The 11th Annual Silicon Valley Official Cybersecurity Summit is the must-attend event for CISOs and senior leaders looking to strengthen resilience, reduce risk, and align security with business goals. Join top executives, innovators, and experts for a full day of actionable insights, cutting-edge solutions, and high-impact networking. Experience interactive panels, exclusive solution showcases, and strategic discussions that go beyond theory to deliver real-world results, all complemented by a catered breakfast, networking lunch, and closing cocktail reception.

Featured Speakers

Key Issues Covered at The Official Cybersecurity Summit

AI, Automation, and Emerging-Tech Risk (and Opportunity)

As artificial intelligence, automation, and new digital technologies accelerate across every industry, cybersecurity leaders face both unprecedented risk and powerful opportunity. The summit will explore how Cybersecurity leaders and their teams can harness emerging technologies to strengthen resilience, streamline operations, and stay ahead of adversaries who are equally quick to innovate. Attendees will gain insight into real-world applications of AI for threat detection, incident response, and decision intelligence, while learning how to identify and mitigate the new classes of vulnerabilities these tools introduce.

From generative AI and large language models to autonomous security systems and deepfake detection, these discussions will separate hype from reality. Experts will share practical frameworks for governing AI responsibly, managing data integrity, and aligning innovation with enterprise risk management. The conversations will help cybersecurity executives navigate the complex balance between embracing emerging technology for competitive advantage and ensuring it doesn’t become their next threat vector.

Key Takeaways:
• Learn how AI and automation are transforming threat detection, incident response, and security operations in measurable ways.
• Practical strategies for managing and mitigating new risks created by emerging technologies like generative AI and autonomous systems.
• Frameworks for responsible AI governance, including data integrity, transparency, and regulatory alignment.
• Real-world examples of organizations balancing innovation with security and risk management priorities.
• Actionable insights cybersecurity leaders can take back to their teams to prepare for the next wave of AI-driven threats and opportunities.

Supply Chain, Third-Party Ecosystem, and Identity Attack Surface

As organizations expand their digital ecosystems, the lines between internal and external risk are rapidly disappearing. Today’s threat actors know that the fastest way into a network isn’t always through the front door. From compromised vendors and cloud integrations to weak identity controls, attackers are exploiting every link in the chain. The summit brings cybersecurity leaders together to unpack how supply chain vulnerabilities, third-party dependencies, and identity-based risks are converging to create a complex and often underestimated attack surface.

Cybersecurity executives will explore real-world examples of cascading breaches, lessons learned from managing large vendor ecosystems, and emerging frameworks for continuous third-party risk monitoring. The discussions highlight strategies for mapping hidden connections, enforcing stronger identity governance, and building resilience through transparency and collaboration. Attendees will walk away with practical insights for reducing exposure and strengthening trust across every part of their digital supply chain.

Key Takeaways:
• Understand how interconnected supply chains and third-party vendors expand your organization’s attack surface.
• Learn proven methods to assess, monitor, and mitigate risks across your extended digital ecosystem.
• Explore best practices for managing identity as the new security perimeter, including zero trust and access governance strategies.
• Gain insights from real-world breach scenarios that reveal common breakdowns in vendor and identity controls.
• Leave with an actionable framework to improve third-party risk visibility, strengthen resilience, and build more secure partnerships.

Resilience, Risk, and Results: Aligning Security with Business Outcomes

In today’s threat landscape, resilience is more than just recovery - it’s readiness, adaptability, and alignment with the business mission. The summit explores how forward-thinking cybersecurity executives are quantifying cyber risk to drive smarter investments and communicate value in business terms. By translating technical controls into measurable business impact, cybersecurity leaders are helping their organizations make data-driven decisions that balance protection with performance.

Join top executives and thought leaders for in-depth discussions on the frameworks, metrics, and real-world practices shaping the next generation of cyber resilience. From risk quantification models to boardroom-ready reporting, this conversation will reveal how leading security teams are reframing cybersecurity as a strategic business enabler - bridging the gap between risk reduction and results.

Key Takeaways:
• Learn how to translate cybersecurity metrics into meaningful business outcomes that resonate with executive leadership and the board.
• Explore practical approaches to cyber risk quantification that help prioritize investments and justify budget decisions.
• Understand how resilience strategies can align with overall business continuity and growth objectives.
• Gain insights from leading CISOs on how they communicate security value across the organization to drive engagement and accountability.
• Discover frameworks and tools that connect operational security performance with measurable business impact.

Top 6 Reasons to Attend the Cybersecurity Summit

1
Learn

Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.

2
Evaluate Demonstrations

Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.

3
Time, Travel & Money

Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.

4
Engage, Network, Socialize & Share

Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.

5
CEUs / CPE Credits

By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.

6
A Worthwhile Investment

By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.

Questions

For any questions, please contact our
Registration Team.

Sponsor

To sponsor at an upcoming summit, please fill out the
Sponsor Form.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
 
Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
 
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
 
Please note these qualifications pertain to all attendees, including members of our partner organizations.

Agenda

The Official Cybersecurity Summit delivers high-impact sessions designed to help leaders strengthen resilience, protect critical infrastructure, and align security with business goals.

Attendees will gain actionable insights from expert panels, explore cutting-edge solutions, and connect directly with top industry innovators - making this a can’t-miss agenda for CISOs and security executives.

8:00-9:00
Networking Breakfast
9:00-9:05
Welcome
9:05-9:10
Welcoming Remarks
9:10-9:45
Opening Security Keynote with Horizon 3 AI: Proving Cyber Resilience: Measuring Outcomes, Not Effort

Most security programs measure effort — not outcomes. Organizations patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters.

What matters is whether they can prove their defenses actually work.


In this talk, Joshua Knox, Principal Cybersecurity Strategist of Horizon3.ai, shares how leading organizations are using autonomous pentesting to see their environment through the attacker’s eyes — continuously, safely, and at scale. By shifting from assumptions to proof, they’ve learned to:

• Prioritize what’s exploitable. Focus limited resources on the weaknesses that truly put the business at risk that are known to be abused by threat actors.
• Quickly fix what matters. Close the loop from find → fix → verify and reduce your exploitable attack surface.
• Reduce attacker dwell time. Use pentest results to precisely deploy honeyTokens to detect compromise early, and to continuously prove your EDR and SIEM are tuned and working as intended.

Cyber resilience isn’t about being perfect — it’s about getting better over time. And the only perspective that truly matters is the attacker’s.


9:45-10:15
Presentation with Jonathan Chan, Head of Global IT & Security, Episource : Navigating the Unthinkable: Leading Through a Critical Incident Before, During, and After

Critical incidents rarely unfold with the predictability of a tabletop exercise. When a compromise is live, decisions are made under extreme pressure, visibility is clouded, and the cost of every misstep scales instantly.

In this session, Jonathan Chan shares hard-earned lessons from the front lines of incident handling. He will break down what organizations can realistically prevent, which defenses must be assumed to eventually fail, and how to move decisively once an intrusion is underway.

The discussion will dive into the psychological and operational workflows that prove most resilient during a crisis and why a battle-tested response plan is the single most important factor in organizational survival. Attendees will walk away with a practical framework to harden their defenses, sharpen their response, and minimize the long-term impact of inevitable cyber events.


10:15-10:25
Innovation Spotlight: Fastly: Edge Security in Practice: Architecting with Fastly for Speed, Safety, and Scale

Discover how Fastly’s programmable edge cloud platform is redefining online performance at the edge. This spotlight will  showcase how Fastly unifies edge compute, delivery, security, and observability to power fast, secure, and engaging digital experiences. You'll learn how leading organizations are leveraging the edge to build better, safer, and more reliable experiences for users everywhere.


10:25-10:45
Keynote Presentation with Sonatype: The New Transparency Baseline: AI Governance, and Software Trust in 2026

AI has fundamentally changed what regulators, customers, and boards expect organizations to know — and prove — about the software they ship. In 2026, transparency is no longer a differentiator; it’s the baseline. From the EU Cyber Resilience Act to evolving U.S. guidance, organizations are under growing pressure to demonstrate how AI-enabled software is built, governed, and secured across the supply chain.  This session takes a candid look at the emerging reality of AI governance and software trust. Drawing on patterns Sonatype observes across thousands of development teams, we’ll explore how organizations are responding to new compliance expectations, where governance efforts break down, and what “good” looks like in practice. We’ll examine how transparency artifacts (including SBOMs) fit into broader governance programs — and why many fail to translate into real risk reduction or audit readiness.  

Attendees will learn:

- How AI governance and software transparency expectations are evolving in 2026

- What regulators and customers increasingly expect organizations to prove

- Common gaps that undermine AI and software trust initiatives

- Practical approaches to operationalizing transparency for compliance, risk reduction, and long-term trust


10:45-11:05
Opal Security Presentation
11:05-11:35
Networking Break
11:35-12:05
Panel: AI and Emerging Tech at the 2026 Security Frontline

Abstract
AI and new digital technologies will continue to shift the cybersecurity landscape in 2026. This session explores how modern tools can enhance detection, response, and decision making while introducing new risks tied to generative systems, data integrity, and fast moving threat innovation. Leaders will gain a clear view of how to adopt emerging technology in a responsible and strategic way that supports resilience and aligns with enterprise risk goals.

Key Takeaways
• How AI and emerging tech are reshaping core security functions
• The new risks created by generative models and evolving attack techniques
• Practical governance steps that support responsible AI use
• Examples of organizations pairing innovation with disciplined risk management


12:05-12:25
JFrog Presentation: Beyond Best-of-Breed: Architecting the Golden Path for Secure Delivery

KISS" (Keep It Simple, Stupid) is a luxury rarely afforded to modern security teams dealing with legacy tool sprawl. While executives push for consolidation to reduce budget and risk, the transition from disjointed "best-of-breed" tools to a unified ecosystem is fraught with friction. Too often, security tools serve SecOps well but remain invisible obstacles to the DevOps pipeline.

This session guides security leaders through the difficult journey of dismantling complexity to build a team-neutral "Golden Path", as coined by Spotify back in 2020.  

We will move beyond emotional attachments to specific tools and focus on defining objective business and regulatory requirements. Learn how to transform your security program from a bottleneck into a streamlined pipeline that delivers safer software, faster.  

  • Unify Tooling: Integrate disparate tools into a simplified process that reduces paths to production.  
  • Define Metrics: Develop KPIs that demonstrate success to Developers, Audit, and the C-Suite.  
  • Drive Culture Change: Educate and encourage stakeholders to adopt the path of least resistance.  
  • Prevent Drift: Implement detection mechanisms to ensure the pipeline remains streamlined.

12:25-12:35
Innovation Spotlight: Amplifier Security: Beyond the Checkbox : How CISOs are Transforming : Human Risk Into AI-Powered Resilience

12:35-12:45
Innovation Spotlight: Swimlane: AI Agents in the SOC: How to Add Autonomy Without Losing Control

Security leaders are being pushed to “use AI” in the SOC, but the real question is where autonomy belongs, and what you must control so it doesn’t create new risk while trying to reduce old risk. This session breaks down a pragmatic path from traditional SOAR automation to AI agents that can summarize incidents, enrich alerts, recommend actions, and execute response steps under policy-driven constraints. We’ll cover what agentic looks like in real operations (vs. demo magic), where humans stay in the loop, and how to keep decision-making explainable and auditable.


12:45-1:45
Lunch
1:45-2:15
Presentation with Malcolm Harkins, Chief Security and Trust Officer, HiddenLayer: I believe , I belong, I matter

Malcolm Harkins shares his journey and learnings from more than three decades of managing high-performing people, leading successful teams, and finding fulfillment in an ideal state. Malcolm will explore his 'I Believe, I Belong, I Matter℠' framework, which is based on his own life lessons, and he'll share how to inspire a sense of purpose, passion, and persistence to avoid burnout. In this talk he will share how channeling personal and team emotions you can  make more empathetic and intelligent decisions. He will share  strategies for effectively managing conflict and resolving challenges with determination and resilience. You will learn techniques to enhance individual and team performance.


2:15-2:25
Innovation Spotlight: 11:11 Systems: Anatomy of a Ransomware Attack: Prepare, Respond, Recover

Recovery plans are no longer optional—they’re inevitable. In today’s evolving threat landscape, every business will be tested. Whether it is traditional disasters driven by nature or human error, or modern-day crises fueled by cyberattacks and ransomware, the stakes are higher than ever. How do you ensure your organization is prepared not just to survive, but to recover with confidence?

In this session, we’ll cover:

• The key stages of a cyberattack and what they mean for your business

• Best practices to reduce your exposure and minimize impact

• Essential tools and strategies to recover quickly if compromised

• What a real-world recovery looks like—and how to be ready for it


2:25-2:35
Innovation Spotlight: Terra Security: Why Fully Autonomous Pentesting Is a Bad Idea, and What to Do Instead

Fully autonomous pentesting promises speed but often sacrifices safety, credibility, and signal quality. This talk explains why autonomy without human control creates real risk, and outlines a better model: agentic execution with expert oversight that scales offensive security without breaking trust.


2:35-2:55
Presentation with Deidre Diamond, Founder & CEO, CyberSN: From Blind Spots to Workforce Intelligence: How CIOs and CISOs Regain Control of Execution, Risk, and Budget

CIOs and CISOs are increasingly accountable for execution, risk reduction, and budget justification — yet most are operating with limited visibility into how their cyber and IT workforce actually functions. Org charts, job titles, and headcount reports fail to show how work is really performed across FTEs, contractors, consultants, and MSPs, creating blind spots that lead to burnout, stalled strategy, and unquantified risk.

In this session, Deidre Diamond, Founder & CEO of CyberSN, introduces Workforce Intelligence as a new operational lens for cyber and IT leadership. Drawing on real-world engagements with enterprise security and IT teams, this talk explores how leaders can gain clear and ongoing visibility into workforce utilization, capability gaps, and execution risk — without adding operational burden to already stretched teams.

Attendees will learn how workforce blind spots directly impact retention, strategy execution, and budget outcomes, why workforce risk is now a board-level concern, and how leading CIOs and CISOs are using workforce intelligence to move from reactive firefighting to intentional workforce design.

This session is designed for leaders who want to align people, skills, and spend to strategy — and confidently explain workforce risk and investment decisions to executives and boards.


2:55-3:25
Networking Break
3:25-4:10
Panel: Woman in Cyber, Knowledge dropping Tik/Tok style

Abstract:
Cybersecurity challenges are complex, and solving them requires teams with diverse perspectives, skills, and experiences. This panel explores how diversity drives better problem-solving, innovation, and threat detection in security organizations.

Panelists will share strategies for attracting and retaining talent from varied backgrounds, leveraging unique thinking styles, and applying different experiences to uncover blind spots in risk management. Attendees will gain actionable insights for building teams that are not only technically skilled but more adaptive, creative, and resilient in the face of evolving cyber threats.

Key Takeaways:

  • Understand how diversity strengthens problem-solving, innovation, and threat response.
  • Learn approaches to recruit and retain talent from non-traditional backgrounds.
  • Explore how different perspectives and thinking styles reveal hidden risks.
  • Gain strategies to create teams that are adaptable, collaborative, and resilient.
  • Walk away with practical ideas for integrating diversity into cybersecurity team design and strategy.

4:10-4:30
Presentation with Jennifer Raiford, CISO & CEO, Globe-Sec Advisory: Digital Deterrence: Rebuilding Trust in a World Where Reality Is Hackable

By 2026, synthetic reality, autonomous AI agents, and machine‑speed cyber operations have collapsed the boundaries between truth and deception. In this keynote, Jennifer Raiford — CEO of GLOBE‑SEC, Chief Digital Trust & Risk Officer, and widely known as the Olivia Pope of Cyber and AI — unveils the emerging doctrine of digital deterrence. She explores how nations, enterprises, and critical infrastructure must adapt to adversaries that don’t sleep, don’t negotiate, and don’t need human operators. Drawing on national‑level advisory work, the GLOBE‑SEC Methodology, and cryptographic trust architectures like Enigma.io ($ENX), she outlines a new operating system for sovereignty, resilience, and verifiable truth. This session reframes cybersecurity as a strategic instrument of power — and digital trust as the defining currency of the next decade.


4:30-4:40
Innovation Spotlight: Fidelis: Turning Attackers into Signals: How Deception Changes Modern Threat Detection

Attackers are no longer triggering alerts; they’re hiding in plain sight. This session shows how deception technology transforms attacker behavior into high-confidence detection signals. Learn how integrating deception into an Open Active XDR platform improves visibility, reduces noise, and enables faster, smarter response to real threats across modern enterprise environments


4:40-4:50
Innovation Spotlight: BeyondTrust: Modern Approach to Identity Security

Modern PAM has evolved into broader identity security to address today’s cloud, non‑human, and AI‑driven threats. Organizations must now secure not only traditional privileged accounts but also identities with pathways to privilege. Fragmented security tools leave gaps across endpoints, cloud, SaaS, third‑party access, and emerging NHI/AI identities. Identity Security strengthens defense‑in‑depth by combining visibility, least privilege, and Zero Trust to prioritize and mitigate critical risks while improving compliance, meeting cyber insurance needs, and enhancing overall security posture.


4:50-5:10
Presentation with Marco Palacios, President/-Co-Founder, Pacific Hackers Association

5:10-6:10
Networking Reception

Speakers

Our speakers bring unmatched expertise and real-world experience in cybersecurity, risk management, and business strategy. Through engaging keynotes, panels, and discussions, they deliver actionable insights and practical solutions that help CISOs and security leaders stay ahead of evolving threats.

Sponsors

The Official Cybersecurity Summit connects innovative solution providers with the cybersecurity leaders who evaluate and influence purchasing decisions. With a dynamic exhibition hall and a packed agenda of interactive panels and engaging sessions, this event offers unmatched opportunities to showcase solutions and build meaningful connections.

Partners

The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.

Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.

Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.

Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.

Please note these qualifications pertain to all attendees, including members of our partner organizations.