Senior Solutions Architect ,
Bitdefender
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
In-Person Summit
Tue, September 9, 2025
8:00AM - 5:00PM CDT
Minneapolis Marriott City Center
Ballroom 1 & 2
30 S 7th Street
Minneapolis, MN, 55402
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, and information security practitioners responsible for safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. For full details CLICK HERE
Standard Admission $250
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
The Inaugural Minneapolis Cybersecurity Summit connects cybersecurity executives and seasoned practitioners responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission offers attendees access to all interactive panels, discussions, catered breakfast, lunch and cocktail reception.
Incident Response and Threat Mitigation
Key Topics:
• Building and managing effective incident response plans.
• Detecting and mitigating cyber and physical threats.
• Using real-time data and intelligence for decision-making.
Why It Matters: Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.
Emerging Threats and Security Trends
Key Topics:
• Ransomware, phishing, and advanced persistent threats (APTs).
• Optimizing operations and improving security through Orchestration and Automation.
• Understanding the impact of AI and IoT on security vulnerabilities.
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
8:00-9:00 CDT
9:00-9:35 CDT

9:35-10:05 CDT
Ransomware remains one of the most damaging and persistent threats facing organizations today. But while payloads evolve, attackers continue to rely on a familiar weakness: the legacy network. Flat architectures, VPNs, and implicit trust models provide the lateral movement needed to turn a single compromised endpoint into a widespread breach. Based on findings from the latest Zscaler ThreatLabz Ransomware Report, this session explores how traditional hub-and-spoke networks—built for connectivity, not containment—enable ransomware to traverse corporate environments unchecked, and how a cafe-like Zero Trust Branch architecture can shrink your attack surface and limit malware spread.

10:05-10:35 CDT
Data resilience is becoming a cornerstone of modern industry, ensuring continuous access to critical information that drives smarter decision-making, automation, and innovation. As digital infrastructures grow more complex and interconnected, the need for robust cybersecurity becomes paramount. AI now throws a whole new point of concern—making it even more critical to ensure your data is secure, as intelligent systems rely heavily on accurate, trusted information. Threats such as ransomware, data corruption, system failures, and malicious attacks underscore the importance of protecting data at every stage—from creation and transmission to storage and recovery. Data resiliency plays a vital role in cybersecurity—because if your data isn’t recoverable, how long would it take your organization to recover, if at all? Ensuring that your infrastructure can restore vital data is essential for maintaining business continuity. Investing in data security and resilient infrastructure is not just a technical requirement—it’s a strategic necessity for sustainable and secure operations.
10:35-11:00 CDT
11:00-11:35 CDT
Key Topics:
Why It Matters:
Security managers often handle tactical responses. Understanding effective response strategies ensures timely containment and resolution of incidents.

11:35-11:55 CDT
Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode. Attend our session to learn: • Why traditional approaches to data security have failed • How AI and context are revolutionizing data security • Where to maximize the value of your existing security investments • What you can do to secure your Gen AI rollouts With the right strategy and technology, you can transform your data from a liability to a well-managed asset.
11:55-12:15 CDT
Join Jay Shah, Senior Solutions Architect at Horizon3.ai, for an engaging session on “Offense-Driven Defense.” Jay will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 150,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

12:15-12:35 CDT
Join a candid conversation between a Fortune 500 manufacturing security leader and a solutions architect as they dissect two decades of network segmentation evolution. From the nightmare of managing thousands of firewall rules across siloed teams to today’s identity-based approaches, this fireside chat reveals what actually happens when IT, Security, and OT teams collide over competing priorities. Learn how CISA mandates transformed segmentation from optional to essential, why traditional approaches create “Swiss cheese” networks, and how modern manufacturing leaders are building trust across teams while implementing dynamic, context-aware security. No vendor pitches—just hard-won lessons from the factory floor.
12:35-1:25 CDT

1:25-1:45 CDT
AI offers a compelling path to scale detection, triage, and response. But building an AI-powered Security Operations Center (SOC) isn’t just about plugging in a model – it’s about aligning the right technology, people, and workflows. In this session, we’ll walk through the key considerations for operationalizing AI in your SOC. You’ll learn how to evaluate AI technologies (LLMs vs. traditional automation), where to integrate them into alert and case workflows, and what makes an interface truly usable for analysts. We’ll deconstruct the practical side of maintaining quality – from tuning and feedback loops to continuous pruning and routine case sampling. Finally, we’ll lock in how to measure success with clear KPIs that go beyond “more alerts closed.” Whether you’re augmenting human analysts or laying the groundwork for full AI-led response, this talk will give you a blueprint for doing it right.

1:45-2:05 CDT
Rapid changes in public‑key infrastructure are reshaping operational and compliance expectations. By 15 March 2026 the CA/B Forum will reduce the maximum validity of publicly trusted TLS certificates to 200 days, with a roadmap to 47 days by 2029. Google has announced removal of the ClientAuth EKU from browser‑trusted certificates. Recent events—including Entrust’s browser distrust and DigiCert’s emergency revocation of 84 000 certificates—demonstrate the scale of disruption when certificates must be replaced at short notice. In parallel, NIST formally approved its first post‑quantum algorithms on 13 August 2024, signaling the start of industry migration toward quantum‑resistant cryptography. This briefing provides security architects, product owners, and operations teams with a concise action plan for the next three years: Certificate Lifetime Reduction – implications of 47‑day validity periods and how end‑to‑end automation (ACME/EST issuance, delegated DNS‑01 or HTTP‑01 domain validation, stapled OCSP, and scheduled revocation tests) sustains availability. Managing Mass Revocations – analysis of recent CA incidents, readiness metrics to track, blast‑radius containment strategies, and effective stakeholder communication. Transition to Quantum‑Safe Cryptography – practical steps for introducing hybrid X.509 certificates, rotating keys within HSMs, and deploying NIST‑approved algorithms (Dilithium, Falcon, SPHINCS+) alongside existing elliptic‑curve and RSA deployments. Attendees will gain a clear understanding of the operational, security, and business consequences of these developments, together with pragmatic measures that can be incorporated into 2025–2027 plans. The session emphasizes fact‑based guidance and proven practices suitable for organizations of all sizes.
2:05-2:30 CDT
In this presentation you will understand the baseline minimum cybersecurity program practices and the industry accepted BEST PRACTICES for a cybersecurity program. You will gain an increased understanding of what it takes to protect sensitive data, maintain system integrity, and ensure availability and business continuity in our increasingly digital world.
As cyber threats grow in sophistication and frequency, organizations must adopt proactive strategies to defend against data breaches, financial loss, reputational damage, and legal consequences. Best cybersecurity program practices—such as regular risk assessments, employee training, access controls, and incident response planning—provide a structured and resilient approach to mitigating risks. By embedding cybersecurity into every layer of operations, organizations not only safeguard their assets but also build trust with stakeholders and stay compliant with regulatory requirements.
2:30-2:55 CDT
2:55-3:40 CDT
Key Topics:
Why It Matters:
Staying informed about the latest threats helps leaders anticipate and prepare for risks that can disrupt operations.
3:40-4:00 CDT
4:00-4:25 CDT
In today’s cybersecurity landscape, humans remain both our last line of defense and our most vulnerable point of failure. Despite sophisticated tools and layered defenses, risky human behaviors—whether accidental or intentional—continue to expose organizations to threats. In this session, Beth Singer, Director of IT Compliance, shares her experience developing an approach to empower teams to proactively reduce human-driven vulnerabilities. Attendees will gain insights into how visibility can drive accountability, and how culture, communication, and targeted interventions can transform human risk from a liability into a strength.
4:25-5:00 CDT
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
The Cybersecurity Summit is proud to partner with some of the industry’s most respected organizations in technology, information security, and business leadership.
Admission to the Cybersecurity Summit is reserved exclusively for active cybersecurity, IT, Information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review.
Students, interns, educators, consultants, individuals not currently employed in IT, and those in sales or marketing roles are not eligible to attend.
Additionally, if we are unable to verify your identity with the information you provided during registration, your attendance may be cancelled.
Please note these qualifications pertain to all attendees, including members of our partner organizations.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |







