The 13th Annual Dallas Official Cybersecurity Summit is the must-attend event for CISOs and senior leaders looking to strengthen resilience, reduce risk, and align security with business goals. Join top executives, innovators, and experts for a full day of actionable insights, cutting-edge solutions, and high-impact networking. Experience interactive panels, exclusive solution showcases, and strategic discussions that go beyond theory to deliver real-world results, all complemented by a catered breakfast, networking lunch, and closing cocktail reception.

Featured Speakers

Key Issues Covered at The Official Cybersecurity Summit

AI, Automation, and Emerging-Tech Risk (and Opportunity)

As artificial intelligence, automation, and new digital technologies accelerate across every industry, cybersecurity leaders face both unprecedented risk and powerful opportunity. The summit will explore how Cybersecurity leaders and their teams can harness emerging technologies to strengthen resilience, streamline operations, and stay ahead of adversaries who are equally quick to innovate. Attendees will gain insight into real-world applications of AI for threat detection, incident response, and decision intelligence, while learning how to identify and mitigate the new classes of vulnerabilities these tools introduce.

From generative AI and large language models to autonomous security systems and deepfake detection, these discussions will separate hype from reality. Experts will share practical frameworks for governing AI responsibly, managing data integrity, and aligning innovation with enterprise risk management. The conversations will help cybersecurity executives navigate the complex balance between embracing emerging technology for competitive advantage and ensuring it doesn’t become their next threat vector.

Key Takeaways:
• Learn how AI and automation are transforming threat detection, incident response, and security operations in measurable ways.
• Practical strategies for managing and mitigating new risks created by emerging technologies like generative AI and autonomous systems.
• Frameworks for responsible AI governance, including data integrity, transparency, and regulatory alignment.
• Real-world examples of organizations balancing innovation with security and risk management priorities.
• Actionable insights cybersecurity leaders can take back to their teams to prepare for the next wave of AI-driven threats and opportunities.

Supply Chain, Third-Party Ecosystem, and Identity Attack Surface

As organizations expand their digital ecosystems, the lines between internal and external risk are rapidly disappearing. Today’s threat actors know that the fastest way into a network isn’t always through the front door. From compromised vendors and cloud integrations to weak identity controls, attackers are exploiting every link in the chain. The summit brings cybersecurity leaders together to unpack how supply chain vulnerabilities, third-party dependencies, and identity-based risks are converging to create a complex and often underestimated attack surface.

Cybersecurity executives will explore real-world examples of cascading breaches, lessons learned from managing large vendor ecosystems, and emerging frameworks for continuous third-party risk monitoring. The discussions highlight strategies for mapping hidden connections, enforcing stronger identity governance, and building resilience through transparency and collaboration. Attendees will walk away with practical insights for reducing exposure and strengthening trust across every part of their digital supply chain.

Key Takeaways:
• Understand how interconnected supply chains and third-party vendors expand your organization’s attack surface.
• Learn proven methods to assess, monitor, and mitigate risks across your extended digital ecosystem.
• Explore best practices for managing identity as the new security perimeter, including zero trust and access governance strategies.
• Gain insights from real-world breach scenarios that reveal common breakdowns in vendor and identity controls.
• Leave with an actionable framework to improve third-party risk visibility, strengthen resilience, and build more secure partnerships.

Resilience, Risk, and Results: Aligning Security with Business Outcomes

In today’s threat landscape, resilience is more than just recovery - it’s readiness, adaptability, and alignment with the business mission. The summit explores how forward-thinking cybersecurity executives are quantifying cyber risk to drive smarter investments and communicate value in business terms. By translating technical controls into measurable business impact, cybersecurity leaders are helping their organizations make data-driven decisions that balance protection with performance.

Join top executives and thought leaders for in-depth discussions on the frameworks, metrics, and real-world practices shaping the next generation of cyber resilience. From risk quantification models to boardroom-ready reporting, this conversation will reveal how leading security teams are reframing cybersecurity as a strategic business enabler - bridging the gap between risk reduction and results.

Key Takeaways:
• Learn how to translate cybersecurity metrics into meaningful business outcomes that resonate with executive leadership and the board.
• Explore practical approaches to cyber risk quantification that help prioritize investments and justify budget decisions.
• Understand how resilience strategies can align with overall business continuity and growth objectives.
• Gain insights from leading CISOs on how they communicate security value across the organization to drive engagement and accountability.
• Discover frameworks and tools that connect operational security performance with measurable business impact.

Top 6 Reasons to Attend the Cybersecurity Summit

1
Learn

Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.

2
Evaluate Demonstrations

Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.

3
Time, Travel & Money

Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.

4
Engage, Network, Socialize & Share

Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.

5
CEUs / CPE Credits

By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.

6
A Worthwhile Investment

By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.

Questions

For any questions, please contact our
Registration Team.

Sponsor

To sponsor at an upcoming summit, please fill out the
Sponsor Form.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
 
Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
 
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
 
Please note these qualifications pertain to all attendees, including members of our partner organizations.

Agenda

The Official Cybersecurity Summit delivers high-impact sessions designed to help leaders strengthen resilience, protect critical infrastructure, and align security with business goals.

Attendees will gain actionable insights from expert panels, explore cutting-edge solutions, and connect directly with top industry innovators - making this a can’t-miss agenda for CISOs and security executives.

8:00-9:00
Networking Breakfast
9:00-9:05
Welcome
9:05-9:10
Welcoming Remarks
9:10-9:40
Fireside chat with Scot Miller, CISO, Mr. Cooper: Security Culture That Scales, Practical Leadership for Stronger Cyber Teams

In this fireside chat, Scot Miller, CISO at Mr. Cooper, joins J.D. Miller, SVP at CyberRisk Alliance, for an open and practical dialogue on how security leaders can intentionally build culture and grow as leaders. While technology continues to change, the foundation of effective cybersecurity remains deeply human, rooted in trust, clarity, and authentic leadership.

Miller will share actionable tools and leadership practices that help strengthen security culture, improve governance, and empower teams to perform at a higher level. This conversation is designed to equip security leaders with ideas they can apply immediately, from fostering accountability and resilience to creating an environment where people feel connected, trusted, and motivated to protect the organization together.


9:40-10:15
Keynote Presentation with LevelBlue: Thousands of Incidents Later - Lessons Learned from the Frontlines of Incident Response

In this presentation, LevelBlue Digital Forensics and Incident Response Manager, draws from extensive experience investigating thousands of cyber incidents to share practical insights on high-volume incident response. The talk explores key lessons learned from real-world investigations, highlighting common patterns, recurring challenges, and the importance of structured approaches when dealing with frequent security events. Attendees will hear about proven best practices for effective triage, prioritization, and coordination during investigations, as well as strategies for improving overall response maturity — such as refining processes, leveraging available tools and intelligence, and conducting thorough post-incident reviews to strengthen defenses over time. Through anonymized war stories from the field, the session illustrates how seemingly routine matters can escalate, the value of quick but measured decision-making, and the critical role of preparation and teamwork in containing impact and supporting recovery. These relatable accounts underscore broader takeaways applicable to organizations of various sizes and sectors. Ideal for security professionals, incident responders, and leadership looking to build or enhance their investigative and response capabilities in environments where incidents are frequent and demands are high.


10:15-10:25
Innovation Spotlight - Huntress Labs: Defending the Rest of Us Resilience for Organizations of All Sizes

News headlines show you the breaches at massive corporations, but it’s everyday organizations that face the most threats. Adversaries prey on the human psyche and use AI to advance their tactics and target the companies that keep our communities running.  For these companies, a ransomware or BEC attack isn’t just a stressful event—it’s the reason they can’t make payroll. This session explores how hackers plan to win, and why you don’t need a massive budget to fight back.  We’ll get into how Huntress brings cyber resilience through a powerful combo of purpose-built technology and human SOC expertise to stop threats before they cause damage—because organizations of ALL sizes deserve a fighting chance against attackers.


10:25-10:45
Sophos Presentation: From Breach to Business Impact: What the 2026 Active Adversary Report Means for Leaders

Based on frontline investigations by Sophos’ IR and MDR teams, the 2026 Active Adversary Report delivers an evidence-based look at how attackers are breaching organizations today.  In this session, we translate the report’s key findings into clear business implications. With 67% of incidents beginning with compromised identities, ransomware most often deployed outside business hours (88%), firewall vulnerabilities continuing to provide entry points, accelerating attacks on Active Directory, and growing telemetry gaps hindering detection, the message is clear: attackers are exploiting visibility gaps, identity weaknesses, and operational blind spots.  Attendees will gain practical insight into where organizations are most exposed and what strategic shifts are needed to meaningfully reduce cyber risk in 2026 and beyond.


10:45-11:05
Akamai Presentation: From API to Everywhere: How Modern Attacks Move Through Your Environment

APIs are now the primary interface for modern digital businesses, concentrating identity, data, and control in a single layer, and making them a prime target for attackers. Across cloud, SaaS, and enterprise environments, adversaries increasingly exploit APIs for initial access, establish persistence using tokens or service identities, and move laterally through internal APIs and trusted service-to-service communication.    This session breaks down the modern API-driven attack path using real-world incidents, explaining why API breaches so often escalate, why perimeter-based defenses fail to contain them, and how organizations can shift toward runtime detection and east-west containment. The focus is on resilience: limiting blast radius and keeping API incidents from becoming full-environment compromises.


11:05-11:30
Networking Break
11:30-12:00
Panel 1: AI and Emerging Tech at the 2026 Security Frontline

Abstract
AI and new digital technologies will continue to shift the cybersecurity landscape in 2026. This session explores how modern tools can enhance detection, response, and decision making while introducing new risks tied to generative systems, data integrity, and fast moving threat innovation. Leaders will gain a clear view of how to adopt emerging technology in a responsible and strategic way that supports resilience and aligns with enterprise risk goals.

Key Takeaways
• How AI and emerging tech are reshaping core security functions
• The new risks created by generative models and evolving attack techniques
• Practical governance steps that support responsible AI use
• Examples of organizations pairing innovation with disciplined risk management


12:00-12:20
JFrog Presentation: Beyond Best-of-Breed: Architecting the Golden Path for Secure Delivery

KISS" (Keep It Simple, Stupid) is a luxury rarely afforded to modern security teams dealing with legacy tool sprawl. While executives push for consolidation to reduce budget and risk, the transition from disjointed "best-of-breed" tools to a unified ecosystem is fraught with friction. Too often, security tools serve SecOps well but remain invisible obstacles to the DevOps pipeline. This session guides security leaders through the difficult journey of dismantling complexity to build a team-neutral "Golden Path", as coined by Spotify back in 2020.  

We will move beyond emotional attachments to specific tools and focus on defining objective business and regulatory requirements. Learn how to transform your security program from a bottleneck into a streamlined pipeline that delivers safer software, faster.  

Unify Tooling: Integrate disparate tools into a simplified process that reduces paths to production.  

Define Metrics: Develop KPIs that demonstrate success to Developers, Audit, and the C-Suite.  

Drive Culture Change: Educate and encourage stakeholders to adopt the path of least resistance.  

Prevent Drift: Implement detection mechanisms to ensure the pipeline remains streamlined.


12:20-12:40
Keynote Presentation with Horizon 3 AI: Proving Cyber Resilience: Measuring Outcomes, Not Effort

Most security programs measure effort — not outcomes. Organizations patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters. What matters is whether they can prove their defenses actually work.  

In this talk, Ellen Sundra, Vice President of Customers at Horizon3.ai, shares how leading organizations are using autonomous pentesting to see their environment through the attacker’s eyes — continuously, safely, and at scale. By shifting from assumptions to proof, they’ve learned to:

• Prioritize what’s exploitable. Focus limited resources on the weaknesses that truly put the business at risk that are known to be abused by threat actors.

• Quickly fix what matters. Close the loop from find → fix → verify and reduce your exploitable attack surface.

• Reduce attacker dwell time. Use pentest results to precisely deploy honeyTokens to detect compromise early, and to continuously prove your EDR and SIEM are tuned and working as intended.  Cyber resilience isn’t about being perfect — it’s about getting better over time. And the only perspective that truly matters is the attacker’s.


12:40-12:50
Innovation Spotlight - SpyCloud: Inside the Criminal Underground: Data-Driven Identity Threat Protection

Many of today’s identity security gaps stem from exposed data you can’t easily see – harvested from malware-infected devices and successful phishing campaigns targeting your employees, contractors, and suppliers. Criminals operationalize this data to carry out targeted cyberattacks, using it to deploy ransomware, steal sensitive data and critical IP, and quietly establish persistent access.These identity assets enable attackers to create synthetic identities, impersonate trusted users, bypass security controls, and move laterally across applications and systems with alarming efficiency.    

In this session, we’ll explore how these identity assets come together to form an attack surface that traditional controls can’t fully cover. Drawing from SpyCloud’s insights into the criminal underground and the cybercrime economy, we’ll share practical tips on what you need to know to better defend your organization from identity threats in 2026.


12:50-1:40
Lunch
1:40-2:05
Panel 2: Securing the Extended Ecosystem: Supply Chains, Vendors, and Identities

Abstract:
As organizations expand their digital ecosystems, risks extend far beyond internal networks. Threat actors are increasingly exploiting supply chains, third-party vendors, and identity gaps to gain access. This session brings together cybersecurity leaders and solution providers to explore how these interwoven risks create a complex attack surface -and how technology can help mitigate them.

Panelists will share real-world examples, lessons from managing large vendor networks, and innovative tools and frameworks for continuous risk assessment. Discussions will highlight strategies for mapping hidden dependencies, enforcing strong identity governance, and strengthening resilience through automation, collaboration, and transparency. Attendees will gain actionable insights on reducing exposure, improving third-party risk visibility, and leveraging technology to secure their extended digital ecosystem.

Key Takeaways:
• Understand how supply chains, vendors, and identities amplify organizational risk.
• Explore practical methods and tools for assessing, monitoring, and mitigating third-party and ecosystem vulnerabilities.
• Learn how to treat identity as a security perimeter using zero trust, access governance, and automated solutions.
• Gain insights from real-world breaches that reveal common gaps in vendor and identity controls.
• Walk away with a technology-informed framework to enhance resilience, secure partnerships, and reduce exposure across your digital ecosystem.


2:05-2:25
Trend AI Presentation: Security Teams That See Around Corners: Mitigating AI Risk in Real Time

From vibe coding and autonomous agents to generative chatbots in everyday workflows, AI adoption is constant and occurring at a pace that most security programs have not been able to realistically govern. Well-intentioned employees, misaligned agents, overly permissive access, and weak data controls are introducing new forms of risk, often without malicious intent. At the same time, adversaries are actively probing these gaps through indirect prompt injection and jailbreaking techniques. But there's good news too. More often than not, failures leave signals long before they become significant incidents. In this session, you’ll learn how an AI security blueprint can help you identify emerging risk, align controls to new AI projects, and ensure adoption and deployment happen securely without impacting speed or access.


2:25-2:35
Innovation Spotlight - OpenText: Bots with badges - Zero Trust IAM for humans, machines, and agents

In a world where AI agents are no longer mere chatbots but autonomous decision-makers, CISOs must rethink identity security—and fast. From OpenText’s Core Identity Foundation (including AI-powered governance) to the footprints of agentic AI and quantum-safe readiness, this session explores how security leaders can stay one step ahead. Discover how to treat AI agents as first-class identities, enforce Zero Trust across hybrid environments, and orchestrate dynamic, auditable access across humans, machines, and bots. Walk away ready to outsmart tomorrow’s identity threats with today’s best-in-class IAM muscle.


2:35-2:55
Rubrik Presentation: Protecting IdPs Against Today's Cyberattacks

As attackers increasingly focus on identity-based attacks, traditional defenses are no longer enough. This session helps attendees gain insight into how adversaries exploit misconfigurations, legacy protocols, and operational gaps to move laterally and establish persistence. The discussion then shifts to practical defense strategies, covering prevention, detection, and recovery techniques that security and IT teams can apply in real-world environments. Attendees will leave with a clear understanding of what is needed to protect their IdPs in today's threat landscape, along with actionable steps to strengthen identity resilience within their organization.


2:55-3:05
Innovation Spotlight - Terra Security: Why Fully Autonomous Pentesting Is a Bad Idea and What to Do Instead

Fully autonomous pentesting promises speed but often sacrifices safety, credibility, and signal quality. This talk explains why autonomy without human control creates real risk, and outlines a better model: agentic execution with expert oversight that scales offensive security without breaking trust.


3:05-3:25
Fireside Chat with Robert Pace, CISO, Invitation Homes: Managing Risk in a Hyperconnected World, Third-Party Challenges and CISO Frameworks for 2026 and Beyond

As organizations become more interconnected, third-party risk continues to expand in scale, complexity, and business impact. In this fireside discussion, Robert Pace, CISO of Invitation Homes, sits down with J.D. Miller, SVP at CyberRisk Alliance, to explore how security leaders are rethinking risk management frameworks to meet the realities of 2026 and beyond. The conversation will examine evolving third-party risk challenges, practical approaches to prioritization and accountability, and how CISOs can align risk decisions with business objectives without slowing innovation. Attendees will gain real-world insights into building resilient, adaptable risk programs that extend beyond the enterprise perimeter and stand up to increasing regulatory, operational, and supply chain pressures.


3:25-3:50
Networking Break
3:50-4:10
Panel 3: The Power of Diversity in Cybersecurity: Building Smarter, Stronger Teams

Abstract:
Cybersecurity challenges are complex, and solving them requires teams with diverse perspectives, skills, and experiences. This panel explores how diversity drives better problem-solving, innovation, and threat detection in security organizations.

Panelists will share strategies for attracting and retaining talent from varied backgrounds, leveraging unique thinking styles, and applying different experiences to uncover blind spots in risk management. Attendees will gain actionable insights for building teams that are not only technically skilled but more adaptive, creative, and resilient in the face of evolving cyber threats.

Key Takeaways:

  • Understand how diversity strengthens problem-solving, innovation, and threat response.
  • Learn approaches to recruit and retain talent from non-traditional backgrounds.
  • Explore how different perspectives and thinking styles reveal hidden risks.
  • Gain strategies to create teams that are adaptable, collaborative, and resilient.
  • Walk away with practical ideas for integrating diversity into cybersecurity team design and strategy.

4:10-4:30
Presentation with Sourav Sarkar, Head of IAM, Lennar Corporation : Balancing Growth, Compliance, while ensuring Security using Enterprise IAM

As enterprises expand their operations across various regions and systems, managing identity and access becomes increasingly complex. This session will address real-world challenges such as fragmented access processes, regulatory compliance, and rising security and fraud risks. It will explore how enterprises can tackle these issues by aligning regulatory needs, consolidating access workflows, implementing advanced verification, automating lifecycle events, and leveraging AI for continuous compliance and fraud detection. Attendees will gain strategies to minimize identity risk, streamline operations, and ensure secure growth in the financial services sector.


4:30-4:40
Innovation Spotlight - Abnormal AI: The LLM/AI World Is Here: How Attackers Are Scaling Faster Than We Are

AI and large language models are no longer theoretical, they actively reshape how cyberattacks are built, scaled, and executed. So how are attackers using AI to compress reconnaissance from hours to minutes, automate impersonation, and accelerate email-based fraud? Through real-world examples of vendor fraud, consent phishing, and account compromise, we highlight why identity, behavior, and human context—not malware—are now the primary attack surface. Let's discuss what actually works in an AI-driven threat landscape and how organizations can start defending at machine speed.


4:40-4:50
Innovation Spotlight - Exabeam: Accelerated Security Operations: The Speed of AI, The Confidence of Human Control

As the "Agentic Enterprise" introduces a new generation of non-human insider risks, organizations must reject the dangerous "Autonomous SOC" in favor of Accelerated Security Operations. Join us to learn how a "human on the loop" strategy empowers analysts to outpace threats, delivering the speed of AI with the confidence of human control


4:50-5:10
Presentation with Ryan Reynolds, Head of Cybersecurity Risk Oversight, US Bank: Steady at the Helm: Leading People Through Uncertainty, Pressure, and Change

In cybersecurity, pressure is constant, stakes are high, and leaders are expected to project confidence even when the ground is shifting beneath them. As the closing keynote of the Official Cybersecurity Summit, Ryan Reynolds will share a candid, leadership focused perspective on guiding teams through sustained stress, uncertainty, and moments that truly test resilience. Drawing from real world experience in cybersecurity risk oversight, Ryan will explore what it means to lead people, not just programs, when fatigue, burnout, and decision overload are part of the job. This session moves beyond theory to examine practical ways leaders can create clarity during chaos, support mental resilience without sacrificing accountability, and model steadiness that teams can trust.

Attendees will leave with actionable insights on how to communicate with intention under pressure, recognize early warning signs of team strain, and build an environment where people can perform at a high level while remaining healthy, engaged, and supported. This keynote is designed to leave leaders grounded, focused, and better equipped to carry both the mission and the people forward.


5:10-6:10
Networking Reception

Speakers

Our speakers bring unmatched expertise and real-world experience in cybersecurity, risk management, and business strategy. Through engaging keynotes, panels, and discussions, they deliver actionable insights and practical solutions that help CISOs and security leaders stay ahead of evolving threats.

Sponsors

The Official Cybersecurity Summit connects innovative solution providers with the cybersecurity leaders who evaluate and influence purchasing decisions. With a dynamic exhibition hall and a packed agenda of interactive panels and engaging sessions, this event offers unmatched opportunities to showcase solutions and build meaningful connections.

Partners

The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.

Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.

Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.

Please note these qualifications pertain to all attendees, including members of our partner organizations.