Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Questions?
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
As identity becomes the core of enterprise defense, attackers exploit misconfigurations, overprivileged accounts, and identity sprawl across cloud and on-prem systems. Teams struggle with managing identity risk at scale while ensuring user experience and compliance.
This eSummit provides expert-led guidance on modern IAM, zero-trust architectures, and continuous authentication. From identity threat detection and response (ITDR) to least-privilege automation, attendees will learn how to strengthen the human and machine identities that now define organizational boundaries.
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our
To sponsor at an upcoming summit, please fill out the
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
The Official Cybersecurity Summit delivers high-impact sessions designed to help leaders strengthen resilience, protect critical infrastructure, and align security with business goals.
Attendees will gain actionable insights from expert panels, explore cutting-edge solutions, and connect directly with top industry innovators – making this a can’t-miss agenda for CISOs and security executives.

SVP, Communities Event Programming
CyberRisk Alliance

Cybersecurity Evangelist and Principal Product Marketing Manager
Delinea

Cloud Security Solution Architect
Google

GTM Tech Lead - Laminar
Rubrik

Product Marketing Manager
Wiz

CEO
Vicar Group, LLC
Moderator

CISO
Cyber Guide

President
ISSA south florida

SVP of Global Sales Engineering
Ping Identity
As threats have evolved so too has the approach to Modern Identity Security. A Privilege-Centric approach must be adopted and considered with this evolution. Identity and user management for all accounts within an organization must mature to meet the demands of the cloud, nonhuman identities, Agentic AI and modern attack vectors. Your PAM strategy must now manage and mitigate not only traditional privileged access (root and admin) but also attacks against identities with a path to privileged access. These paths to privilege still remain one of the most valuable targets for cybercriminals because many organizations are defending their environments with fragmented or siloed security strategies and solutions. Security gaps and risks lie in endpoints, cloud environments, Saas Applications, third-party access and now Agentic AI and NHI which make the battleground even harder to defend.
Identity Security builds on the foundation of defense-in-depth, coupling visibility with least privilege and Zero Trust while addressing critical risks with priority and exposing less-than critical risks for awareness. Leverage a strategy that works, improves compliance, helps meet cyber insurance mandates, enhances security posture, while giving you the visibility needed to protect your environment.

Chief Security Strategist
BeyondTrust

CEO
Vicar Group, LLC
Moderator

Senior Security Engineer
Exeter Finance LLC
In the modern enterprise, identity is no longer a “check-in” event; it is a persistent, evolving state. While traditional IAM focuses on point-in-time authentication, the threat landscape of 2026—characterized by session hijacking, adversary-in-the-middle attacks, and AI-driven impersonation—requires a transition to Continuous Identity. This model moves beyond the initial login to provide ongoing evaluation of authorization, risk, and context throughout the entire duration of a user’s presence.
Join Jeff Steadman, host of the Identity at the Center podcast, and special guest for a 30-minute exploration of what it means to maintain a continuous identity fabric. This fireside chat peels back the layers of real-time security signals, shifting the focus from “who (or what) are you at 9:00 AM?” to “should you (or it) still be doing this at 2:00 PM?”
Attendees will learn:

Host
Identity at the Center

CEO
Vicar Group, LLC
Moderator

Senior Analyst, Identity Management
Ciena

Chief Customer Officer
Bitwarden

Principal Engineer, IAM
Genuine Parts Company

SVP, Communities Event Programming
CyberRisk Alliance

President
ISSA south florida

Principal Engineer, IAM
Genuine Parts Company

Senior Analyst, Identity Management
Ciena

Cybersecurity Evangelist and Principal Product Marketing Manager
Delinea

Senior Security Engineer
Exeter Finance LLC

CISO
Cyber Guide

Cybersecurity Evangelist and Principal Product Marketing Manager
Delinea

Senior Security Engineer
Exeter Finance LLC

CISO
Cyber Guide