VP, Global Sales and Customer Success,
Whistic
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Fri, October 17, 2025
8:00AM - 6:00PM MST
JW Marriott Camelback Inn Scottsdale
Arizona Ballroom
5402 East Lincoln Drive
Scottsdale, AZ, 85253
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 7th Annual Scottsdale Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Women in Cyber
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 MST
9:00-9:35 MST
The Evolving Use of AI in Healthcare: Friend, Foe, or Both? addresses the critical cybersecurity paradox created by artificial intelligence in the medical sector. It first highlights AI as a Friend, an essential cyber-defender that uses behavioral analytics and SOAR to provide the speed and scale necessary for proactive threat detection and automated incident response in complex healthcare environments. However, AI as a Foe, detailing how adversaries weaponize generative AI to launch sophisticated, hyper-personalized phishing attacks, create convincing deepfakes for social engineering, and employ adversarial AI to poison clinical data models, directly threatening patient safety. The concluding message emphasizes that securing the future of patient care requires a strategic response built on layered defense, prioritizing AI-on-AI security measures, establishing robust governance for ethical AI use, and fostering Cyber Resilience to maintain clinical operations even when a breach is inevitable.
9:35-10:05 MST
Public sector organizations face unique cybersecurity challenges as they balance limited resources with growing threats and rising expectations for digital services. In this session, Sandeep Desai, Information Security Executive for the Arizona Department of Education, explores how state and local agencies are adapting to an evolving threat landscape. From securing legacy systems and managing third-party risk to strengthening cyber awareness and resilience, Sandeep will share lessons learned and practical strategies that public sector leaders can apply to protect critical infrastructure, safeguard citizen data, and build a stronger cybersecurity culture across government.
10:05-10:35 MST
As digital transformation accelerates, businesses are increasingly dependent on secure technologies, data integrity, and trust across their ecosystems. In this session, Bindi Davé will discuss how organizations can build and sustain digital trust amidst evolving cyber threats. Drawing on her extensive experience as a CISO and her leadership in cybersecurity transformation at companies like GoDaddy and DigiCert, Bindi will explore the strategic role of cybersecurity in enabling business growth while safeguarding critical assets.
10:35-11:00 MST
11:00-11:35 MST
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.

11:35-11:55 MST
The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

11:55-12:15 MST
Artificial Intelligence is being utilized more than ever, as companies embrace AI’s value as pivotal to their business. However, with innovation comes risk, and AI has introduced another attack surface that organizations are struggling to manage and secure. 81% of executives say secure and trustworthy AI is pivotal to their business, but only 24% of these same executives are securing their AI projects. AI impacts every facet of the business, and it’s essential that these multiple groups collaborate to ensure not only visibility into all AI usage but also implementing the appropriate security and governance guardrails. With a strong framework, AI projects can be safely, confidently, and quickly deployed to support the business. Join us for a deep dive into how Security and Governance can evolve to meet your organization’s AI needs.
12:15-12:30 MST
12:30-1:20 MST
1:20-1:55 MST
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.

1:55-2:15 MST
This session will explore the critical role of cyber resiliency in helping organizations withstand and recover from today’s evolving threats. We’ll dive into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets-while also examining how compliance regulations can enhance security and safeguard sensitive data. Attendees will come away with actionable insights for strengthening their security posture, minimizing vulnerabilities, and preparing their organizations to face future challenges in an increasingly complex threat landscape.

2:15-2:35 MST
Despite billions spent annually on IAM, PAM, and IGA tools, more than 40% of enterprise applications remain outside the identity perimeter. Critical platforms—social media apps, vendor portals, legacy tools, and other disconnected apps—lack SAML, SCIM, or API support. These “last mile” gaps create dangerous patterns: weak or reused passwords, unmanaged privileged accounts, incomplete deprovisioning, and widespread credential sharing. The result? Elevated breach risk and compliance exposure. In this session, Keith Ledgerwood will expose why disconnected apps are one of today’s biggest blind spots in identity security. He’ll share how leading enterprises are closing these gaps with automation—eliminating manual credential management, streamlining provisioning and deprovisioning, enforcing MFA without added friction, and securing high-risk shared accounts like corporate social media. Attendees will leave with practical strategies to extend their identity perimeter to every app—without custom connectors or hidden license costs—and learn how to reduce risk, save time, and strengthen compliance across their organization’s most vulnerable access points.
2:35-3:05 MST
What makes a good cybersecurity security program?
Harder question: how do you build one from scratch—and keep it operational while doing so?
In this story-driven session, I’ll walk through real-world lessons learned from building cybersecurity programs across multiple industries as a consultant and vCISO. These are programs that not only met compliance requirements but evolved into mature, sustainable, and scalable operations—even after I transitioned them to new leaders.
Attendees will learn:
• Common pitfalls to avoid when building a program while running it (hint: it’s more common than you think)
3:05-3:30 MST
3:30-4:05 MST
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
4:05-4:25 MST
“The rise of nation state threats to all organizations and how it has evolved from just espionage.” As global tensions rise, so do the attacks from nation states against the US and our allies. However, the threat isn’t just to government or critical infrastructure, everyone is a target. Hear from a former CIA analyst on how the changing threat landscape affects us all.
4:25-4:50 MST
No organization can face today’s cyber threats alone. Success in cybersecurity depends on collaboration, knowledge sharing, and the collective strength of a trusted community. In this fireside discussion, Douglas Michaelson, CISO of STCHealth, joins J.D. Miller, SVP of CyberRisk Alliance, to explore why treating cybersecurity as a team sport is essential for resilience. Together, they will discuss the role of peer networks, cross-industry collaboration, and community-driven insights in helping leaders better anticipate and respond to evolving risks. Attendees will walk away with a deeper understanding of how to leverage professional communities for practical guidance, innovative solutions, and long-term security success.
4:50-5:30 MST
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |







