Sr. Product Marketing Manager,
ExtraHop
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
Virtual Summit
Tue, September 30, 2025
11:00AM - 3:00PM EDT
Standard Admission $95
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
Fortifying the Foundation: Tackling Evolving Challenges in Network Security.
In today’s hyper-connected world, networks are the backbone of organizational operations—and the prime target for sophisticated cyberattacks. From ransomware and DDoS attacks to vulnerabilities in cloud and IoT devices, threats are constantly evolving, putting security teams in a race to stay ahead. This virtual conference brings together industry leaders to explore the future of network security, address critical vulnerabilities, and share actionable insights on building resilient, scalable, and secure networks.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Evolving Threats: Understanding and Combating Modern Network Attacks
As cyberattacks grow in sophistication and scale, network security teams face the challenge of defending against increasingly advanced threats. This panel will explore the evolving landscape of network-based attacks, from zero-day vulnerabilities and ransomware to lateral movement techniques. Panelists will provide insights into detecting and mitigating these threats while addressing the implications of adversaries leveraging AI and automation to evade defenses.
Building Resilient Network Architectures: Securing Hybrid and IoT Ecosystems
Modern networks span cloud, edge, and IoT environments, creating a complex attack surface that demands a robust defense. This panel will examine strategies for building resilient network architectures capable of supporting hybrid workforces and connected devices. Experts will discuss best practices for securing multi-cloud deployments, integrating zero-trust principles, and minimizing risks in IoT ecosystems.
Emerging Technologies: The Future of Network Security
The rapidly advancing landscape of cybersecurity technologies offers new tools to fortify networks against attacks. This panel will explore how emerging technologies, such as AI, machine learning, and automation, are transforming network security. Panelists will discuss their role in streamlining threat detection, accelerating incident response, and future-proofing network infrastructures against evolving challenges.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.
11:00-11:05 EDT

11:05-11:15 EDT
Most enterprises operate under the illusion that their network inventory is complete and accurate, yet research suggests nearly 95% of organizations lack the detailed visibility required to manage vulnerabilities effectively. Traditional scanners promise deeper inspection but introduce new risks like resource starvation and false positives, leaving engineers overwhelmed by endless CVE reports and manual exposure checks. Drawing from over 20 years securing networks and leading enterprise transformations, Mike Lossmann, Technical Evangelist at Forward Networks, will expose the “mirage of control” plaguing vulnerability management today.
Attend this session to learn:
• How to secure what you don’t know you have.
• Why traditional scanning methods aren’t enough.
• How to move from reactive, incomplete CVE management to a proactive, verifiable approach that prioritizes vulnerabilities by real exposure, strengthens security posture, and frees teams from manual drudgery.
• How a network digital twin changes the game with always-accurate, end-to-end visibility across hybrid and multi-cloud environments.
11:15-12:00 EDT
As cyberattacks grow in sophistication and scale, network security teams face the challenge of defending against increasingly advanced threats. This panel will explore the evolving landscape of network-based attacks, from zero-day vulnerabilities and ransomware to lateral movement techniques. Panelists will provide insights into detecting and mitigating these threats while addressing the implications of adversaries leveraging AI and automation to evade defenses.
12:00-12:20 EDT

12:20-12:40 EDT
As corporate networks expand across cloud, data center, and OT environments, the traditional perimeter has dissolved. CISOs and security leaders face the challenge of fragmented controls, inconsistent governance, and a growing attack surface. In this session, we’ll explore how a posture-centric approach to network security helps organizations achieve visibility, enforce Zero Trust policies, and reduce real-world exposure. Through practical use cases – such as Zero Trust policy verification and exposure-based vulnerability management—we’ll highlight how enterprises can transform security from a bottleneck into a business enabler, ensuring resilience in today’s dynamic, perimeterless world.
12:40-1:25 EDT
Modern networks span cloud, edge, and IoT environments, creating a complex attack surface that demands a robust defense. This panel will examine strategies for building resilient network architectures capable of supporting hybrid workforces and connected devices. Experts will discuss best practices for securing multi-cloud deployments, integrating zero-trust principles, and minimizing risks in IoT ecosystems.

1:25-1:45 EDT
Threat actors are increasingly sophisticated, using encrypted channels and compromised business applications to move stealthily through enterprise networks. These threats are invisible to many security tools, creating a dangerous blind spot. This session will provide a blueprint for achieving complete network visibility by combining full-packet decryption and deep inspection of all network traffic. We’ll explore how modern Network Detection and Response (NDR) can detect and respond to threats that have already bypassed endpoint and perimeter defenses, shutting down lateral movement before it can escalate into a full-scale breach.
1:45- 2:30 EDT
The rapidly advancing landscape of cybersecurity technologies offers new tools to fortify networks against attacks. This panel will explore how emerging technologies, such as AI, machine learning, and automation, are transforming network security. Panelists will discuss their role in streamlining threat detection, accelerating incident response, and future-proofing network infrastructures against evolving challenges.
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |








