VP, Partner Ecosystems,
Dataminr
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Thu, October 9, 2025
8:00AM - 5:30PM EDT
The Westin Charlotte
Grand Ballroom ABC
601 South College Street
Charlotte, NC, 28202
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 7th Annual Charlotte Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Women in Cyber
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 EDT
9:00-9:35 EDT

9:35-10:05 EDT
Transform your cybersecurity posture from reactive to proactive with Dataminr’s real-time threat intelligence integrated into platforms cybersecurity teams already know and trust. Discover how you can leverage Dataminr’s groundbreaking AI innovations, including Live Briefs, Intel Agents, and Generative Anomaly Alerts from public and dark web sources in your existing SIEM/SOAR/TIP platforms to empower faster detection, reduce dwell time, and stay ahead of critical threats with actionable insights and seamless SOC integration.

10:05-10:35 EDT
As organizations rapidly adopt generative AI and emerging technologies, security leaders face a critical challenge: enabling innovation while managing risk. Traditional approaches to security and risk management are being tested by AI’s unique characteristics and far-reaching business impact. The solution may not lie in complex new organizational structures like “fusion centers,” but rather in a more fundamental reimagining of how we approach security governance. Enter the Five Cs framework – a pragmatic approach that bridges the gap between innovation and security without creating additional organizational complexity. Join LevelBlue, a global leader in security services, as we share field insights from helping organizations navigate AI adoption. Learn how the Five Cs framework can help you.
10:35-11:00 EDT
11:00-11:35 EDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.

11:35-11:55 EDT
Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode. Attend our session to learn:
• Why traditional approaches to data security have failed
• How AI and context are revolutionizing data security
• Where to maximize the value of your existing security investments
• What you can do to secure your Gen AI rollouts With the right strategy and technology, you can transform your data from a liability to a well-managed asset

11:55-12:15 EDT
The AI revolution is fundamentally transforming cybersecurity, while the future of networking evolves toward Hybrid Full Mesh—integrating 5G, WiFi, Ethernet, Fiber, and other network infrastructures. This presentation examines how AI is accelerating cyber threats: attack costs are skyrocketing, incidents surging 50% year-over-year, and ransomware development compressed from nine days to mere minutes*. We’ll explore why Hybrid SASE (not cloud-only) forms the core of an effective hybrid full-mesh security architecture and how organizations can respond when the rate of change and complexity outpace their capabilities. Most importantly, we’ll demonstrate why security isn’t just a feature but the essential foundation of operations in this new era of hyperconnected vulnerability.

12:15-12:35 EDT
Network teams deal with frustrated users. Security teams wake up paranoid. At this textile and building supply manufacturer, these traditionally opposing forces found themselves in an endless cycle of friction—users and engineers wanted speed and agility to deploy new capabilities on the network quickly, security needed more controls and visibility, and neither got what they needed. With 30,000+ devices across 24/7 manufacturing operations and exponential growth ahead, this dysfunction wasn’t sustainable. This presentation reveals how this manufacturer transformed adversarial relationships into true collaboration using a modern microsegmentation platform. CISO Max Everett will share how one technology implementation united both teams around shared victories: network gained automated device discovery and scalability without additional headcount, while security achieved lateral movement prevention and real-time threat containment. Modern microsegmentation is a network security strategy that divides a network into multiple smaller, isolated segments, allowing for fine-grained security policies down to the workload level and significantly reducing the attack surface. Unlike legacy approaches that require complex hardware, agents, and extensive planning, identity-based microsegmentation brings together IT, OT, IoT, Compliance, and Security teams in one unified platform through comprehensive visibility, automated policy management, scalable solution deployment, and streamlined compliance and audit reporting.
Key takeaways include:
· How both teams partnered from day one of the pilot, seeing mutual value
· Why agentless, automation-first approaches eliminate traditional friction points
· Strategies for speaking a common language of risk and resilience
· The cultural shift from “Office of No” to business enablement
· Practical deployment: two sites in under an hour with zero disruption
· Definition of modern microsegmentation and how it enables rapid Zero Trust maturity Learn how this manufacturer broke the pattern of failed microsegmentation projects by focusing on collaboration over confrontation. Discover why giving both teams what they need—through the same platform—transforms security from a business blocker into a business enabler. This is the playbook for uniting your teams while securing complex environments.
12:35-1:25 EDT
1:25-2:00 EDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.

2:00-2:20 EDT
Cybersecurity threats are continuously evolving and traditional Privileged Access Management (PAM) must also evolve and mature into Identity Security in order to address modern attack vectors. In this presentation, we will discuss the evolution of PAM, the importance of managing both human and non-human identities across distributed workforces and cloud environments, while introducing a PAM Maturity Model that will empowering organizations with a framework to evaluate their security posture through risk reduction, operational efficiency, compliance, and business protection.
Key strategies will include:
Zero Trust Architectures, Just-In-Time Access, and AI-Driven continuous monitoring, ensuring that all privileged access is granted security and only when necessary. We will highlight the importance of transitioning from legacy Pam practices, such as VPN reliance and standing privileges to passwordless authentication and least privilege enforcement.
Business benefits include:
· Meeting Cyber Insurance Mandates
· Improved Compliance
· Enhanced Security
· Holistic Visibility and Business Efficiency

2:20-2:40 EDT
This session explores the critical role of cyber resiliency in helping organizations withstand and recover from today’s evolving threats. Participants will dive into strategies for reducing attack surfaces, visualizing networks, and securing critical IT assets, while also examining how compliance regulations can enhance security and safeguard sensitive data.
In this session you will:
Explore strategies to reduce attack surfaces and secure critical IT assets
Learn how network visualization strengthens resiliency
Understand how compliance regulations can enhance security and protect sensitive data
Gain actionable insights to strengthen security posture, minimize vulnerabilities, and prepare for future challenges

2:40-3:00 EDT
This session explores today’s evolving cybersecurity landscape through insights from the IBM X-Force Threat Intelligence Index and the IBM Cost of a Data Breach Report. Attendees will gain an understanding of current attack trends, the financial impact of data breaches, and emerging innovative trends in security such as AI-driven defense and zero-trust strategies. The presentation concludes with how resiliency with IBM Storage provides the foundation for data protection, recovery, and business continuity—helping organizations stay secure, prepared, and resilient against modern threats.
3:00-3:25 EDT
3:25-4:00 EDT
Hear from the women shaping the future of cybersecurity. This executive panel features trailblazing female cybersecurity leaders who are not only securing global enterprises and critical infrastructure, but also redefining what leadership looks like in the industry. In a candid, high-impact discussion, panelists will share lessons from the front lines—navigating complex threats, building high-performing teams, and breaking barriers in a traditionally male-dominated field. Attendees will gain executive-level insights into how diverse leadership drives stronger outcomes, how to build more inclusive cultures from the top down, and why supporting women in cyber isn’t just good optics—it’s smart strategy.

4:00-4:20 EDT
Identity has evolved from physical credentials to centralized digital systems—but with that shift comes increased risk. Today’s identity models expose organizations to breaches, compliance challenges, and privacy concerns. This presentation introduces decentralized identity: a user-controlled, verifiable approach that reduces reliance on vulnerable silos. We’ll explore how it works, why it matters, and how it can strengthen security, enhance trust, and align with modern privacy expectations.

4:20-4:40 EDT
Rapid changes in public‑key infrastructure are reshaping operational and compliance expectations. By 15 March 2026 the CA/B Forum will reduce the maximum validity of publicly trusted TLS certificates to 200 days, with a roadmap to 47 days by 2029. Google has announced removal of the ClientAuth EKU from browser‑trusted certificates. Recent events—including Entrust’s browser distrust and DigiCert’s emergency revocation of 84 000 certificates—demonstrate the scale of disruption when certificates must be replaced at short notice. In parallel, NIST formally approved its first post‑quantum algorithms on 13 August 2024, signaling the start of industry migration toward quantum‑resistant cryptography. This briefing provides security architects, product owners, and operations teams with a concise action plan for the next three years: Certificate Lifetime Reduction – implications of 47‑day validity periods and how end‑to‑end automation (ACME/EST issuance, delegated DNS‑01 or HTTP‑01 domain validation, stapled OCSP, and scheduled revocation tests) sustains availability. Managing Mass Revocations – analysis of recent CA incidents, readiness metrics to track, blast‑radius containment strategies, and effective stakeholder communication. Transition to Quantum‑Safe Cryptography – practical steps for introducing hybrid X.509 certificates, rotating keys within HSMs, and deploying NIST‑approved algorithms (Dilithium, Falcon, SPHINCS+) alongside existing elliptic‑curve and RSA deployments. Attendees will gain a clear understanding of the operational, security, and business consequences of these developments, together with pragmatic measures that can be incorporated into 2025–2027 plans. The session emphasizes fact‑based guidance and proven practices suitable for organizations of all sizes.
4:40-5:05 EDT
The demands on today’s CISOs and cybersecurity leaders are greater than ever. From nonstop threat monitoring to board-level accountability, the pressure can feel relentless, leading to burnout that impacts both the leader and the organization. In this session, Rick Scot, Global CISO at Elevate Textiles, will share insights from Cyber Risk Collaborative research and executive discussions that shed light on the root causes of leadership fatigue. Attendees will gain a deeper understanding of the patterns emerging across the industry, the organizational risks tied to burnout, and practical strategies to sustain resilience in leadership while strengthening team performance.
5:05-5:30 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |







