Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $95
Questions?
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
When the Attack Writes Itself: Preparing for the Era of Autonomous Ransomware
The next frontier in cyber-extortion is almost here: fully automated ransomware attacks powered by artificial intelligence. Criminal actors are rapidly transitioning from manual hacking workflows to AI-orchestrated campaigns that scout systems, select targets, craft and deploy payloads, negotiate demands, and adapt in real-time — all with minimal human intervention. Recent research shows that up to 80 % of current ransomware variants already leverage AI tools for parts of their operation, and prototype systems are now demonstrably capable of executing the entire attack lifecycle from reconnaissance to encryption and extortion.
This shift spells profound consequences for organizations of all kinds. The barrier to entry for launching devastating attacks is falling, victim selection is becoming far more dynamic and precise, and traditional security postures — even those relying on next-gen tools — may be outpaced by the speed and scale of these AI-enabled threats. Consequently, defenders must rethink not only how they respond, but how they prepare: establishing resilient backup and recovery strategies, embracing “boring” but essential cyber hygiene, fostering real-time intelligence sharing, and embedding human oversight into AI defense systems.
Join us to explore how autonomous ransomware works, why it matters now, what strategic adaptations are required for enterprises and institutions, and how to build a future-proof defense in an age where the malware might write itself.
Key Issues Covered at The Official Cybersecurity Summit
Ransomware on Autopilot: How Autonomous Campaigns Find You, Breach You, and Extort You
Autonomous ransomware is moving from “assistive AI” to end-to-end operations: automated recon, vulnerability discovery, lateral movement, privilege escalation, encryption, and even extortion workflows that adapt to defenses in real time. This panel breaks down what autonomy looks like in practice, where today’s tooling is already accelerating the kill chain, and which signals defenders can still use to detect and disrupt machine-speed attacks. Expect a grounded discussion of attacker economics, the most likely near-term scenarios, and what security leaders should prioritize as ransomware becomes faster, more targeted, and more scalable.
Resilience by Design: Backup, Recovery, and Continuity When Attacks Move at Machine Speed
When ransomware can execute faster than humans can triage, resilience becomes the primary control. This panel focuses on pragmatic strategies that reduce “time-to-restore” and limit operational paralysis: immutable backups, recovery testing, tiered restoration plans, segmentation that actually holds, and identity hardening to prevent backup and admin takeover. Panelists will share what works under pressure, how to avoid “paper resilience,” and how to align technical recovery with real business continuity requirements—so the organization can keep functioning even if encryption and extortion hit at once.
Human-in-the-Loop Defense: Governing AI Security Tools Without Creating New Risks
Organizations are increasingly relying on AI in the SOC—triage, detection engineering, alert enrichment, copilots, and automated response. But autonomous ransomware raises a hard question: how much autonomy should defenders allow their own systems? This panel explores the balance between speed and control: safe automation patterns, guardrails for containment actions, anti-poisoning strategies, model risk management, and how to keep humans accountable when AI takes more of the wheel. You’ll leave with a practical framework for deploying AI-assisted defense without turning it into an attacker’s force-multiplier.
Top 6 Reasons to Attend the Cybersecurity Summit
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our
Registration Team.
To sponsor at an upcoming summit, please fill out the
Sponsor Form.
Agenda
The Official Cybersecurity Summit delivers high-impact sessions designed to help leaders strengthen resilience, protect critical infrastructure, and align security with business goals.
Attendees will gain actionable insights from expert panels, explore cutting-edge solutions, and connect directly with top industry innovators - making this a can’t-miss agenda for CISOs and security executives.
Autonomous ransomware is moving from “assistive AI” to end-to-end operations: automated recon, vulnerability discovery, lateral movement, privilege escalation, encryption, and even extortion workflows that adapt to defenses in real time. This panel breaks down what autonomy looks like in practice, where today’s tooling is already accelerating the kill chain, and which signals defenders can still use to detect and disrupt machine-speed attacks. Expect a grounded discussion of attacker economics, the most likely near-term scenarios, and what security leaders should prioritize as ransomware becomes faster, more targeted, and more scalable.
When ransomware can execute faster than humans can triage, resilience becomes the primary control. This panel focuses on pragmatic strategies that reduce “time-to-restore” and limit operational paralysis: immutable backups, recovery testing, tiered restoration plans, segmentation that actually holds, and identity hardening to prevent backup and admin takeover. Panelists will share what works under pressure, how to avoid “paper resilience,” and how to align technical recovery with real business continuity requirements—so the organization can keep functioning even if encryption and extortion hit at once.
Organizations are increasingly relying on AI in the SOC—triage, detection engineering, alert enrichment, copilots, and automated response. But autonomous ransomware raises a hard question: how much autonomy should defenders allow their own systems? This panel explores the balance between speed and control: safe automation patterns, guardrails for containment actions, anti-poisoning strategies, model risk management, and how to keep humans accountable when AI takes more of the wheel. You’ll leave with a practical framework for deploying AI-assisted defense without turning it into an attacker’s force-multiplier.
Speakers
Our speakers bring unmatched expertise and real-world experience in cybersecurity, risk management, and business strategy. Through engaging keynotes, panels, and discussions, they deliver actionable insights and practical solutions that help CISOs and security leaders stay ahead of evolving threats.
Sponsors
The Official Cybersecurity Summit connects innovative solution providers with the cybersecurity leaders who evaluate and influence purchasing decisions. With a dynamic exhibition hall and a packed agenda of interactive panels and engaging sessions, this event offers unmatched opportunities to showcase solutions and build meaningful connections.
Title Sponsor
Presenting Sponsor
Platinum Sponsors
Gold Sponsors
Silver Sponsors
Partners
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus