CTO, Americas,
Fortinet
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Tue, June 17, 2025
7:30AM - 6:00PM EDT
Hartford Marriott Downtown
200 Columbus Blvd
Hartford, CT, 06103
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 3rd Annual Hartford Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Technology Selection, Use, Integration & Orchestration
Key Topics:
• Evaluating and selecting security technologies that align with organizational goals.
• Best practices for integrating new tools into existing security infrastructures.
• Orchestrating technology solutions to maximize their effectiveness and return on investment.
Why It Matters:
Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 EDT
9:00-9:35 EDT
Artificial Intelligence introduces novel security challenges, including adversarial attacks and model vulnerabilities. Then there is the issue of how to defend against these threats. This session will cover six different types of AI attacks in order to provide a better understanding of the threatscape along with capabilities needed to secure the data, the model, the usage and the infrastructure.
9:35-10:05 EDT
10:05-10:35 EDT
Follow the journey of one cybersecurity professional from entering the Defense Industrial Base (DiB) in 2016. His absorbing of the regulations and controls required to work in the industry. Then 2019 hits and CMMC 1.0 comes out. When it looks like CMMC 1.0 will rule the DiB, CMMC 2.0 is proposed! This speaker will lead you through, not only the past winding road of CMMC, but where we are now and what is expected down the road.
10:35-11:00 EDT
11:00-11:35 EDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:35-11:55 EDT
Cybersecurity and Artificial Intelligence (AI) are reshaping industries, creating both competitive advantages and new, complex risks that executive must understand to guide their organization effectively. Fortinet will share insights on the emerging trends and risks shaping the future of business. Gain actionable knowledge to effectively lead discussions in the boardroom, ensuring your organization stays ahead of cyber threats while leveraging the power of AI. What to Expect: Hear about cybersecurity and AI, and what every executive needs to know to navigate these critical areas. Exchange ideas, explore solutions, and collaborate on how to drive both security and innovation within your organizations. Learn how to future-proof your organization from the rapidly evolving cyber threat landscape while making informed decisions about AI that position your business for long-term success.
11:55-12:15 EDT
12:15-12:35 EDT
SIEM isn’t dead. But the era of slow, siloed, and costly platforms is over. Legacy tools can’t keep up with AI-enabled adversaries and exploding data. Security leaders must shift from static systems of record to intelligent systems of action. Agentic AI and unified data architectures are driving this evolution — delivering speed, visibility, and strategic advantage. But autonomy must come with human control to ensure governance, trust, and secure outcomes. Join Anomali for a blueprint to replace technical debt with intelligent, governed automation.
12:35-1:35 EDT
1:35-2:00 EDT
With a career rooted in offensive security and technical assurance, Gene Meltser brings a unique perspective to his current role as CISO for the State of Connecticut. In this fireside chat, Gene will discuss the evolution of his career from hands-on penetration tester to public sector security leader, and how his deep technical background informs his approach to defending critical state infrastructure. Attendees will gain insight into how states are addressing modern threats—from ransomware to supply chain vulnerabilities—and what it takes to build resilience and trust at scale in the public sector. The conversation will also explore the challenges of translating security research and red team learnings into practical, actionable strategy in a high-stakes, resource-constrained environment.
2:00-2:20 EDT
For every bad actor with AI, we need a good actor with AI. GAI has fueled Vibe coding to popular heights, and has introduced a new breed of actors who use the same TTPs for drafting autonomous vulnerability detection and exploitation.
2:20-2:40 EDT
2:40-3:10 EDT
3:10-3:55 EDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
3:55-4:20 EDT
4:20-4:50 EDT
In this presentation we’ll look at how malicious cyber actors have continued to adapt their tactics in an effort to stay one step ahead of defenders. We’ll discuss some potential short and long term cyber threats along with some potential mitigations. With technology continuing to evolve and cybercrime on the rise, defenders need to constantly adapt or risk falling behind.
4:50-5:25 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |