Senior Solutions Engineer,
Tanium
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, November 6, 2025
8:00AM - 5:30PM CST
The Westin Houston, Memorial City
Azalea 3,4,5,6
945 Gessner Road
Houston, TX, 77024
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 7th Annual Houston Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Women in Cyber
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 CST
9:00-9:35 CST

9:35-10:05 CST
In this engaging presentation, we will explore the powerful intersection of artificial intelligence (AI) and video analytics in enhancing physical security and how, when combined with cybersecurity systems, we can deliver a comprehensive solution from a single provider. With the evolution of cyber threats, it has become imperative for organizations to adopt innovative approaches to protect their physical infrastructure as well as digital assets. During the presentation, we will delve into industry best practices for protecting digital assets and how AI-based video analytics technologies can revolutionize physical security by providing proactive and intelligent monitoring capabilities. We will also discuss how these technologies leverage computer vision and machine learning to analyze video feeds, detect potential security incidents, and provide qualified alerts in real-time.
10:05-10:35 CST
Artificial intelligence is changing the game in cybersecurity—but not just for defenders. Today’s cybercriminals are smarter, faster, and better equipped than ever, leveraging AI to automate attacks, exploit human behavior, and scale their operations with unprecedented precision. And it’s no longer just nation-states at play; sophisticated tools are now accessible to anyone with malicious intent. In this gripping session, Steve Lupo, former FBI Special Agent (Cyber Task Force/SWAT Team) and current Event Security Advisor at Chevron, offers a rare look into how adversaries are using AI to evolve their tactics and outpace traditional defenses. Drawing from his field experience, Lupo will share how organizations can anticipate these emerging threats, rethink their defenses, and prepare for a future where the line between human and machine-driven attacks continues to blur.
10:35-11:00 CST
11:00-11:45 CST
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.

11:45-12:05 CST
Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode. Attend our session to learn:
• Why traditional approaches to data security have failed
• How AI and context are revolutionizing data security
• Where to maximize the value of your existing security investments
• What you can do to secure your Gen AI rollouts With the right strategy and technology, you can transform your data from a liability to a well-managed asset.

12:05-12:25 CST
Artificial Intelligence is revolutionizing the world at an unprecedented pace—reshaping industries, redefining possibilities, and occasionally, delivering laugh-out-loud failures. But how safe is this brave new world of AI? And what does it mean for businesses, individuals, and society at large? We’ll explore the evolution and proliferation of APIs, the unsung heroes powering mobile apps, supply chain optimization, and the Internet of Things, and the role they play in the future of the internet. Billions of bots silently execute tasks, but at what cost? We’ll dive into the hidden, obvious, and subtle expenses of this automation boom, from operational efficiencies to unforeseen vulnerabilities. And just when you thought DDoS attacks were a thing of the past, we’ll debunk the myth: DDoS isn’t dead—it’s evolving. We’ll discuss why volume still reigns supreme, the rise of sophisticated Layer 7 attacks, and how to stay ahead in this ever-changing landscape. Finally, we’ll look to the future, guided by three principles: Futurize, Unite, Simplify. Join us for an engaging, insightful, and occasionally humorous journey through the cutting-edge technologies shaping tomorrow’s world.

12:25-12:45 CST
In today’s rapidly evolving digital landscape, organizations are struggling with diverse methods of interaction with employees, customers, and partners through a multitude of technologies. This complexity often leads to a lack of control over Identity and Access Management (IAM), leaving organizations vulnerable to security threats and compliance issues. The cost of ignoring the risk can haunt you for years; however, you cannot correct what you don’t know, so the first steps are assessing whether your organization is positioned for a successful implementation, migration, or fix and validating that the organization is focused on the right path and issue they are looking to mitigate. Join us as we demonstrate a proven, 3-stage IAM Strategic Assessment model that is NIST compliance driven, answering the “what, where, when, why, and how” surrounding both Workforce Identity & Access Management and Customer Identity & Access Management (CIAM) programs, projects, and operations.
12:45-1:35 CST
1:35-2:10 CST
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.

2:10-2:30 CST
Organizations across every industry rely on secure, always-on digital systems to power their operations and maintain customer trust. As cryptographic standards evolve at an unprecedented pace, businesses must prepare for three urgent shifts: the arrival of post-quantum cryptography, the rapid shortening of certificate validity periods (now as brief as 90 or even 47 days), and the growing complexity of crypto ecosystems spanning hybrid and multi-cloud environments. In this session, we’ll explore how these forces are converging to make manual crypto management unsustainable—and a potential source of costly outages and compliance risk. We’ll discuss why enterprises must embrace automation to maintain uptime, ensure compliance, and gain real-time visibility into their cryptographic assets. Most importantly, we’ll outline how to begin your migration to post-quantum readiness today, even as standards and timelines continue to evolve. Join us to learn how you can transform crypto management from a reactive task into a proactive, automated strategy—strengthening resilience, continuity, and digital trust.

2:30–2:50 CST
Security and IT teams are drowning in endless alerts and chasing signals that rarely translate into actionable defense. Meanwhile, attackers have their sights set on the one asset most organizations overlook – backups. In this session, see how Druva, a simplified next-gen Cyber Resilience solution, leverages DruAI and AI Agents to turn backups from passive insurance into an active layer of cyber defense, providing real-time threat intel and guaranteeing recovery when the need arises. You’ll leave with: How to use conversational AI with natural language to query backup intelligence and jump-start investigations Practical ways DruAI Agents automate hardening and recovery readiness Using Druva MetaGraph to add rich context to alerts across SecOps tools Detecting ransomware behaviors via ML anomalies (not static rules) Pushing backup telemetry into SIEM/XDR for faster correlation and response
2:50–3:15 CST
3:15–3:50 PM CST
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
3:50–4:10 CST
As artificial intelligence continues to transform business and technology, cybersecurity leaders face a dual challenge: harnessing AI’s potential while defending against its rapidly emerging threats. In this session, Thangaraj Petchiappan, CTO of iLink, explores how AI awareness is evolving across the cybersecurity landscape – from using machine learning to detect and respond to attacks faster, to recognizing the new risks AI itself introduces. Attendees will gain insight into practical frameworks for integrating AI responsibly into security programs, strengthening human-machine collaboration, and preparing their organizations for an era where adversaries, too, are powered by AI.
4:10-4:35 CST
4:35-5:30 CST
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |







