Growth Technologies Evangelist,
Check Point Software Technologies
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Wed, March 5, 2025
8:00AM - 6:00PM MST
Hilton Denver City Center
Colorado Ballroom
1701 California St
Denver, CO, 80202
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 9th Annual Denver Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters: Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Technology Selection, Use, Integration & Orchestration
Key Topics:
• Evaluating and selecting security technologies that align with organizational goals.
• Best practices for integrating new tools into existing security infrastructures.
• Orchestrating technology solutions to maximize their effectiveness and return on investment.
Why It Matters: Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
2Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
6A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 MST
9:00-9:30 MST
In today’s rapidly evolving business landscape, the expansion of our technical ecosystems poses both unprecedented opportunities and considerable challenges with the adoption of AI.
This session invites thought leaders and practitioners to explore the evolving role of Artificial Intelligence in business processes and security frameworks. As AI technology accelerates, understanding its potential and limitations is paramount for security professionals.
During this conversation, we will delve into three key areas:
Join us for an insightful discussion on how to harness AI’s potential while navigating the unique challenges it presents to security professionals.
9:30-10:05 MST
Join Anthony “TonyP” Pillitiere, Co-Founder of Horizon3.ai, for an engaging session on “Offense-Driven Defense.” TonyP will challenge conventional risk assessment practices and unveil how emphasizing real-world exploitability and impact can revolutionize your security approach. Drawing from over 100,000 autonomous pentests, he’ll share compelling stories and actionable insights that reveal how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and fortify your defenses against advanced threats. Don’t miss this chance to learn from a leading industry trailblazer on why it’s time to “go hack yourself” to build resilience in today’s borderless threat environment.
10:05-10:25 MST
Join us for a discussion on Agentic AI and its role in hyperautomation. Learn about the differences between Agentic and Generative AI, as well as the benefits and potential risks of AI in cybersecurity. Discover best practices and strategies for implementing AI in the SOC, including threat detection, human-in-the-loop systems, and ensuring data privacy. Explore the strengths and weaknesses of AI and automation. We’ll provide actionable tips for getting started with AI in your SOC and discuss some challenges and things to consider in your journey.
10:25-10:50 MST
10:50-11:25 MST
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:25-11:45 MST
The Invisible Challenge: Addressing Insider Threats in Cybersecurity
Insider threats represent one of the most complex and persistent challenges in cybersecurity today. Unlike external attackers, insiders operate with legitimate credentials, often moving under the radar of traditional detection tools. This duality—trusted access combined with potential malicious intent—creates a critical blind spot for many organizations.
The Question: How Can We Detect the Undetectable?
The key lies in understanding the nuanced behaviors of users within your organization. By identifying what constitutes “normal” activity and uncovering subtle deviations, security teams can shine a light on insider risks before they escalate into breaches.
Discover How to Stay Ahead of Insider Threats
Insider threats demand a strategic, data-driven response. Join Exabeam’s session to explore how to detect subtle behavioral shifts as your organization grows more complex. Learn how our proven approach empowers security teams to identify risks early and respond faster.
Redefine your insider threat strategy—don’t miss this opportunity to elevate your cybersecurity practices
11:45-12:05 MST
12:05-12:25 MST
In the evolving cloud landscape, security teams face a pivotal decision: Should you consolidate security tools for efficiency and simplicity, or deploy specialized point solutions for deeper protection? The answer isn’t just about technology—it’s about strategy, risk management, and long-term resilience. This session will guide you through: · The core principles of cloud security architecture and why the consolidation vs. specialization debate matters · The tradeoffs between unified platforms and best-of-breed solutions—from cost and complexity to security effectiveness · A framework for evaluating your organization’s needs to build a scalable, future-proof security approach Leave with actionable insights to make informed security decisions and craft a strategy that aligns with your cloud maturity, risk appetite, and operational priorities.
12:25-1:15 MST
1:15-1:50 MST
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
1:50-2:10 MST
While threat actors constantly adapt and evolve their techniques, the tactics they employ remain limited and unchanging. A CISO with an understanding of modern attack trends can hone their focus on enduring tactics, rather than ever-changing techniques, to reverse the adversarial advantage and enable the business to better anticipate and defend against threat actors. Join this session to examine: Modern attack trends and real-world individual attacks Understanding the motives of threat actors to craft effective security protocols and playbooks Increasing visibility to make better informed decisions.
2:10-2:30 MST
In this session, we’ll explore AI’s transformative role in modernizing risk and compliance programs for the future. From automating repetitive, manual tasks to enhancing the accuracy of risk assessments, AI enables organizations to proactively identify vulnerabilities and streamline compliance workflows. More than just a tool for efficiency, AI elevates GRC programs by providing actionable insights, enabling real-time decision-making, and fostering a proactive risk culture. By integrating AI into their strategies, CISOs and security leaders can future-proof their organizations while ensuring compliance with evolving regulatory landscapes.
2:30-2:50 MST
Modern Privileged Access Management (PAM) has been defined as an evolution in identity and user management for the most sensitive accounts within an organization. As we look forward to the future of PAM, we realize that the discipline is expanding to manage and mitigate not only privileged access, but also assets, accounts, and attacks against modern identity security threats. In this presentation, we will explore the journey to a successful PAM implantation and what mitigation strategies you should consider as a defense for your organization.
2:50-3:10 MST
3:10-3:45 MST
Key Topics:
Why It Matters:
Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
3:45-4:05 MST
This presentation examines how artificial intelligence’s exponential growth in capability – driven by expanding neural networks, refined training methodologies, and unprecedented access to data – is transforming cybersecurity. Drawing from Check Point’s experience, we’ll explore how these same factors – more comprehensive threat data, improved training techniques, and increasingly sophisticated models – are revolutionizing threat detection and response. As AI systems process more security telemetry and learn from wider attack patterns, their defensive capabilities grow proportionally. Attendees will gain crucial insights into this accelerating technological shift, understanding why staying informed about AI advancements is no longer optional but essential for modern cybersecurity practitioners.
4:05-4:35 MST
4:35-5:05 MST
5:05-6:00 MST
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |