CEO and Co-Founder,
Horizon3.ai
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Wed, October 8, 2025
8:00AM - 5:30PM PDT
Santa Clara Marriott
California Ballroom
2700 Mission College Blvd
Santa Clara, CA, 95054
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 10th Edition of the Silicon Valley Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Women in Cyber
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 PDT

9:00-9:35 PDT
Join Snehal Antani, CEO of Horizon3.ai, for an eye-opening session where he’ll discuss real-world examples of what NodeZero discovered in networks just like yours. You’ll hear about how fast and easy it is to compromise some of the largest networks in the world – with full domain takeover – often in minutes, and sometimes, without even exploiting a CVE.
During this session, you’ll learn how attackers:
• Use OSINT and password spraying to takeover systems without ever targeting CVEs.
• Land and expand with legitimate credentials, then poison assets to take over domains.
• Find cloud credentials and use them to compromise cloud services.
9:35-10:05 PDT
As cyber threats evolve at unprecedented speed, the need for robust community-focused cybersecurity education has never been greater. In this session, Chirag Shah, Global Information Security Officer & DPO at Model N, will explore how organizations and individuals can leverage the ERA (Education, Resilience, Awareness) framework to strengthen community cybersecurity. Attendees will learn practical strategies for fostering knowledge-sharing, empowering local networks, and building sustainable programs that enhance digital safety beyond the corporate perimeter. This session highlights the critical role of education in creating resilient, informed communities that can collectively respond to emerging threats.
10:05-10:35 PDT
10:35-11:00 PDT
11:00-11:35 PDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.

11:35-11:55 PDT
Artificial Intelligence is revolutionizing the world at an unprecedented pace—reshaping industries, redefining possibilities, and occasionally, delivering laugh-out-loud failures. But how safe is this brave new world of AI? And what does it mean for businesses, individuals, and society at large? We’ll explore the evolution and proliferation of APIs, the unsung heroes powering mobile apps, supply chain optimization, and the Internet of Things, and the role they play in the future of the internet. Billions of bots silently execute tasks, but at what cost? We’ll dive into the hidden, obvious, and subtle expenses of this automation boom, from operational efficiencies to unforeseen vulnerabilities. And just when you thought DDoS attacks were a thing of the past, we’ll debunk the myth: DDoS isn’t dead—it’s evolving. We’ll discuss why volume still reigns supreme, the rise of sophisticated Layer 7 attacks, and how to stay ahead in this ever-changing landscape. Finally, we’ll look to the future, guided by three principles: Futurize, Unite, Simplify. Join us for an engaging, insightful, and occasionally humorous journey through the cutting-edge technologies shaping tomorrow’s world.

11:55-12:15 PDT
In this session, we’ll explore how a converged SASE platform combined with AI and machine learning (ML) enables real-time threat detection and mitigation, transforming network security from a reactive to a proactive model. The focus will be on how AI-driven solutions within the SASE framework can identify, analyze, and neutralize security threats in real-time across distributed environments.
12:15-12:45 PDT
Bridging the AI Talent & Skills Gap in Cybersecurity Teams
As AI becomes an integral part of cybersecurity operations, the demand for AI-literate security professionals is growing. However, many teams struggle to find and develop talent with the right mix of cybersecurity expertise and AI proficiency. This discussion will explore strategies for addressing the AI skills gap, including upskilling existing security teams, partnering with educational institutions, and leveraging AI-driven security tools effectively. Attendees will share best practices, challenges, and innovative approaches to building a future-ready cybersecurity workforce.
Managing Third-Party & Supply Chain Cyber Risks
Recent high-profile breaches have underscored the vulnerabilities in third-party and supply chain ecosystems. With organizations increasingly dependent on external vendors, ensuring security across the supply chain is more critical than ever.
This discussion will focus on how organizations can enhance vendor risk management, implement effective due diligence strategies, and improve visibility into third-party security practices. Attendees will examine real-world challenges, regulatory considerations, and practical solutions to strengthen resilience against supply chain threats.
12:45-1:35 PDT
1:35-2:10 PDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.

2:10-2:30 PDT
Enterprises have spent decades wrestling with brittle DLP tools, noisy alerts, and checkbox data security policies. Now AI has introduced new blind spots — from Shadow AI sprawl to sensitive data leaks — that legacy approaches can’t contain. Governance gaps, unenforceable policies, and outdated controls aren’t enough to securely enable AI adoption. In this session, Rick Holland (Data & AI Security Officer at Cyera and former Forrester Research analyst) shares scars, humor, and practical steps to reboot data security for the AI age. Attendees will leave with quick wins they can apply immediately, plus a clear roadmap to move beyond checkboxes and protect both data and AI without slowing innovation.

2:30-2:50 PDT
While generative AI has captured headlines, the real breakthrough for GRC professionals lies in multi-agent systems that coordinate specialized reasoning engines behind the scenes. In this session, discover how Trustero’s multi-agent AI architecture transforms weeks of manual compliance analysis into minutes of automated precision. Watch live as our AI extracts requirements from complex regulatory frameworks, converts them into actionable policy questions, and delivers comprehensive gap analysis with full source attribution. Learn how leading organizations are reclaiming thousands of hours per audit cycle—and cutting down on mistakes—while shifting their teams from tedious analysis to strategic risk management. We’ll explore the technical architecture that makes this possible, demonstrate real-world use cases across security and privacy compliance, and share early customer results showing reductions in external consultant dependencies. Whether you’re drowning in manual compliance work or looking to transform your GRC operations, this session reveals how multi-agent AI is reshaping what’s possible in governance, risk, and compliance.
2:50-3:15 PDT
3:15-3:50 PDT
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
3:50-4:15 PDT

4:15-4:45 PDT
4:45-5:30 PDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |








