Code Confident: Advancing Secure Software at Dev Speed

Developers and security teams still struggle to embed security throughout the software lifecycle as threats shift left and right. Vulnerable APIs, insecure dependencies, and supply chain attacks expose gaps between development velocity and assurance.

In partnership with OWASP, this eSummit delivers a roadmap for embedding AppSec into every build. Expert panels and demos will explore software bill of materials (SBOMs), automated testing, and secure-by-design frameworks — helping teams code faster without compromising safety or compliance.

Key Issues Covered at The Official Cybersecurity Summit

Top 6 Reasons to Attend the Cybersecurity Summit

1
Learn

Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.

2
Evaluate Demonstrations

Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.

3
Time, Travel & Money

Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.

4
Engage, Network, Socialize & Share

Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.

5
CEUs / CPE Credits

By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.

6
A Worthwhile Investment

By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.

Questions

For any questions, please contact our
Registration Team.

Sponsor

To sponsor at an upcoming summit, please fill out the
Sponsor Form.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
 
Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
 
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
 
Please note these qualifications pertain to all attendees, including members of our partner organizations.

Agenda

The Official Cybersecurity Summit delivers high-impact sessions designed to help leaders strengthen resilience, protect critical infrastructure, and align security with business goals.

Attendees will gain actionable insights from expert panels, explore cutting-edge solutions, and connect directly with top industry innovators - making this a can’t-miss agenda for CISOs and security executives.

Our Call for Papers is nearly closed—check out last year’s agenda for a sneak peek at what’s to come!

10:00-
Exhibit Hall Opens
12:20-12:40
Lunch Break
2:20-3:05
Panel 3: Securing Agentic Applications — Developer & DevSecOps Frontlines

Building agentic applications means orchestrating models, APIs, data pipelines and external tools — often with autonomous decision-making in the loop. This panel brings together developers and DevSecOps leaders to discuss the architectural and operational challenges of securing these complex systems.

 

Panelists will explore secure-by-design patterns, least-privilege tool invocation, runtime guardrails, AI supply chain transparency, monitoring and drift detection. The discussion will focus on real implementation trade-offs — how to maintain velocity while embedding meaningful security controls into CI/CD and production environments.


2:20-3:05
Panel 1: From Experimentation to Adoption, Implementing AI Security Best Practices

As generative and agentic AI systems transition from experimentation to enterprise-scale deployment, executive leaders are redefining how security, governance and innovation intersect. This panel brings together leaders and senior practitioners for a candid discussion on adopting AI security best practices across complex organizations.

Panelists will share how they are aligning to emerging frameworks, integrating AI risk into enterprise risk management, evaluating AI vendors and balancing oversight with speed. The conversation will explore board-level accountability, regulatory pressures, cross-functional coordination and how to measure AI security maturity in a rapidly evolving landscape.


2:20-3:05
Panel 2: Red Teaming GenAI & Agentic System Evolving Tactics for a New Attack Surface

Agentic and generative AI systems introduce dynamic behaviors that challenge traditional security testing approaches. This practitioner-led panel explores how red teaming methodologies are evolving to address prompt injection, tool misuse, data leakage, memory manipulation and emergent agent behavior.

Panelists will debate structured vs. exploratory testing models, discuss how to define adversarial objectives and measurable outcomes, and examine how continuous validation differs from one-time assessments. The session will also address collaboration between red teams, developers and AI engineers to ensure findings translate into durable mitigations.


2:55-3:05
Networking Break

Speakers

Our speakers bring unmatched expertise and real-world experience in cybersecurity, risk management, and business strategy. Through engaging keynotes, panels, and discussions, they deliver actionable insights and practical solutions that help CISOs and security leaders stay ahead of evolving threats.

Sponsors

The Official Cybersecurity Summit connects innovative solution providers with the cybersecurity leaders who evaluate and influence purchasing decisions. With a dynamic exhibition hall and a packed agenda of interactive panels and engaging sessions, this event offers unmatched opportunities to showcase solutions and build meaningful connections.

Partners

The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.

Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.

Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.

Please note these qualifications pertain to all attendees, including members of our partner organizations.