Cybercrime Awareness Summit

July 23 /24 2019 - Virtual Attendance

Awareness summit

Cybercrime :$600 billion in 2018

Do you still think of a hacker as a teen wearing a hoodie buried in the basement?

Cybercrime today is about  large corporations , running “Boiler Rooms”, with 9 to 5 jobs , bonus packages, profit sharing & medical plans , 

Personal or Business , do you think you are Safe?



Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid.

IoT Hacking

If you’re in the IoT space, read on to understand these hacks and vulnerabilities. They’ll open your eyes to how the future could (and likely will) look and prompt consideration on why devices must be secured today.


Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication. … Phishing is an example of social engineering techniques being used to deceive users.

DDsO Attacks

Distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.

Pwned Web Site Attack

“Pwned” pronounced like “poned” is a website that allows internet users to check if their personal data has been compromised by data breaches. The service collects and analyzes hundreds of database dumps and pastes containing information about billions of leaked accounts,

GEO Tracking & Profiling

GEo Tracking is the result of hacking into your smartphone, and building a geo tracking profile of all you and your families activities, Used in many ways, example would be what time is best to breakin into you home.

Financial Breaches

After you design a couple thousand screens for various products, you’ll start to see that they’re basically all the same anyway.

Medical Industry Breaches

medical data breach is a data breach of health information, and could include either the personal health information of any  individual’s electronic health recorded medical billing information from their health insurance. In the United States the rate of breaches has increased over time, with 176 million records breached by the end of 2018

Social Engineering

Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not contain the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional “con” in that it is often one of many steps in a more complex fraud scheme.

Cyber Espionage

Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet .

Cyber Warfare

Cyberwarfare is the use or targeting in a battlespace or warfare context of computers, online control systems and networks. It involves both offensive and defensive operations pertaining to the threat of cyberattacks, espionage and sabotage.

Bioethics: Mind Hacking and the deployment of deceptions

Bioethics is the study of the ethical issues emerging from advances in biology and medicine Hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function. Such efforts may be intentionally applied to the individual without their knowledge. 

Invited Speakers

Our 5,000 attendees are looking to stay on top of the latest trends, meet their next client or partner, and connect with other people interested in the future of technology.

Author. American computer programmer and former legendary phone phreak. He is a widely-known figure within the computer programming world and the hacker and security community

Ethical hacker and security researcher known for his discovery of vulnerabilities on the Android operating system. He has been conducting security research for over 7 years. He has been Featured and known by both Nationally and Internationally Media and Publications[1][2] like Forbes,[3] BBC,[4] The Wall Street Journal,[5] and The Express Tribune.[1] He has listed as one of The 15 Most Successful Ethical Hackers WorldWide[6] and Top 25 Threat

Benild Joseph

Limca Book Record Holder | White Hat Hacker | Author | Mentor | TEDx Speaker Benild is profiled in Hacking the Hacker - book written by Roger Grimes along with Bruce Schneier, Kevin Mitnick, Mark Russinovich and World's best white hat hackers and is also listed among the Top 10 Ethical Hackers in India by Microsoft Social Forum and Silicon India Magazine.

Jenny speaks, consults and trains people in the skills of “people hacking” and explains how “Social Engineering” using psychological methods can be a huge threat to organisations of all sizes. She reveals how that same knowledge is a valuable tool for security professionals of all types in the prevention of these attacks, scams and cons of all kinds.

Tech Entrepreneur, DDoS Expert, Cloud Architect and technology entrepreneur,

Global CISO | Cyber Security Consultant to Boards and C-Suites | International Keynote Speaker | CEO | Ethical Hacker

🔹 Cybercrime and Digital Investigator Data Privacy Advocate Cyber Security Educator Mentor

Host of CyberHub Engage - Public Speaker in Cyber Security, BlockChain. NTSC CISO Board of Advisor & CISSP

Founder: Risk Group / Host: Risk Roundup / FORBES Contributor Pandya (née Bhatt), CEO of Risk Group is a scientist, a visionary, an influencer, actively engaged in driving the thought leadership on existing & emerging technologies, technology transformation & nation preparedness.

Data Science | Differential Privacy | Digital Identity | Distributed Ledgers | Quantum Computing | Quantum Cryptography

Senior Network and Cyber Security Consultant | Speaker | Author

Call for Speakers

The above topic list is our agenda, we reach out to all speakers, ethical hackers, security specialists, social engineers .Malware researchers, we need to shock the audience,

Lets Collaborate 





  • 09:00 - 10:30
  • In production
Nick Espinosa

IBM Fellow

  • Virtual Attendance
  • 10:30 - 12:00
  • In production
James Azar

IBM Fellow

  • Virtual Attendance
  • 12:00 - 1:30
  • In production
Gokul Alex

IBM Fellow

  • Room A
  • Virtual Attendance
  • 02:30 - 03:30
  • In production
Abhishek Kumar

IBM Fellow

  • Virtual Attendance
  • 03:30 - 4:30
  • In production
Joshua Crumbaugh

IBM Fellow

  • Virtual Attendance
  • 04:30 - 05:30
  • In production
Andy Shoemaker

IBM Fellow

  • Room B
  • 06:00 - 07:30
  • In production
Dale Taylor

IBM Fellow

  • Virtual Attendance
  • 07:00 - 09:00
  • In production
Jayshree Pandya

IBM Fellow

  • Hall of fame

Cybercrime Virtual Summit is hosted @ Cyber-Con Center

Partners & Sponsors

We have are hosting our virtual event at the new 

 Cyber-Con Center

A virtual collaboration network dedicated to the cybersecurity industry with Auditoriums , Campus, Job Fair and Expos for sponsors, 

Order your booth for this event, and utilize this booth  to be on the Expo  floor at other up and coming cybersecurty events.

Simple and cost effective way to reach  MSSPs and IT security professionals year round.

Sponsors Booths

500m Users :Clone Back Up
The home of Thor Security
Cyber Security Certifications
Security & AI Courses

Ticket Prices

Student pass


Virtual Pass to all topics 

Full Conference Pass


Virtual Pass to 8  Topics & Expo

Priority Conference Pass


Virtual Pass to all topics & Expo, and access to the private lounge to met speaker

Should you attend ?

Cyber crime affects us all , personal business  or industry.

Learn from some of the best in the industry , an up to date view of the cybercrime methods and what you can to to protect your data