Author, Head of Cybersecurity North America,
Bureau Veritas
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, October 16, 2025
8:00AM - 5:00PM EDT
The Westin Copley Place, Boston
America Center & South
10 Huntington Ave
Boston, MA, 02116
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 10th Edition of the Boston Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Women in Cyber
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-8:50 EDT
8:50-9:00 EDT
9:00-9:35 EDT
Scott Margolis will share insights on the evolving supply chain threat landscape and its impact on critical infrastructure, along with MBTA’s approach to managing vendor and third-party risks across IT, OT, and operations. I will also highlight practical strategies such as Zero Trust, virtualization, and regulatory alignment, while providing a forward-looking perspective on emerging risks and the importance of building resilient vendor ecosystems.
9:35-10:05 EDT
As organizations rush to integrate generative AI into their products and workflows, many overlook one critical aspect, security at every layer of the AI pipeline. From data ingestion to model deployment, each component introduces unique risks that traditional cloud security frameworks were never designed to handle. This session explores practical strategies to secure generative AI workloads in cloud-native environments, focusing on model integrity, data confidentiality, and supply chain protection. Drawing from real-world implementations, I will show how to safeguard LLM pipelines, mitigate prompt injection and data exfiltration risks, and enforce Zero Trust principles across AI services. They will gain actionable insights into how tools like Kubernetes, service meshes (e.g., Istio), and secrets managers can be orchestrated to build secure, scalable AI systems without slowing innovation. By the end of this talk, attendees will understand what a secure GenAI lifecycle truly looks like and how to operationalize it in their own organizations.
10:05-10:35 EDT
10:35-11:00 EDT
11:00-11:35 EDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.

11:35-11:55 EDT
Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode. Attend our session to learn:
• Why traditional approaches to data security have failed
• How AI and context are revolutionizing data security
• Where to maximize the value of your existing security investments
• What you can do to secure your Gen AI rollouts With the right strategy and technology, you can transform your data from a liability to a well-managed asset.

11:55-12:15 EDT
The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.
12:15-12:45 EDT
12:45-1:35 EDT
1:35-2:20 EDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.

2:20-2:40 EDT
We know people, not firewalls are the front line defense. But attackers don’t break-in, they log-in, and more often than not, it is a human who unknowingly hands them the keys. In this session, we will explore real-world breaches detailing how Social Engineering skills were leveraged by adversaries to get the initial access and set off a chain of compromise. We will share the insights from Verizon’s DBIR 2025 and real examples from Verizon cyber investigations on social engineering trends, and how adversaries leverage trust to gain unauthorized access.

2:40-3:00 EDT
Perimeter defenses are a long-standing strategy, but cybercriminals and ransomware operators are increasingly adept at bypassing them. Once inside, they exploit network blind spots, utilize encrypted traffic, and target cloud workloads to remain undetected. What if you could turn these tactics to your advantage? In this discussion, Fortinet cybersecurity expert will explore how SOC teams can proactively hunt for attackers by using their own strengths against them.
3:00-3:25 EDT

3:25-3:45 EDT
In today’s cyber threat landscape, your backup is no longer your safety net, it’s the first system attackers aim to compromise. According to recent research, 98% of ransomware attacks now target backups, and more than half are successful. As threat actors evolve, so must your defense posture. This session will explore the growing need for security and IT to work together to not only protect production environments but your backups and backup ecosystems as well. We’ll expose critical gaps in traditional backup strategies that leave organizations vulnerable to ransomware attacks, compromised credentials, and malicious insiders. Using Druva’s Cyber Resilience Maturity Model along with the NIST 2.0 framework, we’ll walk through the five levels of cyber recovery readiness, from data immutability to advanced threat detection, and how to operationalize them without adding complexity or cost. Real-world examples will highlight how security-forward organizations are using cloud-native, agentless architectures to achieve: Immutable, air-gapped backups for workloads no matter if they are edge, cloud, or datacenter 24/7 threat monitoring and forensics across backup environments Automated ransomware detection, quarantine, and clean recovery Zero Trust-aligned backup environments decoupled from primary infrastructure We’ll also tackle how modern platforms like Druva simplify compliance, reduce operational burden, and augment your cyber resilience and recovery by embedding security into the backup layer. Join us to learn why cyber recovery is the new front line of cyber defense, and why your backup strategy might be your biggest vulnerability, or your strongest asset.

3:45-4:05 EDT
The unsanctioned use of AI tools—creates blind spots for security teams. This session examines how hidden adoption drives data leakage, compliance violations, and attack surface expansion. We’ll analyze emerging threat models, real-world failures, and practical controls, equipping security leaders to assess risk, enforce governance, and safely enable AI innovation.
4:05-4:35 EDT
Venture capital and private equity firms play a powerful role in defining the future of technology – and cybersecurity is now at the center of that strategy. In this session, James Stanzler, a managing director at Atreides Management, will share insights on how top firms are evaluating cybersecurity opportunities, what trends are driving investment decisions, and how innovation, risk, and resilience intersect in the modern tech landscape. Attendees will gain a rare inside look at how capital markets are fueling the next generation of cybersecurity solutions, what signals investors watch for in emerging tech, and where the industry is headed next.
4:35-5:00 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |







