President,
Onum
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, March 13, 2025
8:00AM - 5:30PM PDT
Hyatt Regency Bellevue
Grand Ballroom
900 Bellevue Way, NE
Bellevue, WA, 98004
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 9th Edition of the Seattle/Bellevue Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters: Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Technology Selection, Use, Integration & Orchestration
Key Topics:
• Evaluating and selecting security technologies that align with organizational goals.
• Best practices for integrating new tools into existing security infrastructures.
• Orchestrating technology solutions to maximize their effectiveness and return on investment.
Why It Matters: Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
2Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
6A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 PDT
9:00-9:35 PDT
As we navigate the complexities of digital transformation and hybrid multicloud initiatives, security professionals must stay one step ahead of emerging threats. But what happens when the very technology designed to protect us – artificial intelligence – becomes a vulnerability itself?With AI adoption accelerating in the enterprise landscape, the stakes are higher than ever. A staggering 27.4% of corporate data fed into AI tools in March 2024 contained sensitive information, more than doubling the 10.7% rate from just a year ago. This alarming trend underscores the urgent need for robust security measures to protect AI-driven systems and the sensitive data they process. Furthermore, businesses must also contend with the growing threat of external actors who are increasingly leveraging AI to launch sophisticated attacks, making AI governance and security a top priority. As a result, ensuring the secure authentication and authorization of users accessing these systems is critical, particularly in today’s remote work environment where traditional security perimeters are no longer effective.Join us for a deep dive into how Security and Governance can evolve to meet your organization’s AI needs.Key Takeaways: Understand the latest threats and vulnerabilities specific to AI Learn how to help protect sensitive data and maintain regulatory compliance Discover the importance of security and governance in preventing and mitigating threats Learn how robust identity access management can secure AI-driven systems and data
9:35-10:05 PDT
Join Anthony “TonyP” Pillitiere, Co-Founder of Horizon3.ai, for an engaging session on “Offense-Driven Defense.” TonyP will challenge conventional risk assessment practices and unveil how emphasizing real-world exploitability and impact can revolutionize your security approach. Drawing from over 100,000 autonomous pentests, he’ll share compelling stories and actionable insights that reveal how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and fortify your defenses against advanced threats. Don’t miss this chance to learn from a leading industry trailblazer on why it’s time to “go hack yourself” to build resilience in today’s borderless threat environment.
10:05-10:25 PDT
As artificial intelligence (AI) permeates our lives, it’s crucial to address the cybersecurity challenges it presents. In this dynamic landscape, AI will be utilized by both attackers and defenders. We will explore the opportunities of leveraging AI to enhance your organization and InfoSec defenses while acknowledging the potential risks. AI-powered attacks, opaque AI systems, and a lack of standardized security practices demand proactive measures, rigorous protocols, and transparent designs to ensure a secure AI ecosystem.
10:25-10:50 PDT
10:50-11:25 PDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:25-11:45 PDT
Insider threats are among the hardest cybersecurity challenges to solve. Unlike external attacks, insiders have legitimate credentials, making them nearly invisible to traditional detection methods. But what if you could uncover these threats before they escalate? Join Exabeam’s expert-led webinar to explore how our advanced UEBA technology and AI-driven workflows can surface hidden risks by understanding “normal” user behavior and identifying deviations. Learn why Exabeam’s proven machine-learning approach has made us the leader in behavioral analytics for over a decade—and how our platform can empower your team to detect, investigate, and respond to insider threats faster than ever before.
11:45-12:05 PDT
Threat actors are increasingly targeting development pipelines in order to launch software supply chain attacks that have massive downstream impacts. These attacks are successful — the Snowflake breach of 2024 in which an attacker extorted $2.7 million out of customers is proof they work. Governments across the globe have also taken note of this threat, with SBOM mandates and regulations like the Cyber Resilience Act in Europe aiming to mitigate the risks. Open source malware, another name for a malicious open source package, is proliferating — Sonatype alone has observed more than 778,500 pieces of open source malware since 2019, representing more than 200% growth year-over-year. Attendees will learn about the most prominent types of open source malware including discoveries over the past year, what attributes differentiate open source malware from traditional malware and vulnerabilities, best practices for defending against open source malware, and how the attack vector will evolve in 2025. Join this talk to learn more about: How and why threat actors are focusing efforts on infiltrating software development via open source Differentiating attributes between open source malware and traditional malware The most prominent types of open source malware impacting enterprises today, as well as how enter development pipelines Best practices for SBOM management and securing the software development lifecycle against open source malware.
12:05-12:25 PDT
In the ever-evolving landscape of digital transformation, organizations are facing unprecedented challenges in securing and scaling their cryptographic infrastructure. Yet the need for crypto agility has never been more critical as companies grapple with risks posed by advanced technologies such as AI, emerging threats like Post Quantum Cryptography (PQC), and the complex web of compliance mandates, management hurdles, and technology transformations. Join a lively roundtable discussion with a panel of your peers to gain actionable strategies as we explore: -Reducing IT resource burdens and costs through centralized certificate management -Preventing costly business outages and addressing potential security vulnerabilities -Building private and public trust while eliminating human error Don’t miss this opportunity to learn best practices and elevate your organization’s cryptographic resilience. Be part of the conversation that prepares for a quantum-safe future and shapes the future of secure digital landscapes.
12:25-1:10 PDT
1:10-1:50 PDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Bradford Rand
President & Founder
Official Cyber Security Summit
MODERATOR
C. Michael Tracy
Director, Solutions Engineering
SpyCloud
Devin Ertel
CISO
Menlo Security
Kevin Hom
Senior Solutions Engineer
Cloudflare
Ethan Packard
Principal Technical Marketing Engineer
Palo Alto Networks
Johannes Stockmann
Sr. Software Architect
Okta
Roman Arutyunov
Co-Founder and Senior Vice President of Products
Xage Security
1:50-2:10 PDT
2:10-2:30 PDT
2:30-2:45 PDT
The emergence of Generative AI has revolutionized the way we create, process, and consume data, opening up new opportunities for innovation but also introducing unprecedented challenges for security teams. Among these challenges are the rise of shadow AI—unauthorized or unmanaged AI tools—and dark data, the vast, untapped pools of information that often remain unmonitored and unsecured. These developments require organizations to rethink their approach to data security. This session takes a deep dive into how modern data security solutions are evolving to tackle these emerging threats.
2:45-3:10 PDT
3:10-3:40 PDT
Key Topics:
Why It Matters:
Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
3:40-4:00 PDT
While threat actors constantly adapt and evolve their techniques, the tactics they employ remain limited and unchanging. A CISO with an understanding of modern attack trends can hone their focus on enduring tactics, rather than ever-changing techniques, to reverse the adversarial advantage and enable the business to better anticipate and defend against threat actors. Join this session to examine: Modern attack trends and real-world individual attacks Understanding the motives of threat actors to craft effective security protocols and playbooks Increasing visibility to make better informed decisions.
4:00-4:30 PDT
4:30-5:30 PDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |