Senior Sales Engineer,
Torq
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, March 27, 2025
8:00AM - 5:30PM EDT
Diplomat Beach Resort
Grand Ballroom
3555 South Ocean Drive
Hollywood, FL, 33019
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 5th Annual South Florida Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters: Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Technology Selection, Use, Integration & Orchestration
Key Topics:
• Evaluating and selecting security technologies that align with organizational goals.
• Best practices for integrating new tools into existing security infrastructures.
• Orchestrating technology solutions to maximize their effectiveness and return on investment.
Why It Matters: Choosing, using, and integrating the right technologies is vital for building a robust cybersecurity infrastructure, and Effective technology management optimizes security investments and enhances overall protection against evolving threats.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
2Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
3Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
6A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 EDT
9:00-9:35 EDT
In an era of increasing cyber threats, organizations must move beyond reactive recovery to proactive resilience. Join to explore how modern data protection strategies can enhance incident response, minimize downtime, and ensure business continuity. Through real-world case studies, learn how an integrated, AI-driven approach to security can safeguard your critical assets. What You Will Learn: How to streamline incident response and recovery with integrated security. Real-world lessons from ransomware attacks and credential compromises. The role of AI and automation in accelerating cyber recovery. Strategies to reduce IT complexity and improve cyber resilience.
10:05-10:35 EDT
In this engaging presentation, we will explore the powerful intersection of artificial intelligence (AI) and video analytics in enhancing physical security and how, when combined with cybersecurity systems, we can deliver a comprehensive solution from a single provider. With the evolution of cyber threats, it has become imperative for organizations to adopt innovative approaches to protect their physical infrastructure as well as digital assets. During the presentation, we will delve into industry best practices for protecting digital assets and how AI-based video analytics technologies can revolutionize physical security by providing proactive and intelligent monitoring capabilities. We will also discuss how these technologies leverage computer vision and machine learning to analyze video feeds, detect potential security incidents, and provide qualified alerts in real-time.
10:35-11:00 EDT
11:00-11:30 EDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:30-11:50 EDT
In the ever-evolving landscape of digital transformation, organizations are facing unprecedented challenges in securing and scaling their cryptographic infrastructure. Yet the need for crypto agility has never been more critical as companies grapple with risks posed by advanced technologies such as AI, emerging threats like Post Quantum Cryptography (PQC), and the complex web of compliance mandates, management hurdles, and technology transformations.Join a lively roundtable discussion with a panel of your peers to gain actionable strategies as we explore: -Reducing IT resource burdens and costs through centralized certificate management -Preventing costly business outages and addressing potential security vulnerabilities -Building private and public trust while eliminating human error
11:50-12:10 EDT
12:10-12:30 EDT
Organizations have finally come to grips with the harsh reality that breaches will happen and have begun implementing controls to improve their cyber resiliency. Unfortunately, many are still missing a key piece of the puzzle – implementing proper control around lateral movement to ensure a breach does not go from bad to worse. Learn how organizations are leveraging micro-segmentation to improve their cyber resiliency by:
– Gaining visibility into the critical parts of their attack surface
– Implementing controls to prevent lateral movement and restrict access to systems with sensitive data
– Proactively implementing recovery plans to enable continuity of business operations
– Reducing the stress of reacting to changes within the environment
12:30-1:20 EDT
1:20-1:50 EDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Valerie Perlowitz
Senior Vice President
WiCyS Florida
MODERATOR
Taz Olson
Sr. Director Network Infrastructure Services
Boeing
Edgar Escobar
CIO/COO
Grupo ALTO
David Henning
Global Director Cybersecurity Operations
Hughes
Dr. Eric S. Ackerman, Ph.D.
President
InfraGard South Florida Chapter
Alberto Sanchez
Senior Sales Engineer
Recorded Future
1:50-2:10 EDT
In 2020 our lives changed forever with a global pandemic forcing us all to work from home. This ushered in a new era of how businesses treated information. Overnight, security teams had to figure out how to protect assets and company data while opening many paths into the network. The rapid acceleration of Hybrid Mesh had begun.
Just as we were settling into our new reality, in 2023 AI bursts onto the scene with LLM at the forefront. A massive leap in technology was born, but also presented organizations with completely new risks never before thought of. The LLM revolution had begun.
Now, at the intersection of cybersecurity and artificial intelligence, we find both unprecedented opportunities and untold risks. The rise of large language models (LLMs) and Hybrid Mesh has revolutionized data interaction but has also armed malicious actors with sophisticated tools, and opened more vectors of attack.
So, what’s next? How can we leverage Hybrid Mesh and AI to innovate and thrive in this rapidly evolving landscape? How do we protect it? How do we apply what we learned in the past to secure the future?
I am excited to share with you what Check Point is doing to innovate in these and other areas for many years to come.
2:10-2:30 EDT
Data exfiltration is an existential threat to all organizations, regardless of sector or geography. Unauthorized data exfiltration jeopardizes sensitive information, intellectual property, and customer trust. Cybercriminals, malicious insiders, and sophisticated malware continuously exploit security gaps to extract critical data, often leading to extortion, financial losses, regulatory penalties, and reputational damage. With endpoints serving as prime targets for attackers, organizations must adopt a proactive approach to mitigate this very real threat.
With 94% of all publicized ransomware attacks now exfiltrating data, enterprises must look to new solutions to mitigate the risk. To stay ahead of cybercriminals and protect the data entrusted to them, a multi-layered cybersecurity strategy is critical.
In this session we’ll explore how organizations can prevent ransomware and significantly reduce the risk of data exfiltration by prioritizing real-time monitoring, automated threat detection, specifically for new AI based threats and endpoint hardening. In today’s cyber landscape, safeguarding critical data is not optional—it’s imperative for survival.
Join this session to learn more about:
1. The current state of ransomware – a look at the trends and how data exfiltration has changed the threat of ransomware
2. The benefits of a multi-layered approach
3. Why real-time monitoring and AI-based threat detection are key to prevention
2:30-2:50 EDT
Ransomware attacks continue to be extremely lucrative, with ransom demands and recovery costs bleeding victim organizations for millions of dollars. And things change fast in this space – RaaS groups rise and fall with law enforcement takedowns, or disband and reorganize under different brands, so it can all be a little confusing. Each quarter, the Halcyon team of ransomware experts put together a RaaS power rankings guide for the ransomware threat landscape.
2:50-3:20 EDT
3:20-3:40 EDT
3:40-4:00 EDT
4:00-4:30 EDT
4:30-5:30 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |