CTO in Residence,
Zscaler
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, September 25, 2025
7:30AM - 6:00PM EDT
Philadelphia Marriott Downtown
Salons G-L, Level 5
1200 Filbert Street
Philadelphia, PA, 19107
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 8th Edition of the Philadelphia Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Media error: Format(s) not supported or source(s) not found
Download File: https://cybersecuritysummit.com/wp-content/uploads/2025/07/Philadelphia-Sep.mp4?_=1Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 EDT
9:00-9:35 EDT
Dr. Ron Ross, a living legend in cybersecurity and one of the most influential architects of our nation’s cyber defense frameworks, joins us in-person for an extraordinary keynote conversation not to be missed. With decades of pioneering work at NIST, including authoring landmark initiatives like the Risk Management Framework and the NIST Systems Security Engineering Guidelines, Dr. Ross brings unmatched insight into the future of cybersecurity. This powerful session—moderated by Parham Eftekhari, EVP at CRA Communities—will explore the most urgent priorities and transformative strategies needed to ignite meaningful change in our cyber posture. Dr. Ross will also share freely available tools and resources designed to empower practitioners across sectors. Don’t miss this rare opportunity to engage with one of cybersecurity’s most visionary leaders.
9:35-10:05 EDT
As organizations rapidly adopt generative AI and emerging technologies, security leaders face a critical challenge: enabling innovation while managing risk. Traditional approaches to security and risk management are being tested by AI’s unique characteristics and far-reaching business impact. The solution may not lie in complex new organizational structures like “fusion centers,” but rather in a more fundamental reimagining of how we approach security governance. Enter the Five Cs framework – a pragmatic approach that bridges the gap between innovation and security without creating additional organizational complexity. Join LevelBlue, a global leader in security services, as we share field insights from helping organizations navigate AI adoption. Learn how the Five Cs framework can help you.
10:05-10:35 EDT
In the age of Generative AI (GenAI), data has transcended its role as a valuable asset, it’s now the engine fueling innovation and powering AI models that are reshaping industries. But this new frontier comes with high stakes. Organizations face a dual challenge: preventing accidental data leakage from employees using public GenAI tools, while still empowering the workforce to harness the transformative power of AI. To address this, companies must focus on implementing robust safeguards to ensure sensitive information is protected and doesn’t fall into the wrong hands. Enter Zero Trust & Agentic AI, a transformative approach to security that redefines how we protect and manage critical assets. In this session, we’ll explore how Zero Trust principles apply to modern data protection challenges, including the emerging risks brought about by GenAI technologies. You’ll discover what it takes to defend your data in this AI-powered era, ensuring it remains your most valuable resource, not your greatest vulnerability. What You’ll Gain: Insights into the unique data security risks posed by GenAI, and how attackers leverage AI to amplify the threat landscape. Strategies for implementing Zero Trust controls tailored to protect data in environments increasingly integrated with AI tools and applications. Actionable tactics to prevent sensitive data from being misused, compromised, or exploited to train public AI models. A forward-looking perspective on how AI-powered analytics can enhance Zero Trust enforcement with real-time insights and anomaly detection.
10:35-11:00 EDT
11:00-11:35 EDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:35-11:55 EDT
Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode. Attend our session to learn: • Why traditional approaches to data security have failed • How AI and context are revolutionizing data security • Where to maximize the value of your existing security investments • What you can do to secure your Gen AI rollouts With the right strategy and technology, you can transform your data from a liability to a well-managed asset.
11:55-12:15 EDT
The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.
12:15-12:45 EDT
Managing Third-Party & Supply Chain Cyber Risks
12:45-1:35 EDT
1:35-2:00 EDT
2:00-2:20 EDT
2:20-2:40 EDT
2:40-3:10 EDT
3:10-3:35 EDT
3:35-4:20 EDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
4:20-4:40 EDT
4:40-5:00 EDT
5:00-5:30 EDT
5:30-6:00 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |