
Doag 2104 manuskript_hadoop_oracle_integration_gunther_pipperr_v02
 
Ldap sqlnet
Ldap sqlnetLdap sqlnet
Ldap sqlnet
 
Der oracle dba_und_seine_passwoerter
Der oracle dba_und_seine_passwoerterDer oracle dba_und_seine_passwoerter
Der oracle dba_und_seine_passwoerter
 
Oracle no sql-doag-datenbank_konferenz_juni_2014
Oracle no sql-doag-datenbank_konferenz_juni_2014Oracle no sql-doag-datenbank_konferenz_juni_2014
Oracle no sql-doag-datenbank_konferenz_juni_2014
 
01 sqlplus
01 sqlplus01 sqlplus
01 sqlplus
 
Oracle connection manager_cman_doag_sig_security_mai_2015
Oracle connection manager_cman_doag_sig_security_mai_2015Oracle connection manager_cman_doag_sig_security_mai_2015
Oracle connection manager_cman_doag_sig_security_mai_2015
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

The Cyber Security Summit: Connecting C-Suite Executives with the leading Cyber Solution Providers

  • 1. SEPTEMBER 25 HILTON HOTEL 1335AVENUE OFTHEAMERICAS NEWYORK CITY CyberSummitUSA.com
  • 2. ...MISSION The 2013 Cyber Security Summit will connect C-Suite executives in need of innovative solutions to protect their business & critical infrastructure. CONNECT & EDUCATE Our Exclusive Audience Company leaders from around the globe. CTO - 23% CISO - 29% CEO - 21% Government - 9% CIO - 18% Summit Location: New York - The Epicenter of Global Commerce The world headquarters for business, culture, entertainment, finance, real estate, technology & development Business Development: Grow your market share 1 Key Factors • Client acquisition • Direct access to key decision makers • Showcase / launch your latest solutions • Executive audience engagement • Competitive analysis • Break into new markets & regions • Create new strategic alliances • Network with industry leaders • Enhance your brand’s exposure • Access to government officials • Invaluable cyber education and much more...
  • 3. ...FIGURES CYBER STATISTICS 2 Web-based crime incurs annual costs of $114 billion to U.S. companies. The U.S. government is expected to spend $10.5 billion a year on information security by 2015. Analysts have estimated the worldwide market to be as much as $140 billion a year. Cyber Crime Annual Costs & Expenditures 68% of all businesses reported that employees cannot identify fraudulent attacks on the corporate network. Cybercrime is the fastest growing crime trend the United States. Corporate Cyber Attacks Over the last five years, the trend of intellectual property theft, government data, financial information, social media & SEO poisoning, infrastructure & digital espionage, along with hactivism & mobile security, has increased by an estimated 50%. Identity Theft & Digital Espionage $114 Billion 50% 68% 97% of cyber attacks on business during 2012 were avoidable. 85% of those attacked took approximately two weeks to discover that they had been breached. Cyber Security Protection 97%
  • 4. ...DETAILS SUMMIT CONTENT 3 The 2013 Cyber Security Summit will enlighten its global executive audience with expert keynote addresses & stimulating interactive panel discussions. FAST TRACKS $ Pentagon Finance Cyber threats in the financial industry include eCommerce, customer data, eBanking & executing reliable transactions. Identity theft is the fastest growing crime worldwide. Experts will share case studies and provide knowledge on how to safeguard personal data. Identity Theft Protecting enterprise data in the cloud along with threat research and actionable intelligence shall be shared by industry experts. Big Data Solution providers will cover all areas of defense against cyber attacks on corporate IT infrastructure. Business Protection Communications leaders will brief the vulnerabilities & solutions for the complex challenges of the mobile telecommunications industry. Mobile Security Cyber Defense Defense experts discuss the current state of global sabotage & espionage, as its importance is as critical as land, sea, air and space operations. Social Media In the world of social networks, user data is at extreme risk. This panel discusses privacy, SEO poisoning, information protection, malware & backdoor infiltration.
  • 5. ...CLIENTS The 2013 Cyber Security Summit is produced by TechExpoUSA.com, the nation’s leader in professional hiring events for the defense & intelligence industry. With over 20 years experience and production of over 1,000 events globally, our team is poised to build an effective educational & solutions focused forum to combat cyber terrorism. INDUSTRY EXPERIENCE 4 Active Clients
  • 6. ...SPEAKERS Past Speakers Some of the world’s most accomplished professionals have led our events. With over 20 years experience and production of over 1,000 events globally, our team is poised to build an effective educational & solutions focused forum to combat cyber terrorism. OUR INDUSTRY EXPERTS 5 Rick Geritz Chairman, CyberMaryland Founder & CEO, LifeJourney Co-Founder, National Cyber Security Hall of Fame Shawn Henry President, Crowdstrike Former FBI Executive Assistant Director Sherri Ramsay Sr. Advisor to CyberPoint’s CEO Former Director of the NSA CSS Threat Operations Center (NTOC) William M. Jimenez Dir. of Staff & Business Operations, Dept. of Defense Cyber Crime Center (DC3) Adam Meyers Director of Intelligence, CrowdStrike Cory Hall Cyber Programs Cyber Architect, Lockheed Martin Jeff Tjiputra Academic Director of Computer Networks & Security and of Cybersecurity, UMUC Larry Letow President & CEO - Convergence Technology Chairman, Tech Council of MD Co-Founder, National Cyber Security Hall of Fame Richard Bejtlich Chief Security Officer, MANDIANT Paul de Souza Founder Director, Cyber Security Forum Initiative Michael Kaiser Executive Director, National Cyber Security Alliance
  • 7. ...ACTIVATION EXHIBITION & SPONSORSHIP 6 Sponsorship & Exhibiting Opportunities Connect, Market & Sell to our exclusive C-Level audience at 2013 Cyber Security Summit. Select your participation level. STANDARD EXHIBIT: $5,000 GOLD SPONSOR: $10,000 • 10’ x 10’ Exhibit space: Includes tables & chairs as desired. Area pipe, draped & carpeted • Breakfast & lunch provided for up to four (4) company representatives • Four (4) complimentary conference passes (valued at $800) • Logo placement & company description in the official conference program • Logo & link to company website on CyberSummitUSA.com exhibitor page • 10’ x 20’ Exhibit space: Includes tables & chairs as desired. Area pipe, draped & carpeted • Breakfast & lunch provided for up to six (6) company representatives • Eight (8) complimentary conference passes (valued at $1,600) • Half page advertisement in official conference program • Distribution of your company literature at summit entrance • Logo placement & company description in the official conference program • Logo & link to company website on CyberSummitUSA.com sponsor page • The full database of conference attendees PLATINUM SPONSOR: $15,000 – Limited to 4 companies • 10’ x 30’ Exhibit space: Includes tables & chairs as desired. Area pipe, draped & carpeted • Breakfast & lunch provided for up to eight (8) company representatives • Ten (10) complimentary conference passes (valued at $2,000) • Distribution of your company literature at summit entrance • Full page advertisement in official conference program • Logo placement & company description in the official conference program • Logo & link to company website on CyberSummitUSA.com sponsor page • The full database of conference attendees • Speaking slot on conference panel (to be approved by Cyber Summit Management) 1 2 3
  • 8. ...ACTIVATION EXHIBITION & SPONSORSHIP 7 Sponsorship, Speaking & Cocktail Reception Opportunities Limited exclusive sponsorship packages are available providing elevated visibility, recognition and exposure at The 2013 Cyber Security Summit. We can also create a customized activation. PRESENTING SPONSOR: $25,000 – Limited to 4 companies • 20’ x 20’ Exhibit space: Includes tables & chairs as desired including pipe, drape & carpeting • Breakfast & lunch provided for up to ten (10) company representatives • Fifteen (15) complimentary conference passes (valued at $3,000) • Distribution of your company literature at summit entrance • Full page advertisement in official conference program • Logo placement & company description in the official conference program • Logo & link to company website on CyberSummitUSA.com sponsor page • The full database of conference attendees • Company highlight on signage in the designated speaker area • Speaking slot on conference panel (to be approved by Cyber Summit Management) 4 TITLE SPONSOR: $50,000 – Limited to 1 company • Official Sponsor of The 2013 Cyber Security Summit New York City • 20’ x 20’ Exhibit Space: Includes 6’ tables & chairs as desired with pipe, drape & carpeting • Official sponsor of Cyber Summit Cocktail Reception immediately following the event • Breakfast & lunch provided for up to twenty five (25) company representatives and guests • Twenty five (25) complimentary conference passes (valued at $5,000) • Distribution of your company literature at summit entrance • Two page spread (page 1 & 2) in official conference program • Logo placement & company description in the official conference program • Logo placement on front page of official conference program • One (1) full webpage dedicated to your company on CyberSummitUSA.com • Logo and/or company name listed on all print & digital conference invitations/communications • The full database of conference attendees • One (1) keynote presentation (Content to be approved by Cyber Summit Management Team) • Logo included on all conference signage • Your company’s literature will be placed on all audience seating during the keynote 5
  • 9. ...ACTIVATION ADDITIONAL OPPORTUNITIES 8 Exposure & Branding Sponsorships Gain direct exposure & brand awareness with unique sponsorship options. Please contact our team to inquire about customized branding avenues. LUNCH SPONSOR: $25,000 CONFERENCE BAG SPONSOR: $5,000 • Exclusive sponsorship of The 2013 Cyber Security Summit luncheon • Branding & signage at the lunch and summit • Logo placement & company description in conference program guide • Logo & link to company website on CyberSummitUSA.com sponsor page • Speaking opportunity during lunch • Exclusive sponsorship with your company logo on conference attendee registration bags (bags to be provided by company) • Bags will be distributed to all attendees at the summit entrance • Logo placement & company description in conference program • Logo & link to company website on CyberSummitUSA.com sponsor page LANYARD SPONSOR: $3,500 • Exclusive sponsorship with your company logo on official conference lanyard • Lanyards will be distributed to all attendees & speakers during the summit • Logo placement & company description in conference program • Logo & link to company website on CyberSummitUSA.com sponsor page A B C OFFICIAL PROGRAM GUIDE ADVERTISING • One half page color advertisement (4” x 5”) - $1,000 • One full page color advertisement (8” x 10”) - $2,000 D
  • 10. ...REGISTRATION SECUREYOUR PARTICIPATION 9 The 2013 Cyber Security Summit • Sept. 25th Hilton New York The Grand Ballroom 1335 Avenue of the Americas New York, NY 10019 Set up time: Sept. 24 • 4pm-8pm Summit time: Sept. 25 • 8am-5pm Cocktail Reception: Sept. 25 • 5pm-6:30pm Exhibitor Move-out: Sept. 25 • 5pm-9pm Company Name: ___________________________________ Website: _ ______________________________ Company Name to be used in program guide & signage: __________________________________________ Contact Name: ________________________________________ Title: ______________________________ Address: _____________________________________________ Email: _____________________________ City: ________________________________________________ State: _________ Zip: _______________ Tel: _________________________ Mobile: _____________________ Fax: ___________________________ Exhibitor Information 1. Standard Exhibit: $5,000 2. Gold Sponsor: $10,000 3. Platinum Sponsor: $15,000 (limited to 4 companies) 4. Presenting Sponsor: $25,000 (limited to 4 companies) 5. Title Sponsor: $50,000 - (limited to 1 company) Participation Level Additional Opportunities A. Lunch Sponsor: $25,000 B. Conference Bag: $5,000 C. Lanyard Sponsor: $3,500 D. Program 1/2 Page: $1,000 Program Full Page: $2,000 Payment Information (By signing below, exhibitor agrees to terms & conditions on page 10.) Credit Card #: _______________________________________ Exp. Date: _________ Card Type: ________ Cardholder’s Name: ______________________________________ Billing Tel: ________________________ Authorized Signature: _____________________________________ Billing Email: ______________________ Billing Address: _______________________________City: ________________ State: _____ Zip: _________ CONTACT INFO NMATHEW@TECHEXPOUSA.COM / 212.655.4505 ext. 225 FAX BACKTO 212.655.4501 OR SCANTO NMATHEW@TECHEXPOUSA.COM Total Investment:____________________
  • 11. ...AGREEMENT TERMS & CONDITIONS 10 The 2013 Cyber Security Summit • September 25 • New York, NY PAYMENT & CREDITS Payment can be made by credit card or by check. If by check, please make payable to Job Expo International & mail to 276 5th Avenue, Suite 906, NY, NY 10001. All sales are final, however if you provide 60 days notice before September 25, 2013, we will credit your company with 100% of your payment towards exhibit space at the 2014 Cyber Security Summit. If you provide less than 60 days notice, you will receive a 50% credit towards exhibit space at the 2014 Cyber Security Summit. Payment is due prior to event. Invoices over 30 days are subject to 2.5% monthly interest. APPLICABLE LAWS The rights, duties, and obligations of the parties, and the validity, interpretation, performance, and legal effect of the Agreement shall be governed and determined by the laws of the State of New York. SEVERABILITY Any terms, clauses or conditions which are subsequently adjudged invalid or illegal shall be stricken from these Terms and Conditions never included and all remaining valid and legal conditions, clauses, and terms will there upon comprise these Terms & Conditions. FORCE MAJEURE Should any circumstance beyond the control of, and not the fault of,the conference co-hosts prevent or materially affect the Cyber Security Summit from being held as scheduled, or the exhibit space not being available for use here in specified due to war, governmental action or order, act of God, fire, strikes, acts of terrorism, labor disputes or any other cause beyond the control of the conference co-hosts,this Agreement shall immediately terminate and no fees shall be returned. EVENT ADVERTISING By participating in the Cyber Security Summit, your company is allowing the organizer to use your company’s name, brand and logo in all marketing, advertising and social media outreach in order to promote the event. It is understood your logo and company name will be listed on the event’s official website and included on the official press release as well as any and all communications referring to the event. CANCELLATION OF EXHIBITION Organizer may cancel all or any part of the exhibition or reduce the amount of space allocated to the exhibition for any reason in its sole discretion. If the exhibition is canceled in its entirety, this agreement shall automatically terminate, and organizer shall refund to exhibitor all space rental fees to exhibitor. Refunds shall not be made for partial cancellation or reductions in the size or scope of the exhibition. EXHIBITOR EXPULSION Organizer hereby reserves the right to eject and remove an exhibitor or its exhibit without notice for violation of any of the terms of this agreement without the organizer being deemed guilty of trespassing in any manner whatsoever, in which case the space rental fees paid by the exhibitor shall be retained by the organizer as liquidated damages. Exhibitor agrees to such additional terms and conditions as the organizer may deem necessary for the proper conduct of the exhibition. INSURANCE All property of the exhibitor is understood to remain under its custody and control, in transit to or from or within the confines of the Hilton Hotel, subject to the rules and regulations of the conference. Exhibitor agrees to carry liability and automotive insurance against injury to the person and property of others in the amount of at least $2,000,000 and shall name the conference co-hosts and the Hilton Hotel as additional insureds on such insurance policy (ies). Exhibitor shall provide conference co-hosts with certificates evidencing such insurance coverage with return of the registration package. DATABASE The database that you will be recieving post-event is for your company’s use only and may not be shared with any other company/organization/person. The database is seeded with names to monitor improper use. SHIPPING It is understood that all shipping costs are the responsibility of the exhibitor. All materials of the exhibitor should be fully insured for any loss, theft or damage, before, during and after the event. It is understood that the organizer assumes no liability for any of the exhibitors property.