Vice President, Worldwide Sales & Channels,
Zluri
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, June 5, 2025
8:00AM - 6:00PM MDT
Sheraton Salt Lake City Hotel
Canyons & Arches Ballroom
150 West 500 South
Salt Lake City, UT, 84101
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 3rd Annual Salt Lake City Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Technology Selection, Use, Integration & Orchestration
Key Topics:
• Evaluating and selecting security technologies that align with organizational goals.
• Best practices for integrating new tools into existing security infrastructures.
• Orchestrating technology solutions to maximize their effectiveness and return on investment.
Why It Matters:
Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 MDT
9:00-9:30 MDT
9:30-10:00 MDT
In today’s digital world, enterprises have never been more hyper-connected. And the interconnectedness is only accelerating. Every organization is in the process of some digital transformation or digital modernization. Additionally, the explosion of Artificial Intelligence is stealing the attention, resources, and budgets of cyber teams at the expense of other aspects of their IT environments. This rate and pace of change often draw attention away from ensuring legacy systems keep up with the evolving threat landscape. With approximately 90% of all breaches beginning with an email, email security is a very big rock. In this session, we will discuss the current state of email security, the trends in moving to cloud-based email like Gmail and O365, the additional risks, and why a comprehensive email security strategy doesn’t just include email.
10:00-10:20 MDT
Join us for this executive session designed specifically for CISOs and cybersecurity leaders seeking a more effective, modern approach to data security. You’ll learn why traditional DLP solutions have consistently underdelivered—failing to protect critical business data and demanding constant manual input. We’ll explore how Concentric AI uses powerful, contextual AI to automatically discover, classify, and secure sensitive information—without relying on rules, regex, or training samples.
Through compelling use cases, we’ll demonstrate how semantic understanding of data enables better governance, focused remediation, and smarter protection of business-critical assets like IP, financial data, and strategic plans. Walk away with actionable insights into how context-driven security strategies can reduce risk, simplify compliance, and empower your team to confidently support GenAI adoption across the enterprise. It’s time to rethink data security.
10:20-10:50 MDT
10:50-11:20 MDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:20-11:40 MDT
Join us for a discussion on Agentic AI and its role in hyperautomation. Learn about the differences between Agentic and Generative AI, as well as the benefits and potential risks of AI in cybersecurity. Discover best practices and strategies for implementing AI in the SOC, including threat detection, human-in-the-loop systems, and ensuring data privacy. Explore the strengths and weaknesses of AI and automation. We’ll provide actionable tips for getting started with AI in your SOC and discuss some challenges and things to consider in your journey.
11:40-12:00 MDT
While security teams have invested heavily in “shifting left,” vulnerabilities continue to surface late, teams remain burned out, and security still feels reactive rather than proactive. What if the answer isn’t shifting security earlier, but embedding security by default from the start? In this session, we’ll explore why traditional vulnerability management and never-ending CVE triage fail to address modern software supply chain challenges. Learn how leading organizations are adopting a proactive “start left” strategy using hardened container images, signed artifacts, and automated SBOM generation to build security directly into their software pipelines. Walk away with actionable insights on how your organization can step off the vulnerability treadmill and build resilience from day one.
12:00-12:55 MDT
12:55-1:25 MDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
1:25-1:45 MDT
1:45-2:05 MDT
The rise of Generative AI has revolutionized how we create and consume data, but it has also unleashed new challenges for security teams, including the emergence of shadow AI and dark data. This session dives into how data security solutions—such as data loss prevention (DLP), insider risk management (IRM), and data classification—are evolving to address these threats.
2:05-2:25 MDT
2:25-2:45 MDT
2:45-3:05 MDT
First, let me make this clear, I am not a pen tester, but I have been on the receiving end of penetration tests more than 30 times over my career, and I’ve learned a few things along the way. Pen tests can be valuable tools for improving security—if they are done well and if your organization is prepared to make the most of them.
In this presentation, I’ll cover key lessons I’ve learned from managing and responding to pen tests, including:
Beyond these core topics, I’ll also share insights on working with pen testers, how to challenge weak findings, the importance of retesting, and how to translate results into actionable security improvements for leadership.
By the end of this session, you’ll walk away with a clear strategy for making penetration tests more than just a compliance checkbox—turning them into a meaningful driver for strengthening your security posture.
3:05-3:35 MDT
3:35-3:55 MDT
3:55-4:30 MDT
4:30-5:25 MDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |