Identity Virtual Summit

Official Cybersecurity Summit

with full attendance

Wednesday, March 11, 2026

11:00 AM - 4:00 PM EST

Days
Hours
Minutes
Seconds

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE

Standard Admission $95

Questions?

For sponsorship inquiries please complete the following form: Sponsor Form

For assistance with ticket registration contact registration@cybersecuritysummit.com

Identity Is the New Perimeter: Securing Access in a Borderless World

As identity becomes the core of enterprise defense, attackers exploit misconfigurations, overprivileged accounts, and identity sprawl across cloud and on-prem systems. Teams struggle with managing identity risk at scale while ensuring user experience and compliance.

This eSummit provides expert-led guidance on modern IAM, zero-trust architectures, and continuous authentication. From identity threat detection and response (ITDR) to least-privilege automation, attendees will learn how to strengthen the human and machine identities that now define organizational boundaries.

Key Issues Covered at The Official Cybersecurity Summit

Identity Sprawl and Hidden Privilege: Finding (and Fixing) the Access You Don’t Know You Have

In a borderless enterprise, identity risk often hides in plain sight: stale accounts, shadow admins, forgotten service principals, and entitlements that quietly expanded over years of exceptions. This panel tackles the hard operational reality of identity sprawl across cloud and on-prem—how it happens, why it persists, and how attackers exploit it through misconfigurations and privilege chaining. Panelists will share practical approaches to discover effective access, reduce privilege safely, and build guardrails that prevent re-sprawl without breaking the business.

ITDR in Practice: Detecting and Responding to Identity-Driven Attacks Faster Than the Adversary

Identity Threat Detection and Response (ITDR) is becoming essential as attackers bypass endpoints and go straight for credentials, tokens, and identity control planes. This panel explores what “good ITDR” looks like beyond marketing: the telemetry that matters (authentication, token issuance, directory changes, conditional access, API calls), the detections that catch real attacks (impossible travel is not enough), and the response motions that stop blast radius quickly. We’ll also cover how to integrate ITDR with SOC operations, incident response, and cloud security teams.

Continuous Authentication Without Continuous Friction: Marrying User Experience, Compliance, and Zero Trust

Zero trust demands continuous verification—but users and business leaders won’t tolerate endless prompts and broken workflows. This panel examines how organizations can implement continuous authentication and risk-based access in ways that improve security and usability at the same time. Topics include phishing-resistant MFA, device and session posture, step-up authentication, adaptive policies, and designing compliance requirements. Panelists will share lessons learned on reducing helpdesk load, improving adoption, and making “secure by default” feel invisible.

Top 6 Reasons to Attend the Cybersecurity Summit

Learn

Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.

Evaluate Demonstrations

Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.

Time, Travel & Money

Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.

Engage, Network, Socialize & Share

Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.

CEUs / CPE Credits

By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.

A Worthwhile Investment

By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.

Questions

For any questions, please contact our

Sponsor

To sponsor at an upcoming summit, please fill out the

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.

Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.

Please note these qualifications pertain to all attendees, including members of our partner organizations.

Agenda

The Official Cybersecurity Summit delivers high-impact sessions designed to help leaders strengthen resilience, protect critical infrastructure, and align security with business goals.

Attendees will gain actionable insights from expert panels, explore cutting-edge solutions, and connect directly with top industry innovators – making this a can’t-miss agenda for CISOs and security executives.

Opening Keynote with J.D. Miller

J.D. Miller

SVP, Communities Event Programming
CyberRisk Alliance

Keynote Presentation with Delinea: From Static Trust to Governed Autonomy: Rethinking Identity Security for Automation and AI

As enterprises accelerate cloud adoption, automation, and AI-driven workflows, traditional identity and access models are breaking down. Authorization decisions made at login, reinforced by periodic reviews and manual approvals, no longer reflect how work actually happens in modern environments. This keynote explores why static trust fails in high-velocity systems and how identity security must evolve toward continuous, runtime decision-making. It examines the growing role of non-human identities, the limits of human-in-the-loop controls, and how organizations can safely introduce autonomy without sacrificing governance or accountability.

Jeff Carpenter

Cybersecurity Evangelist and Principal Product Marketing Manager
Delinea

Google Cloud Presentation: The Agentic Identity Crisis: Securing the New Non-Human Workforce

As AI moves from “chatting” to “doing,” we are witnessing the birth of a new class of identity: the Agent. Unlike traditional service accounts, agents act with human-like autonomy but machine-speed risk. This session breaks down the three critical authentication patterns for the agentic era—from user-delegated OAuth to the emerging Model Context Protocol (MCP)—and provides a blueprint for preventing “identity hijacking” in multi-agent ecosystems

Christine Sizemore

Cloud Security Solution Architect
Google

Rubrik Presentation: Protecting IdPs against today's cyberattacks

As attackers increasingly focus on identity-based attacks, traditional defenses are no longer enough. This session helps attendees gain insight into how adversaries exploit misconfigurations, legacy protocols, and operational gaps to move laterally and establish persistence. The discussion then shifts to practical defense strategies, covering prevention, detection, and recovery techniques that security and IT teams can apply in real-world environments. Attendees will leave with a clear understanding of what is needed to protect their IdPs in today’s threat landscape, along with actionable steps to strengthen identity resilience within their organization.

Alexandra Weaver

GTM Tech Lead - Laminar
Rubrik

Wiz Presentation: Outpacing Attackers: Automated AI Threat Investigation

Cloud attacks are shrinking from days to hours, supercharged by AI-driven tactics. Security teams must respond at the same machine speed — with deeper, more connected context than ever before. This session unveils the Wiz SecOps AI Agent, an engine that automatically investigates cloud threats, providing clear verdicts and in-depth explanations. Learn why autonomous investigation isn’t just an efficiency gain — it’s becoming a competitive necessity for modern cloud security.

Tal Moriah

Product Marketing Manager
Wiz

Lunch

Panel 1: Identity Sprawl and Hidden Privilege: Finding (and Fixing) the Access You Don’t Know You Have

In a borderless enterprise, identity risk often hides in plain sight: stale accounts, shadow admins, forgotten service principals, and entitlements that quietly expanded over years of exceptions. This panel tackles the hard operational reality of identity sprawl across cloud and on-prem—how it happens, why it persists, and how attackers exploit it through misconfigurations and privilege chaining. Panelists will share practical approaches to discover effective access, reduce privilege safely, and build guardrails that prevent re-sprawl without breaking the business.

V. Venesulia Carr

CEO
Vicar Group, LLC
Moderator

Thomas Hart

CISO
Cyber Guide

Yosi Attias

President
ISSA south florida

Ping Identity Presentation: Agents Among Us: Building Trust in the Age of Agentic AI

In the era of agentic AI, organizations are faced with a brand new class of users that bring great opportunity but even greater security risks. As AI agents – from internally-deployed digital workers to third-party computer-using agents – proliferate, traditional approaches to oversight and accountability may no longer suffice. The challenge is not just about mitigating risk, but about creating the right conditions for AI to be adopted responsibly, transparently, and in alignment with enterprise values and goals. How do you establish a foundation of digital trust that empowers innovation while maintaining control, clarity, and confidence across the organization?

Alex Laurie

SVP of Global Sales Engineering
Ping Identity

Innovation Spotlight - BeyondTrust: Modern Approach to Identity Security

As threats have evolved so too has the approach to Modern Identity Security. A Privilege-Centric approach must be adopted and considered with this evolution. Identity and user management for all accounts within an organization must mature to meet the demands of the cloud, nonhuman identities, Agentic AI and modern attack vectors. Your PAM strategy must now manage and mitigate not only traditional privileged access (root and admin) but also attacks against identities with a path to privileged access. These paths to privilege still remain one of the most valuable targets for cybercriminals because many organizations are defending their environments with fragmented or siloed security strategies and solutions. Security gaps and risks lie in endpoints, cloud environments, Saas Applications, third-party access and now Agentic AI and NHI which make the battleground even harder to defend.

Identity Security builds on the foundation of defense-in-depth, coupling visibility with least privilege and Zero Trust while addressing critical risks with priority and exposing less-than critical risks for awareness. Leverage a strategy that works, improves compliance, helps meet cyber insurance mandates, enhances security posture, while giving you the visibility needed to protect your environment.

Christopher Hills

Chief Security Strategist
BeyondTrust

Panel 2: ITDR in Practice: Detecting and Responding to Identity-Driven Attacks Faster Than the Adversary

Identity Threat Detection and Response (ITDR) is becoming essential as attackers bypass endpoints and go straight for credentials, tokens, and identity control planes. This panel explores what “good ITDR” looks like beyond marketing: the telemetry that matters (authentication, token issuance, directory changes, conditional access, API calls), the detections that catch real attacks (impossible travel is not enough), and the response motions that stop blast radius quickly. We’ll also cover how to integrate ITDR with SOC operations, incident response, and cloud security teams.

V. Venesulia Carr

CEO
Vicar Group, LLC
Moderator

Ankit Gupta

Senior Security Engineer
Exeter Finance LLC

Fireside chat with Jeff Steadman, Host & Producer, Director, Identity at the Center & RSM: The Identity Pulse: Moving Beyond Authentication to Continuous Identity

In the modern enterprise, identity is no longer a “check-in” event; it is a persistent, evolving state. While traditional IAM focuses on point-in-time authentication, the threat landscape of 2026—characterized by session hijacking, adversary-in-the-middle attacks, and AI-driven impersonation—requires a transition to Continuous Identity. This model moves beyond the initial login to provide ongoing evaluation of authorization, risk, and context throughout the entire duration of a user’s presence.

Join Jeff Steadman, host of the Identity at the Center podcast, and special guest for a 30-minute exploration of what it means to maintain a continuous identity fabric. This fireside chat peels back the layers of real-time security signals, shifting the focus from “who (or what) are you at 9:00 AM?” to “should you (or it) still be doing this at 2:00 PM?”

Attendees will learn:

  • Identity vs. Authentication: Why Continuous Identity is about more than just re-verifying credentials—it’s about the continuous evaluation of the entire identity context.
  • The Shared Signals Ecosystem: How CAEP and the Shared Signals Framework allow the Identity Provider to act as a dynamic orchestrator of trust.
  • The “Kill Switch” Narrative: A technical walkthrough of how a compromise detected mid-session results in immediate, cross-platform remediation.
  • The Future of Human & Machine Identity: How continuous principles apply to the new world of autonomous AI agents and automated workflows.

Jeff Steadman

Host
Identity at the Center

Panel 3: Continuous Authentication Without Continuous Friction: Marrying User Experience, Compliance, and Zero Trust

Zero trust demands continuous verification—but users and business leaders won’t tolerate endless prompts and broken workflows. This panel examines how organizations can implement continuous authentication and risk-based access in ways that improve security and usability at the same time. Topics include phishing-resistant MFA, device and session posture, step-up authentication, adaptive policies, and designing compliance requirements. Panelists will share lessons learned on reducing helpdesk load, improving adoption, and making “secure by default” feel invisible.

V. Venesulia Carr

CEO
Vicar Group, LLC
Moderator

Andrew Candella

Senior Analyst, Identity Management
Ciena

Gary Orenstein

Chief Customer Officer
Bitwarden

Debayan Basu

Principal Engineer, IAM
Genuine Parts Company

Closing Keynote Presentation

J.D. Miller

SVP, Communities Event Programming
CyberRisk Alliance

Speakers

Our speakers bring unmatched expertise and real-world experience in cybersecurity, risk management, and business strategy. Through engaging keynotes, panels, and discussions, they deliver actionable insights and practical solutions that help CISOs and security leaders stay ahead of evolving threats.

Yosi Attias

President
ISSA south florida

Debayan Basu

Principal Engineer, IAM
Genuine Parts Company

Andrew Candella

Senior Analyst, Identity Management
Ciena

Jeff Carpenter

Cybersecurity Evangelist and Principal Product Marketing Manager
Delinea

Ankit Gupta

Senior Security Engineer
Exeter Finance LLC

Thomas Hart

CISO
Cyber Guide

Christopher Hills

Chief Security Strategist
BeyondTrust

Alex Laurie

SVP of Global Sales Engineering
Ping Identity

J.D. Miller

SVP, Communities Event Programming
CyberRisk Alliance

Tal Moriah

Product Marketing Manager
Wiz

Gary Orenstein

Chief Customer Officer
Bitwarden

Christine Sizemore

Cloud Security Solution Architect
Google

Jeff Steadman

Host
Identity at the Center

V. Venesulia Carr

CEO
Vicar Group, LLC

Alexandra Weaver

GTM Tech Lead - Laminar
Rubrik