Senior Solutions Engineer,
Cloudflare
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Tue, September 30, 2025
8:00AM - 4:30PM EDT
Renaissance Columbus Downtown Hotel
Hayes CDE
50 North Third Street
Columbus, OH, 43215
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The 6th Annual Columbus Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:15 EDT

9:15-9:50 EDT
The name Andelyn Biosciences honors Andrew and Evelyn, two pioneering gene therapy patients. Andrew received the first U.S. DMD gene therapy; Evelyn helped create SMA’s first approved treatment. Andelyn Biosciences manufactures gene therapies that turn hope into reality for families facing rare diseases. But they faced a critical challenge: after two years struggling with a failing NAC solution that was too complex to deploy and impossible to manage effectively, they had zero cybersecurity policies protecting their manufacturing environment. Every vulnerable day risked not their business, but the future treatments that could save children like Andrew and Evelyn. Join Bryan Holmes, VP of Information Technology, as he shares their dramatic transformation using Elisity’s identity-based microsegmentation platform. Discover how he achieved what seemed impossible: easy deployment, simple management, and dramatically higher security. In just 90 days, his small IT team deployed 2,700 active security policies without agents, without downtime, and without the operational complexity that had defeated them before. Learn how he moved from a failed NAC implementation that required specialized expertise he didn’t have, to a modern microsegmentation solution so intuitive that his 3-person IT team could deploy and manage enterprise-grade protection. This isn’t just about deploying technology—it’s about finding solutions that actually work for real teams with real constraints, while honoring the courage of two brave children and ensuring every gene therapy batch we manufacture safely reaches the patients counting on them. Discover the practical strategies, hard-won lessons, and bold decisions that enabled a 300-person company to achieve higher security with lower complexity, proving that the right approach makes all the difference in protecting life-critical manufacturing operations.
9:50-10:25 EDT
Things keep changing. And changing. Security professionals need to secure all the things, and all the new things. We’ll discuss tactics and share resources for getting on top of the information overload and keeping up – without losing your mind.
10:25-11:00 EDT

11:00-11:20 EDT
Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode. Attend our session to learn:
• Why traditional approaches to data security have failed
• How AI and context are revolutionizing data security
• Where to maximize the value of your existing security investments
• What you can do to secure your Gen AI rollouts With the right strategy and technology, you can transform your data from a liability to a well-managed asset.

11:20-11:40 EDT

11:40-12:00 EDT
Join Jake Mickley, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Jake will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.
12:00-12:50 EDT
12:50-1:15 EDT
As cyber threats continue to evolve, traditional passwords have become one of the weakest links in enterprise security – easily guessed, reused, or phished. This presentation explores modern password less authentication solutions that enhance both security and user experience. Focusing on technologies such as Windows Hello for Business, FIDO2 security keys, and web sign-in for password less multi-factor authentication (MFA), We share deployment insights on how organizations can eliminate passwords altogether while maintaining strong, user-friendly access controls. Attendees will gain insight into how these technologies work, and why they are critical in defending against password stuffing, phishing attacks, and other credential-based threats. Join us to learn how going password less is not only possible, but necessary for a more secure and modern digital environment.

1:15-1:35 EDT
Ransomware attacks continue to be extremely lucrative, with ransom demands and recovery costs bleeding victim organizations for millions of dollars. And things change fast in this space – RaaS groups rise and fall with law enforcement takedowns, or disband and reorganize under different brands, so it can all be a little confusing. Each quarter, the Halcyon team of ransomware experts put together a RaaS power rankings guide for the ransomware threat landscape.

1:35-1:55 EDT
Data resilience is becoming a cornerstone of modern industry, ensuring continuous access to critical information that drives smarter decision-making, automation, and innovation. As digital infrastructures grow more complex and interconnected, the need for robust cybersecurity becomes paramount. AI now throws a whole new point of concern—making it even more critical to ensure your data is secure, as intelligent systems rely heavily on accurate, trusted information. Threats such as ransomware, data corruption, system failures, and malicious attacks underscore the importance of protecting data at every stage—from creation and transmission to storage and recovery. Data resiliency plays a vital role in cybersecurity—because if your data isn’t recoverable, how long would it take your organization to recover, if at all? Ensuring that your infrastructure can restore vital data is essential for maintaining business continuity. Investing in data security and resilient infrastructure is not just a technical requirement—it’s a strategic necessity for sustainable and secure operations.
1:55-2:20 EDT
2:20-2:55 EDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.

2:55-3:15 EDT
The cybersecurity landscape has experienced a fundamental paradigm shift that most organizations haven’t recognized yet: while security teams continue deploying signature-based detection and traditional machine learning models, cybercriminals have weaponized Large Language Models to launch fully automated, AI-powered attack pipelines that consistently evade legacy security systems. In this eye-opening keynote, cybersecurity veteran Joshua Bass reveals how attackers are jailbreaking open-source models like Mistral and LLaMA to generate polymorphic malware and hyper-personalized social engineering attacks, then introduces a revolutionary approach to threat detection that moves from pattern matching to intent reasoning, demonstrating how AI-native defenses can effectively counter attack vectors that completely bypass traditional tools. Attendees will leave with actionable insights about the current threat landscape, practical techniques for identifying AI-generated attacks, and a clear understanding of why the future of cybersecurity lies not in detecting what attacks look like, but in reasoning about what they’re trying to accomplish.
3:15-3:45 EDT
3:45-4:30 EDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
To sponsor at an upcoming summit, please fill out the Sponsor form. »
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |







