Principal Security Evangelist,
Eclypsium
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
Virtual Summit
Tue, March 25, 2025
11:00AM - 2:30PM EDT
Standard Admission $95
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
Mastering Attack Surface Management: Lessons from the Frontlines.
Navigating the complexities of attack surface management is not just challenging—it’s critical in today’s rapidly evolving digital landscape. As organizations continue to expand their digital footprint, the risks of misconfigurations, blind spots, and unmonitored assets increase, making it more important than ever to effectively manage and secure your attack surface. In this virtual conference, you’ll gain valuable insights from industry experts who have successfully implemented attack surface management programs, as well as lessons learned from their mistakes. Discover actionable strategies that can help your team identify vulnerabilities, mitigate risks, and strengthen your overall security posture.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Illuminating the Unknown: Reducing Risk Through Attack Surface Management
The ever-expanding digital footprint of organizations creates an increasing number of entry points for attackers. This panel will explore how effective attack surface management (ASM) can help identify, monitor, and reduce vulnerabilities across dynamic IT environments. Experts will discuss the strategies, tools, and best practices needed to gain visibility into external and internal attack surfaces, mitigate risks, and strengthen security defenses.
Proactive Defense: Leveraging Attack Surface Management for Threat Prevention
A comprehensive understanding of an organization’s attack surface is critical for preventing breaches before they happen. This panel will focus on how to proactively identify, prioritize, and address potential attack vectors to disrupt the kill chain before adversaries exploit vulnerabilities. Panelists will share actionable insights into the tools, tactics, and frameworks used to strengthen proactive threat prevention through ASM.
Securing the Expanding Edge: Attack Surface Management for the Modern Enterprise
With the rapid adoption of cloud, IoT, and remote work, the traditional network perimeter has dissolved. This panel will discuss how modern attack surface management enables enterprises to secure their expanding edge. Topics will include managing shadow IT, monitoring external-facing assets, and addressing the risks associated with digital transformation.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
2Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
6A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
10:00-11:00 EDT
11:00-12:00 EDT
Is our collective ability to take proactive cybersecurity measures finally evolving from a pipe dream to reality? Continuous Threat Exposure Management (CTEM) is emerging as a programmatic way to drive that shift in practice. Its rise draws comparisons to Zero Trust – not as an evolution, rather a complementary operating model. In this session, we’ll cut through the hype, explore lessons from Zero Trust’s adoption, and break down how organizations can take CTEM in stride to strengthen their cyber resilience.
12:00-12:30 EDT
CVEs are the lingua franca of cybersecurity, having become synonymous with exposure. However, not all vulnerabilities have CVEs, and systems like CVE and KEV lag behind real-world exploitation. Worse still, many tools we rely on to identify exposure cover only a small subset of vulnerabilities —with significant delays — and even then, only reliably report them under optimal conditions. Additionally, these tools fail to offer any protection for forgotten, unmanageable, and unknown assets under active exploitation. Security teams are flooded with irrelevant alerts while missing the most serious issues that can lead to compromise. Join HD Moore, founder of the legendary Metasploit Project and now runZero, as he dissects why your next breach won’t be tied to a CVE. HD will reveal why your security stack is failing you through the lens of an attacker. Get new perspectives on what’s required in the next era of exposure management to overcome decades-old challenges with existing tooling. See how you can finally illuminate the true risks that can get you owned, fill the dangerous gaps your legacy solutions leave behind, and shrink the window of exploitability.
12:30-1:00 EDT
1:00-1:25 EDT
The ever-expanding digital footprint of organizations creates an increasing number of entry points for attackers. This panel will explore how effective attack surface management (ASM) can help identify, monitor, and reduce vulnerabilities across dynamic IT environments. Experts will discuss the strategies, tools, and best practices needed to gain visibility into external and internal attack surfaces, mitigate risks, and strengthen security defenses.
1:25-1:45 EDT
Traditional security approaches treat every organization the same – static policies, predefined controls, and generic hardening strategies. But attackers don’t operate that way. They exploit your unique attack surface, often without ever deploying malware. In this session, we’ll explore how attackers are bypassing traditional defenses and why static security measures are no longer enough. We’ll discuss how organizations can shift from reactive detection to proactive defense by dynamically adjusting security controls based on real-time risk. Attendees will learn: • Why one-size-fits-all security fails against modern adversaries • How dynamic attack surface reduction preemptively neutralizes threats • The role of machine learning and adaptive security in proactive hardening • Actionable steps to move from a static security model to a living, evolving defense strategy Your risks are unique – your security should be too. Join us to learn how to stay ahead of attackers before they ever get a foothold.
1:45-2:20 EDT
The days of the network being narrowly defined as on-premises data centers and campuses are long over. Today, the network is a highly complex, interconnected web spanning data centers, campuses, secure access, clouds, identities, and IoT/OT. Modern attackers thrive in this expanded landscape, launching dynamic, multi-phase intrusions across multiple domains. Using AI and automation, they move quickly to exploit identity sprawl, cloud transitions, and IT/OT convergence. In this session, we’ll break down three critical strategies to build resilience, mitigate identity risks, and secure modern networks against evolving threats.
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |