Sr Director of Information Security and Compliance, Board Member, Instructor,
Faro / ISACA SD / ASU
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
Virtual Summit
Tue, December 2, 2025
11:00AM - 2:30PM EDT
Standard Admission $95
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
Cloud Security 2025 Nationwide Virtual Conference
The Cloud Security Cybersecurity Summit brings together executives and security leaders to navigate the most pressing challenges of securing today’s cloud environments. From AI-driven defense strategies to identity and access management, and from resilient architectures to Zero Trust frameworks, this summit delivers actionable insights and proven approaches for protecting data, applications, and infrastructure in the cloud era. Attendees will gain a balanced perspective on emerging risks, evolving technologies, and the strategies required to safeguard business-critical assets at scale.
AI, Automation & Intelligence in the Cloud
Key Topics:
• How AI and automation are reshaping cloud environments
• Balancing efficiency, insights, and new security risks
• Strategies for harnessing tools while managing risk.
Why It Matters:
It matters because the same tools that make cloud systems faster and smarter also create new attack surfaces. AI can streamline defenses, but it can also amplify mistakes or be exploited by attackers. Getting this balance right determines whether organizations gain resilience or inherit new vulnerabilities.
Identity, Data & Access in the Cloud
Key Topics:
• Securing who gets in, what they can reach, and how data is protected.
• Envolving approaches to identity management and access control
• Safeguarding sensitive information across distributed systems
Why It Matters:
Keeping control of identities and access is the foundation of cloud security. If you can’t be sure who’s in, what they touch, or how data is handled, everything else falls apart. Strong identity and access practices keep sensitive data safe and trust intact.
Architecting Resilient Cloud Security
Key Topics:
• Building adaptable, enduring security frameworks
• Applying layered defenses and resilient architectures:
Practical lessons for sustaining trust in shifting threat lands
• Practical lessons for sustaining trust in shifting threat landscapes
Why It Matters:
This panel examines the design of cloud security frameworks that can withstand disruption and adapt to evolving threats. Speakers will highlight layered defenses, resilient architectures, and real-world lessons that help organizations maintain trust and continuity in a rapidly changing environment.
How AI, automation, and machine learning are reshaping cloud security operations—and where human oversight remains essential.
Identity and access management as the “new perimeter” of cloud defense, and best practices for protecting sensitive data across SaaS, multi-cloud, and hybrid environments.
The role of Zero Trust, encryption, and DevSecOps pipelines in embedding security directly into cloud-native applications and workflows.
Strategies for preventing insider threats and managing compliance demands in complex cloud ecosystems.
New architectural approaches—including security meshes, serverless security, container protections, and CASBs—that build resilience into the cloud from the ground up.
Metrics and benchmarks CISOs can use to evaluate ROI, resilience, and readiness in modern cloud security programs.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
11:00-11:05 EDT
11:05-11:50 EDT
Key Topics:
• How AI and automation are reshaping cloud environments
• Balancing efficiency, insights, and new security risks
• Strategies for harnessing tools while managing risk.
Why It Matters:
It matters because the same tools that make cloud systems faster and smarter also create new attack surfaces. AI can streamline defenses, but it can also amplify mistakes or be exploited by attackers. Getting this balance right determines whether organizations gain resilience or inherit new vulnerabilities.
11:50-12:20 EDT
12:20-12:40 EDT
Organizations face shifting threat landscapes, evolving regulations and new architectural paradigms. As the CTO of the Cloud Security Alliance, Daniele Catteddu brings a global vantage point on how enterprises, service providers and regulators are navigating this journey, from assurance frameworks and certifications to emerging practices around AI, Zero Trust and distributed infrastructure. In this fireside chat, we will explore how to build cloud resilience that goes beyond perimeter defense: embedding trust and transparency into supply chains, measuring assurance in third-party services, adapting frameworks for hybrid/multi-cloud ecosystems, and preparing for the next wave of disruptive risks. Attendees will leave with both strategic insight and practical touch points for modern cloud security leadership.
12:40-1:25 EDT
Key Topics:
• Securing who gets in, what they can reach, and how data is protected.
• Envolving approaches to identity management and access control
• Safeguarding sensitive information across distributed systems
Why It Matters:
Keeping control of identities and access is the foundation of cloud security. If you can’t be sure who’s in, what they touch, or how data is handled, everything else falls apart. Strong identity and access practices keep sensitive data safe and trust intact.
1:25-1:45 EDT
In the rapidly evolving world of artificial intelligence, the race to build smarter, more powerful models is intensifying. But as AI systems grow in complexity, so do the risks associated with their development. This session invites attendees to step into the role of a guardian, tasked with securing the environments where these intelligent systems are born and trained.
The journey begins with an exploration of AI/ML Ops—the intricate ecosystem that supports model development and training, version control, testing and validation, and deployment. These foundational processes are not just technical steps; they are the lifeblood of AI, where every decision can have far-reaching security implications. As AI models evolve, the importance of robust monitoring, maintenance, and scalability becomes paramount. Yet, with great power comes great responsibility, and the very tools that enable AI to flourish—like GPUs, data storage, and data pipelines—also introduce new vulnerabilities.
As the session delves deeper, the focus shifts to the security challenges that lurk within these AI training environments. Network security is no longer just about keeping the perimeter safe; it’s about understanding the unique vulnerabilities that can arise when dealing with massive datasets and powerful computational resources. This is where the NIST Secure Software Development Framework (SSDF) comes into play, providing a blueprint for integrating security into every stage of the AI/ML process. By aligning with NIST guidelines, AI practitioners can start building security into their systems from day one, ensuring that their creations are resilient against both current and future threats.
But security isn’t just about defending against known dangers; it’s also about anticipating the unknown. This session will guide attendees through the creation of threat models tailored specifically to AI environments. These models act as strategic roadmaps, helping to identify and mitigate risks before they manifest. In a world where AI systems are increasingly dependent on complex supply chains, securing these pipelines becomes as critical as protecting the models themselves.
The final piece of the puzzle is Identity and Access Management (IAM). In the high-stakes world of AI, controlling who has access to training environments and sensitive data is essential. The session will provide best practices for implementing IAM policies that not only protect these environments but also scale as organizations grow.
“Guardians of the Neural Network: Fortifying AI Training Environments in the ML Ops Era” is more than just a technical discussion—it’s a call to action for those who build, deploy, and manage AI systems. It offers a comprehensive, interconnected approach to security, weaving together the threads of AI/ML Ops into a story of vigilance and innovation. Attendees will leave equipped with the knowledge and tools to protect the next generation of AI, ensuring that as these machines become smarter, they also remain secure.
1:45-2:30 EDT
Key Topics:
• Building adaptable, enduring security frameworks
• Applying layered defenses and resilient architectures:
Practical lessons for sustaining trust in shifting threat lands
• Practical lessons for sustaining trust in shifting threat landscapes
Why It Matters:
This panel examines the design of cloud security frameworks that can withstand disruption and adapt to evolving threats. Speakers will highlight layered defenses, resilient architectures, and real-world lessons that help organizations maintain trust and continuity in a rapidly changing environment.
2:30-2:35 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |








