Network Security Engineer,
Snohomish County Department of Information Technology
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, October 30, 2025
8:00AM - 5:00PM PDT
Hyatt Regency Bellevue
Grand ABCDEFG
900 Bellevue Way, NE
Bellevue, WA, 98004
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 10th Edition of the Seattle/Bellevue Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Women in Cyber
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-8:50 PDT
8:50-9:00 PDT
9:00-9:35 PDT
While large-scale quantum computers may be years away, adversaries are already harvesting encrypted data today for future decryption. This session equips CISOs with practical strategies to implement quantum-resistant security now, before it’s too late. We’ll demystify quantum risk and demonstrate real-world deployment patterns that combine post-quantum and classical cryptography: implementing hybrid TLS 1.3 key exchanges, deploying composite X.509 certificates, and establishing dual-signature code signing frameworks. You’ll learn how to build crypto-agility into your PKI and KMS infrastructure, navigate performance impacts and MTU constraints, ensure interoperability across legacy systems and cloud platforms, and establish governance checkpoints for safe migration. Discover and leave with a clear roadmap for protecting data against tomorrow’s quantum threats.

9:35-10:05 PDT
Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode.
Attend our session to learn:
• Why traditional approaches to data security have failed
• How AI and context are revolutionizing data security
• Where to maximize the value of your existing security investments
• What you can do to secure your Gen AI rollouts With the right strategy and technology, you can transform your data from a liability to a well-managed asset.
10:05-10:35 PDT
John-Luke Peck from The Stillwater Group will talk about what goes well and what doesn’t go well for organizations that fall victim to an intrusion or a ransomware attack, and how so much depends on how well a company has prepared /before/ the ransomware strikes. Whether your business or organization is large or small, public or private, we will talk about cyber threats, what a major incident looks like, and give you actionable recommendations for what you and your team can do /today/ to be ready and prepared for tomorrow’s “when”, not “if”.
10:35-11:00 PDT
11:00-11:35 PDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
11:35-11:55 PDT
Mobile DevSecOps has evolved faster in the last year than in the previous decade. With the rapid integration of AI-assisted pipelines and heightened platform security standards from Apple and Google, the traditional approach to mobile testing and threat modeling is being redefined. This session explores the shift toward a modern, enhanced mobile security risk stack. The goal is to discuss techniques that empower not only developers but also product leaders and strategists with limited coding backgrounds to engage meaningfully in mobile risk management. The talk will demonstrate new methods for creating and validating mobile-specific threat models, focusing on how to align human intuition with AI-powered reasoning to produce better predictive security insights. We’ll also look at practical use cases of mobile-specific MCP tools and generative AI mechanisms that can streamline testing and compliance while enhancing overall stack visibility. Rather than replacing human expertise, AI can become an active partner amplifying our capability to secure complex mobile ecosystems at scale. This session delivers a hands-on roadmap to leveraging AI within modern mobile DevSecOps for stronger, faster, and smarter security outcomes.
11:55-12:15 PDT
Too often, cybersecurity vendors are seen as transactional suppliers rather than trusted partners. But in today’s complex and fast-moving threat landscape, that old model doesn’t work. This panel brings together leading cybersecurity vendors who are redefining what partnership means. They will share how the most successful relationships are built on collaboration, transparency, and shared outcomes, where vendors become an extension of your team, aligned with your mission and accountable for your success. Attendees will gain insight into how to move beyond the buy-sell dynamic to build strategic partnerships that strengthen both security posture and business performance.
12:15-1:05 PDT
1:05-1:30 PDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
1:30-2:00 PDT
Join critical infrastructure incident responder Bjorn Townsend for a look at incident response in the world of community water systems that will also hold valuable information for leaders, IT and security personnel for any organization using OT/ICS/SCADA in other ways. Through Bjorn’s experience, lessons drawn from the ongoing war in Ukraine, and a little wisdom from Bruce Lee, you’ll learn about what an attacker could do if they gain control of a community water system, the most critical things to do to prepare for and prevent an incident before it starts, how to recognize an attack on your control systems, and what to do first in order to regain control of the network. This talk will also touch on how the response process plays into the other ICS: the Incident Command System used by public sector emergency management agencies to coordinate with one another during a major emergency. Inter-agency coordination is especially important for community water systems because they tend to be heavily interconnected, particularly in densely urbanized areas of the Puget Sound, and community defense is a major key to success. Attendees will leave with a handy set of tips, conversation starters and “next steps” to take back to their organizations in order to help them prepare for incidents in their OT/ICS/SCADA networks.
2:00-2:30 PDT
2:30-2:55 PDT
2:55-3:30 PDT
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
3:30-4:00 PDT
4:00-4:25 PDT
In this focused 20-minute session, Alex Salazar, IT Security Architect for Snohomish County Department of Information Technology, shares how he used Microsoft Co-Pilot to automate and streamline alert setup within the county’s SIEM environment. Attendees will gain a firsthand look at how AI tools can reduce manual effort, improve accuracy, and accelerate response times in security operations. Alex will walk through lessons learned, implementation challenges, and key takeaways for teams looking to safely and effectively integrate AI assistance into their SOC workflows.
4:25-5:00 PDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |







