Enterprise Solutions Engineer,
Chainguard
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, March 6, 2025
8:00AM - 6:00PM EDT
Sheraton New York Times Square Hotel
Metropolitan Ballroom
811 7th Avenue, W 53rd Street
New York, NY, 10019
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 15th Edition of the New York Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters: Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Technology Selection, Use, Integration & Orchestration
Key Topics:
• Evaluating and selecting security technologies that align with organizational goals.
• Best practices for integrating new tools into existing security infrastructures.
• Orchestrating technology solutions to maximize their effectiveness and return on investment.
Why It Matters: Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
2Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
6A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 EDT
9:00-9:35 EDT
As organizations rapidly adopt generative AI and emerging technologies, security leaders face a critical challenge: enabling innovation while managing risk. Traditional approaches to security and risk management are being tested by AI’s unique characteristics and far-reaching business impact.
The solution may not lie in complex new organizational structures like “fusion centers,” but rather in a more fundamental reimagining of how we approach security governance. Enter the Five Cs framework – a pragmatic approach that bridges the gap between innovation and security without creating additional organizational complexity.
Join LevelBlue, a global leader in security services, as we share field insights from helping organizations navigate AI adoption. Learn how the Five Cs framework can help you.
9:35-10:05 EDT
Insider threats represent one of the most complex and persistent challenges in cybersecurity today. Unlike external attackers, insiders operate with legitimate credentials, often moving under the radar of traditional detection tools. This duality—trusted access combined with potential malicious intent—creates a critical blind spot for many organizations.
The Question: How Can We Detect the Undetectable?
The key lies in understanding the nuanced behaviors of users within your organization. By identifying what constitutes “normal” activity and uncovering subtle deviations, security teams can shine a light on insider risks before they escalate into breaches.
Discover How to Stay Ahead of Insider Threats
Insider threats demand a strategic, data-driven response. Join Exabeam’s session to explore how to detect subtle behavioral shifts as your organization grows more complex. Learn how our proven approach empowers security teams to identify risks early and respond faster.
Redefine your insider threat strategy—don’t miss this opportunity to elevate your cybersecurity practices.
10:05-10:35 EDT
Post-Quantum Readiness has bubbled very quickly to the top of most cybersecurity conversations. This presentation explores the questions: Is the post-quantum frenzy all hype? And are we ready to invest in Post-Quantum Cryptography today? The answer may be as complicated as understanding quantum entanglement. Let’s explore different perspectives on the timeline and urgency of post-quantum readiness.
10:35-11:00 EDT
11:00-11:30 EDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:30-11:50 EDT
In today’s fast-evolving threat landscape, gaining visibility and context into threats is essential to staying ahead of cyber adversaries. In this session, Scott Dowsett, Global Field CTO, will discuss modernizing your security to detect, investigate, respond and remediate threats at lightning speed.
11:50-12:10 EDT
12:10-12:30 EDT
In today’s threat landscape, identity security is one of the highest leverage areas to prevent and reduce damage from attacks, yet many organizations still underestimate its significance. Traditional IAM and governance solutions are showing their cracks in an evolving technological landscape, where the risks of over-privileged accounts and access control gaps can lead to devastating breaches. In this session, we take a blunt, high-level look at why identity must be every CISO’s top priority. We’ll explore how to achieve least privilege by adopting a remediation-first mindset, ensuring that access risks are addressed at their root. Join us to understand how forward-looking organizations are tackling identity governance to secure their future, and why the security capabilities of your identity systems are non negotiable in today’s threat environment.
12:30-1:20 EDT
1:20-1:55 EDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
1:55-2:15 EDT
Low quality security data could be costing your SOC millions. At least half of this cost comes from data you will never use. Ever.
And most importantly it also makes SOC’s job much harder and slower.
Reducing and reformatting data is not exactly new, but there should be a better way than how most teams currently do it: manually. Chances are, that your team is using coding, writing config, regexp to improve data quality. Processes that are your responsibility to set up and maintain. And fix when something in your pipeline changes. Or when the senior engineer who created it is no longer working there. Not if, but when.
2:15-2:35 EDT
The cost of data breaches continues to grow—topping $4.5 million on average. But what if breaches could become harmless?
There is a paradigm shift in security: Traditional approaches to cybersecurity, focusing on network and device security, have proven insufficient due to evolving threats and third-party access. We’ll explore how enterprises can shift to a data-centric security model to mitigate the impact of inevitable cybersecurity breaches.
The cost of data breaches continues to grow—topping $4.5 million on average. But what if breaches could become harmless?
There is a paradigm shift in security: Traditional approaches to cybersecurity, focusing on network and device security, have proven insufficient due to evolving threats and third-party access. We’ll explore how enterprises can shift to a data-centric security model to mitigate the impact of inevitable cybersecurity breaches.
2:35-2:55 EDT
Ransomware attacks are rising, targeting critical systems and demanding hefty ransoms. This session unveils the power of supply chain and dark web intelligence in detection, prevention, and response. Learn how proactive threat hunting and leveraging intelligence to safeguard financial institutions.
2:55-3:20 EDT
3:20-3:50 EDT
Key Topics:
Why It Matters:
Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
3:50-4:10 EDT
4:10-4:30 EDT
4:30-5:00 EDT
5:00-6:00 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |