The 14th Edition of the Atlanta Official Cybersecurity Summit is the must-attend event for CISOs and senior leaders looking to strengthen resilience, reduce risk, and align security with business goals. Join top executives, innovators, and experts for a full day of actionable insights, cutting-edge solutions, and high-impact networking. Experience interactive panels, exclusive solution showcases, and strategic discussions that go beyond theory to deliver real-world results, all complemented by a catered breakfast, networking lunch, and closing cocktail reception.

Featured Speakers

Key Issues Covered at The Official Cybersecurity Summit

AI, Automation, and Emerging-Tech Risk (and Opportunity)

As artificial intelligence, automation, and new digital technologies accelerate across every industry, cybersecurity leaders face both unprecedented risk and powerful opportunity. The summit will explore how Cybersecurity leaders and their teams can harness emerging technologies to strengthen resilience, streamline operations, and stay ahead of adversaries who are equally quick to innovate. Attendees will gain insight into real-world applications of AI for threat detection, incident response, and decision intelligence, while learning how to identify and mitigate the new classes of vulnerabilities these tools introduce.

From generative AI and large language models to autonomous security systems and deepfake detection, these discussions will separate hype from reality. Experts will share practical frameworks for governing AI responsibly, managing data integrity, and aligning innovation with enterprise risk management. The conversations will help cybersecurity executives navigate the complex balance between embracing emerging technology for competitive advantage and ensuring it doesn’t become their next threat vector.

Key Takeaways:
• Learn how AI and automation are transforming threat detection, incident response, and security operations in measurable ways.
• Practical strategies for managing and mitigating new risks created by emerging technologies like generative AI and autonomous systems.
• Frameworks for responsible AI governance, including data integrity, transparency, and regulatory alignment.
• Real-world examples of organizations balancing innovation with security and risk management priorities.
• Actionable insights cybersecurity leaders can take back to their teams to prepare for the next wave of AI-driven threats and opportunities.

Supply Chain, Third-Party Ecosystem, and Identity Attack Surface

As organizations expand their digital ecosystems, the lines between internal and external risk are rapidly disappearing. Today’s threat actors know that the fastest way into a network isn’t always through the front door. From compromised vendors and cloud integrations to weak identity controls, attackers are exploiting every link in the chain. The summit brings cybersecurity leaders together to unpack how supply chain vulnerabilities, third-party dependencies, and identity-based risks are converging to create a complex and often underestimated attack surface.

Cybersecurity executives will explore real-world examples of cascading breaches, lessons learned from managing large vendor ecosystems, and emerging frameworks for continuous third-party risk monitoring. The discussions highlight strategies for mapping hidden connections, enforcing stronger identity governance, and building resilience through transparency and collaboration. Attendees will walk away with practical insights for reducing exposure and strengthening trust across every part of their digital supply chain.

Key Takeaways:
• Understand how interconnected supply chains and third-party vendors expand your organization’s attack surface.
• Learn proven methods to assess, monitor, and mitigate risks across your extended digital ecosystem.
• Explore best practices for managing identity as the new security perimeter, including zero trust and access governance strategies.
• Gain insights from real-world breach scenarios that reveal common breakdowns in vendor and identity controls.
• Leave with an actionable framework to improve third-party risk visibility, strengthen resilience, and build more secure partnerships.

Resilience, Risk, and Results: Aligning Security with Business Outcomes

In today’s threat landscape, resilience is more than just recovery - it’s readiness, adaptability, and alignment with the business mission. The summit explores how forward-thinking cybersecurity executives are quantifying cyber risk to drive smarter investments and communicate value in business terms. By translating technical controls into measurable business impact, cybersecurity leaders are helping their organizations make data-driven decisions that balance protection with performance.

Join top executives and thought leaders for in-depth discussions on the frameworks, metrics, and real-world practices shaping the next generation of cyber resilience. From risk quantification models to boardroom-ready reporting, this conversation will reveal how leading security teams are reframing cybersecurity as a strategic business enabler - bridging the gap between risk reduction and results.

Key Takeaways:
• Learn how to translate cybersecurity metrics into meaningful business outcomes that resonate with executive leadership and the board.
• Explore practical approaches to cyber risk quantification that help prioritize investments and justify budget decisions.
• Understand how resilience strategies can align with overall business continuity and growth objectives.
• Gain insights from leading CISOs on how they communicate security value across the organization to drive engagement and accountability.
• Discover frameworks and tools that connect operational security performance with measurable business impact.

Top 6 Reasons to Attend the Cybersecurity Summit

1
Learn

Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.

2
Evaluate Demonstrations

Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.

3
Time, Travel & Money

Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.

4
Engage, Network, Socialize & Share

Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.

5
CEUs / CPE Credits

By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.

6
A Worthwhile Investment

By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.

Questions

For any questions, please contact our
Registration Team.

Sponsor

To sponsor at an upcoming summit, please fill out the
Sponsor Form.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
 
Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
 
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
 
Please note these qualifications pertain to all attendees, including members of our partner organizations.

Agenda

The Official Cybersecurity Summit delivers high-impact sessions designed to help leaders strengthen resilience, protect critical infrastructure, and align security with business goals.

Attendees will gain actionable insights from expert panels, explore cutting-edge solutions, and connect directly with top industry innovators - making this a can’t-miss agenda for CISOs and security executives.

8:00-9:00
Networking Breakfast
9:00-9:10
Welcoming Remarks
9:10-9:40
Keynote Presentation with Cerby: Securing the Last Mile: Automating Identity for Disconnected Apps

Despite billions spent annually on IAM, PAM, and IGA tools, more than 40% of enterprise applications remain outside the identity perimeter. Critical platforms—social media apps, vendor portals, legacy tools, and other disconnected apps—lack SAML, SCIM, or API support. These “last mile” gaps create dangerous patterns: weak or reused passwords, unmanaged privileged accounts, incomplete deprovisioning, and widespread credential sharing. The result? Elevated breach risk and compliance exposure.    

In this session, Donovan Blaylock will expose why disconnected apps are one of today’s biggest blind spots in identity security. He’ll share how leading enterprises are closing these gaps with automation—eliminating manual credential management, streamlining provisioning and deprovisioning, enforcing MFA without added friction, and securing high-risk shared accounts like corporate social media.    

Attendees will leave with practical strategies to extend their identity perimeter to every app—without custom connectors or hidden license costs—and learn how to reduce risk, save time, and strengthen compliance across their organization’s most vulnerable access points.


9:40-10:00
Keynote Presentation with Sonatype: The New Transparency Baseline: AI Governance, and Software Trust in 2026

AI has fundamentally changed what regulators, customers, and boards expect organizations to know — and prove — about the software they ship. In 2026, transparency is no longer a differentiator; it’s the baseline. From the EU Cyber Resilience Act to evolving U.S. guidance, organizations are under growing pressure to demonstrate how AI-enabled software is built, governed, and secured across the supply chain.  

This session takes a candid look at the emerging reality of AI governance and software trust. Drawing on patterns Sonatype observes across thousands of development teams, we’ll explore how organizations are responding to new compliance expectations, where governance efforts break down, and what “good” looks like in practice. We’ll examine how transparency artifacts (including SBOMs) fit into broader governance programs — and why many fail to translate into real risk reduction or audit readiness.  

Attendees will learn:

- How AI governance and software transparency expectations are evolving in 2026

- What regulators and customers increasingly expect organizations to prove

- Common gaps that undermine AI and software trust initiatives

- Practical approaches to operationalizing transparency for compliance, risk reduction, and long-term trust


10:00-10:15
Needling Presentation: "Shall I Certify You Sir?"

"Shall I Certify You, Sir?" explores the certification landscape and how it has changed, identifying opportunities, consequences, and challenges most companies will need to plan for when seeking certification to a standard or framework. It will provide the advantages so that you can speak to your organization about the return on investment certification will bring and how to provide value to the certification process.


10:15-10:35
Akamai Presentation: It’s Not the Breach. It's the Spread. Improving Cyber Resilience in Your Organization

This session explores the critical role of cyber resiliency in helping organizations withstand and recover from today’s evolving threats. Participants will dive into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets, while also examining how compliance regulations can enhance security and safeguard sensitive data.  In this session you will:  Explore strategies to reduce attack surfaces and secure critical IT assets  Learn how network visualization strengthens resiliency  Understand how compliance regulations can enhance security and protect sensitive data  Gain actionable insights to strengthen security posture, minimize vulnerabilities, and prepare for future challenges


10:35-11:05
Networking Break
11:05-11:35
Panel 1: AI and Emerging Tech at the 2026 Security Frontline

Abstract
AI and new digital technologies will continue to shift the cybersecurity landscape in 2026. This session explores how modern tools can enhance detection, response, and decision making while introducing new risks tied to generative systems, data integrity, and fast moving threat innovation. Leaders will gain a clear view of how to adopt emerging technology in a responsible and strategic way that supports resilience and aligns with enterprise risk goals.

Key Takeaways
• How AI and emerging tech are reshaping core security functions
• The new risks created by generative models and evolving attack techniques
• Practical governance steps that support responsible AI use
• Examples of organizations pairing innovation with disciplined risk management


11:35-11:55
Forcepoint Presentation: Operationalizing AI; A Data-First Approach

11:55-12:15
Trend AI Presentation: Security Teams That See Around Corners: Mitigating AI Risk in Real Time

From vibe coding and autonomous agents to generative chatbots in everyday workflows, AI adoption is constant and occurring at a pace that most security programs have not been able to realistically govern. Well-intentioned employees, misaligned agents, overly permissive access, and weak data controls are introducing new forms of risk, often without malicious intent. At the same time, adversaries are actively probing these gaps through indirect prompt injection and jailbreaking techniques. But there's good news too. More often than not, failures leave signals long before they become significant incidents. In this session, you’ll learn how an AI security blueprint can help you identify emerging risk, align controls to new AI projects, and ensure adoption and deployment happen securely without impacting speed or access.


12:15-12:35
Rubrik Presentation: A Resilient Path Through Emerging Agentic Risks

By 2028, Gartner predicts that 15% of daily business decisions will be made autonomously by AI agents — creating new risk surfaces with direct operational impact. CIOs must extend resilience practices to agentic AI by quantifying agent risk, capturing and monitoring agent activity, and preparing recovery playbooks that reverse unauthorized or harmful agent actions. This holistic approach ensures workflows remain intact, data integrity is preserved, and business continuity is upheld—even when AI agents misstep.

Join this session to learn:

  •  How to set resilience standards for AI agents to align with enterprise risk
  •  Proven strategies for detecting and containing rogue or unintended AI behavior
  •  Playbooks for rapid rollback and business continuity when AI disrupts workflows

12:35-1:35
Lunch
1:35-2:05
Panel 2: Securing the Extended Ecosystem: Supply Chains, Vendors, and Identities

Abstract:
As organizations expand their digital ecosystems, risks extend far beyond internal networks. Threat actors are increasingly exploiting supply chains, third-party vendors, and identity gaps to gain access. This session brings together cybersecurity leaders and solution providers to explore how these interwoven risks create a complex attack surface -and how technology can help mitigate them.

Panelists will share real-world examples, lessons from managing large vendor networks, and innovative tools and frameworks for continuous risk assessment. Discussions will highlight strategies for mapping hidden dependencies, enforcing strong identity governance, and strengthening resilience through automation, collaboration, and transparency. Attendees will gain actionable insights on reducing exposure, improving third-party risk visibility, and leveraging technology to secure their extended digital ecosystem.

Key Takeaways:
• Understand how supply chains, vendors, and identities amplify organizational risk.
• Explore practical methods and tools for assessing, monitoring, and mitigating third-party and ecosystem vulnerabilities.
• Learn how to treat identity as a security perimeter using zero trust, access governance, and automated solutions.
• Gain insights from real-world breaches that reveal common gaps in vendor and identity controls.
• Walk away with a technology-informed framework to enhance resilience, secure partnerships, and reduce exposure across your digital ecosystem.


2:05-2:25
Varonis Presentation: AI Security is Data Security: The New Reality of Cybersecurity

AI is reshaping cybersecurity at a pace most organizations can’t match, giving attackers new ways to automate reconnaissance, exploit misconfigurations, and accelerate data theft while turning everyday systems and AI agents into high‑risk access points. This session explores how AI can also be a powerful defense — helping teams gain visibility into sensitive data, classify it at scale, right‑size access, and detect emerging threats faster.


2:25-2:35
Prime Security Presentation: The Security Visibility Gap: Why "Shifting Left" Isn't Enough

For years, the industry has focused on "shifting left" by integrating security checks into the coding process. However, even with 100% code coverage, organizations still face significant risks because the most critical vulnerabilities are often decided long before a developer ever opens an IDE. These "architecture-level" risks are frequently missed because they are buried in project requirements and design documents that security teams don't have the time or tools to review. In this session, we’ll discuss how to move beyond reactive code scanning by identifying and mitigating risks at the design phase.


2:35-2:45
Huntress Labs Presentation: Defending the Rest of Us Resilience for Organizations of All Sizes

News headlines show you the breaches at massive corporations, but it’s everyday organizations that face the most threats. Adversaries prey on the human psyche and use AI to advance their tactics and target the companies that keep our communities running.  For these companies, a ransomware or BEC attack isn’t just a stressful event—it’s the reason they can’t make payroll. This session explores how hackers plan to win, and why you don’t need a massive budget to fight back.  We’ll get into how Huntress brings cyber resilience through a powerful combo of purpose-built technology and human SOC expertise to stop threats before they cause damage—because organizations of ALL sizes deserve a fighting chance against attackers.


2:45-3:15
Networking Break
3:15-3:45
Fireside Chat with Jennifer Raiford, CISO & CEO, Globe-Sec Advisory

3:45-3:55
SpyCloud Presentation: Inside the Criminal Underground: Data-Driven Identity Threat Protection

Many of today’s identity security gaps stem from exposed data you can’t easily see – harvested from malware-infected devices and successful phishing campaigns targeting your employees, contractors, and suppliers. Criminals operationalize this data to carry out targeted cyberattacks, using it to deploy ransomware, steal sensitive data and critical IP, and quietly establish persistent access.These identity assets enable attackers to create synthetic identities, impersonate trusted users, bypass security controls, and move laterally across applications and systems with alarming efficiency.     In this session, we’ll explore how these identity assets come together to form an attack surface that traditional controls can’t fully cover. Drawing from SpyCloud’s insights into the criminal underground and the cybercrime economy, we’ll share practical tips on what you need to know to better defend your organization from identity threats in 2026.


3:55-4:15
Presentation with Jennifer Raiford, CISO & CEO, Globe-Sec Advisory: Digital Deterrence: Rebuilding Trust in a World Where Reality Is Hackable

By 2026, synthetic reality, autonomous AI agents, and machine‑speed cyber operations have collapsed the boundaries between truth and deception. In this keynote, Jennifer Raiford — CEO of GLOBE‑SEC, Chief Digital Trust & Risk Officer, and widely known as the Olivia Pope of Cyber and AI — unveils the emerging doctrine of digital deterrence. She explores how nations, enterprises, and critical infrastructure must adapt to adversaries that don’t sleep, don’t negotiate, and don’t need human operators. Drawing on national‑level advisory work, the GLOBE‑SEC Methodology, and cryptographic trust architectures like Enigma.io ($ENX), she outlines a new operating system for sovereignty, resilience, and verifiable truth. This session reframes cybersecurity as a strategic instrument of power — and digital trust as the defining currency of the next decade.


4:15-5:15
Networking Reception

Speakers

Our speakers bring unmatched expertise and real-world experience in cybersecurity, risk management, and business strategy. Through engaging keynotes, panels, and discussions, they deliver actionable insights and practical solutions that help CISOs and security leaders stay ahead of evolving threats.

Sponsors

The Official Cybersecurity Summit connects innovative solution providers with the cybersecurity leaders who evaluate and influence purchasing decisions. With a dynamic exhibition hall and a packed agenda of interactive panels and engaging sessions, this event offers unmatched opportunities to showcase solutions and build meaningful connections.

Partners

The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.

Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.

Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.

Please note these qualifications pertain to all attendees, including members of our partner organizations.