Co-Founder and Senior Vice President of Products,
Xage Security
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Wed, February 12, 2025
7:30AM - 5:30PM PST
Santa Clara Marriott
California Ballroom
2700 Mission College Blvd
Santa Clara, CA, 95054
C-Suite/Sr. Level Executives Only (Directors, Managers, Heads of IT, etc). Sales/marketing professionals & students will not be admitted.
Standard Admission $250
For sponsorship inquiries contact: NMathew@CybersecuritySummit.com or call 212.655.4505 ext. 225
For assistance with ticket registration contact registration@cybersecuritysummit.com
The Ninth Edition of the Silicon Valley Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters: Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Technology Selection, Use, Integration & Orchestration
Key Topics:
• Evaluating and selecting security technologies that align with organizational goals.
• Best practices for integrating new tools into existing security infrastructures.
• Orchestrating technology solutions to maximize their effectiveness and return on investment.
Why It Matters: Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
Learn
Our conferences have been rated as one of The Top 5 Must Attend Conferences for the last 6 years. Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive Panels & Fast Track Discussions.
2Evaluate Demonstrations
Evaluate & See demonstrations from dozens of cutting-edge solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Many senior executives simply don’t have the time to travel for up to a week to the large cyber trade shows. Our mission is to bring the cyber summit to the executives in the nation’s top cities. Our events are always for just one day only and are produced within first class hotels, not convention centers.
4Engage, Network, Socialize & Share
Engage, Network, Socialize & Share with hundreds of fellow Powerful Business Leaders, C-Suite Executives & Entrepreneurs.
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units or Continuing Professional Education Credits. To earn these credits you must participate for the entire summit & confirm your attendance at the end of the day.
6Investment
By investing one day at the summit, you may save your company millions of dollars, avoid stock devaluation and potential litigation.
7Atmosphere
Each Cybersecurity Summit is “By Invitation Only” and all attendees are pre-screened & approved in advance. On-site attendance is limited to approx. 400 Sr. Level Executives to maintain an intimate, non-trade show like environment.
8Reality Check
Did Uber, Facebook, Microsoft, Equifax, and thousands of other businesses that were hacked do everything within their power to avoid being victimized? Is your company next? Learn the latest defensive measures at the Cybersecurity Summit from your peers and from thought leaders in the industry.
For any questions, please contact NMathew@CybersecuritySummit.com or call 212.655.4505 ext. 225
To speak or exhibit at an upcoming summit, contact BRand@CybersecuritySummit.com or call 212.655.4505 ext. 223
This educational forum will focus on educating attendees on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet the nation’s leading solution providers and discover the latest products and services for enterprise cyber defense.
7:30-8:30 PST
8:30-9:00 PST
In today’s rapidly evolving business landscape, the expansion of our technical ecosystems poses both unprecedented opportunities and considerable challenges with the adoption of AI.
This session invites thought leaders and practitioners to explore the evolving role of Artificial Intelligence in business processes and security frameworks. As AI technology accelerates, understanding its potential and limitations is paramount for security professionals.
During this conversation, we will delve into three key areas:
Join us for an insightful discussion on how to harness AI’s potential while navigating the unique challenges it presents to security professionals.
9:00-9:35 PST
Join Umaimah Khan, CEO and Co Founder of Opal Security, as she explores why identity security is the most critical area of cybersecurity today and how organizations can modernize their approach. We’ll examine the limitations of current identity infrastructure, the risks of fragmented access management, and the paradigm shift towards intelligent, automated identity governance to enable secure growth and innovation.
9:35-10:05 PST
As organizations rapidly adopt generative AI and emerging technologies, security leaders face a critical challenge: enabling innovation while managing risk. Traditional approaches to security and risk management are being tested by AI’s unique characteristics and far-reaching business impact.
The solution may not lie in complex new organizational structures like “fusion centers,” but rather in a more fundamental reimagining of how we approach security governance. Enter the Five Cs framework – a pragmatic approach that bridges the gap between innovation and security without creating additional organizational complexity.
Join LevelBlue, a global leader in security services, as we share field insights from helping organizations navigate AI adoption. Learn how the Five Cs framework can help you.
10:05-10:35 PST
The takedown of LockBit, the dominant ransomware operator of the past few years, was a seismic event in the cybercriminal landscape. Yet, ransomware-as-a-service (RaaS) is far from defeated. In the last 12 months, we’ve witnessed new ransomware families rise and fall, threat actors adapt, and an evolution in the tactics used to breach, encrypt, and extort organizations.
As one of the world’s leading cybersecurity incident response teams, Secureworks has responded to hundreds of ransomware incidents, giving us a front-row seat to these changes. In this keynote, we’ll unpack how the ransomware ecosystem has reorganized post-LockBit, analyze emerging attack techniques, and share key lessons organizations must adopt to stay ahead.
10:35-11:00 PST
11:00-11:40 PST
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:40-12:00 PST
In today’s rapidly evolving digital landscape, securing your cloud environment isn’t just important—it’s mission-critical. Join us for an eye-opening session where we dive into the top three cloud security priorities from a CIO’s perspective: uncovering misconfigurations, detecting critical vulnerabilities (CVEs), and enforcing robust identity governance. When left unchecked, this toxic trilogy creates security gaps that cybercriminals love to exploit. But don’t worry—we’re not just here to talk theory. You’ll walk away with a practical scorecard to assess your own cloud security posture and take actionable steps toward fortifying your defenses.
12:15-12:35 PST
As cloud adoption accelerates, so does the complexity and scale of cyber threats targeting cloud environments. From sophisticated adversaries exploiting misconfigurations to attacks leveraging AI-powered tools, the stakes have never been higher. This session dives into the evolving threat landscape in the cloud and outlines how organizations can stay ahead of attackers by combining proactive risk management with real-time breach prevention.
Join CrowdStrike as we explore:
– Key trends driving the surge in cloud-based attacks
– Real-world case studies of cloud breaches and lessons learned
– The role of advanced tools, such as AI-driven detection and adversary-first intelligence, in hardening cloud environments
– Best practices for aligning proactive risk reduction with real-time security to protect cloud workloads without sacrificing agility
12:35-1:25 PST
1:25-1:55 PST
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
1:55-2:15 PST
All security roads lead back to a central concern: identity. The problem? Identity isn’t centralized. Human and non-human identities are proliferating at breakneck speed in places where they can be hard to detect, let alone govern. In this session, we’ll discuss how to uncover unknowns, unify identity siloes, and establish standardized governance protocols across all identities.
2:15-2:35 PST
Join us for a discussion on Agentic AI and its role in hyperautomation. Learn about the differences between Agentic and Generative AI, as well as the benefits and potential risks of AI in cybersecurity. Discover best practices and strategies for implementing AI in the SOC, including threat detection, human-in-the-loop systems, and ensuring data privacy. Explore the strengths and weaknesses of AI and automation. We’ll provide actionable tips for getting started with AI in your SOC and discuss some challenges and things to consider in your journey.
2:35-2:55 PST
This presentation examines how artificial intelligence’s exponential growth in capability – driven by expanding neural networks, refined training methodologies, and unprecedented access to data – is transforming cybersecurity. Drawing from Check Point’s experience, we’ll explore how these same factors – more comprehensive threat data, improved training techniques, and increasingly sophisticated models – are revolutionizing threat detection and response. As AI systems process more security telemetry and learn from wider attack patterns, their defensive capabilities grow proportionally. Attendees will gain crucial insights into this accelerating technological shift, understanding why staying informed about AI advancements is no longer optional but essential for modern cybersecurity practitioners.
2:55-3:15 PST
3:15-3:55 PST
Key Topics:
Why It Matters:
Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
3:55-4:15 PST
In today’s rapidly evolving cyber threat landscape, with the increasing role of AI in weaponization of threat vectors, it is paramount for organizations to shift from reactive, breach-focused cybersecurity to a proactive, strategic investment strategy, underpinned by data-driven cyber risk quantification.
During our session, we will share how observations from Verizon’s Data Breach Investigations Report (DBIR) and emerging threats across non-traditional infrastructure such as mobility and IoT can be applied to provide precise, quantifiable data on the cost of cyber threats, helping you prioritize resources and protect your most critical assets to safeguard your business.
We will explore the challenges organizations face today in effectively managing cyber risk and offer an innovative perspective on how organizations can shift their approach to achieving scalable, quantified, data-driven, and results-oriented decision-making to materially improve their cybersecurity ROI and posture.
As a Cybersecurity stakeholder, you’ll gain practical insights to enhance your security posture and make informed decisions that safeguard your infrastructure. Don’t miss the chance to improve your cybersecurity approach and protect your bottom line.
4:15-4:45 PST
4:45-5:30 PST
Discuss and share the latest in cyber protection with our renowned security experts during interactive Panels & Round Table discussions. View our Security Content Sharing portal for past Cybersecurity Summit solutions to protect your business from cyber attacks.
The Cybersecurity Summit connects cutting-edge solution providers with Sr. Executives to analyze & diagnose cybersecurity flaws through interactive panels & roundtable discussions. View the latest presentations given at the Cybersecurity Summit through our Security Content Sharing portal.
The Cybersecurity Summit is proud to be in partnership with some of the industry’s leading organizations in technology, information security, and business leadership.
If your media outlet or association is interested in becoming a strategic industry partner with The Cybersecurity Summit, please contact Franki Rosenthal at Franki.Rosenthal@CyberRiskAlliance.com.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |