Principal Strategist,
JumpCloud
Upcoming Summits
Cybersecurity Summit
Earn CPE/CEUs with full attendance
Virtual Summit
Thu, November 13, 2025
11:00AM - 4:00PM EDT
Standard Admission $95
For sponsorship inquiries please complete the following form: Sponsor Form
For assistance with ticket registration contact registration@cybersecuritysummit.com
Beyond the Perimeter: Securing Identity in a Threat-Filled Landscape.
Modern attackers are increasingly targeting the very systems designed to protect us—identity and access management (IAM). From bypassing multifactor authentication (MFA) to exploiting gaps in privileged account management (PAM), these threats expose vulnerabilities that leave organizations at risk. This virtual conference brings together leading experts to explore how security teams can reinforce identity security and ensure access is granted only to the right individuals at the right time. Dive into cutting-edge strategies to protect your workforce, systems, and data from evolving identity-based threats.
Please note that this Summit is Not a job fair or an opportunity to find new career opportunities.
This event is exclusively for professionals that would like to learn about the latest Cyber Security Solutions, Current Threats and for those with the ability to influence & make purchasing decisions for their companies. Our Sponsors & Exhibitors are composed of Sales Engineers & Marketing Executives who are not involved in the hiring process.
The Identity Crisis — Why Traditional Systems Are No Longer Enough
In an age of rapid digital transformation, legacy identity management systems are becoming liabilities. From over-collection of static data to reliance on outdated verification processes, these systems fall short in today’s threat landscape. This panel will explore the inherent weaknesses of traditional identity strategies and how they contribute to rising security and compliance risks. Industry leaders will discuss the evolving needs of identity programs and what it takes to transition to more dynamic, context-aware frameworks that thrive in an AI-driven world.
Rise of the Machines — Managing Non-Human Identities in the AI Age
Non-human identities (NHIs) — such as service accounts, bots, and IoT devices — now outnumber human identities in many environments and managing them has become one of the most complex challenges in cybersecurity. This panel will focus on the unique threats and operational issues posed by NHIs. Panelists will discuss lifecycle management, access governance, and how AI and automation can help bring order to this fast-growing identity domain. Attendees will walk away with practical guidance for improving visibility, security, and trust around machine identities.
Continuous and Decentralized — Rethinking Identity for a Real-Time World
As organizations move toward zero trust and AI-enhanced security models, real-time and decentralized identity verification is gaining momentum. This panel will examine how continuous identity monitoring and decentralized identity frameworks can reduce reliance on static credentials, enhance user autonomy, and build greater trust. The conversation will center around practical implementation strategies, use cases, and the evolving standards that make this transformation possible.
Learn
Learn from renowned experts from around the globe on how to protect & defend your business from cyber attacks during interactive panels & fast track discussions.
Evaluate Demonstrations
Evaluate and see demonstrations from dozens of cutting-edge cybersecurity solution providers that can best protect your enterprise from the latest threats.
Time, Travel & Money
Our mission is to bring the cyber summit to the decisionmakers in the nation’s top cities. Our events are limited to one day only and are produced within first-class hotels, not convention centers.
Engage, Network, Socialize & Share
Engage, network, socialize and share with hundreds of fellow business leaders, cybersecurity experts, C-Suite executives, and entrepreneurs. All attendees are pre-screened and approved in advance. On-site attendance is limited in order to maintain an intimate environment conducive to peer-to-peer interaction and learning.
5
CEUs / CPE Credits
By attending a full day at the Cybersecurity Summit, you will receive a certificate granting you Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits. To earn these credits you must participate for the entire summit and confirm your attendance at the end of the day.
A Worthwhile Investment
By investing one day at the summit you may save your company millions of dollars, avoid stock devaluation, and potential litigation.
For any questions, please contact our Registration Team
To sponsor at an upcoming summit, please fill out the Sponsor Form.
This will focus on how to best protect highly vulnerable business applications and critical infrastructure. Attendees will have the opportunity to meet some of the nation’s leading solution providers and the latest products and services for enterprise cyber defense.
Additional content & speakers will be added leading up to the Summit. Please check back for updates.

11:05-11:25 EDT
As agentic AI adoption grows, organizations are facing new and unexpected cybersecurity challenges. As these agents are deployed to access APIs and services on a massive scale, they can create a dangerous gap in your organization’s defenses – these users are neither human nor the non-thinking machines and “things” of the past, and they require unique approaches to identity security. Without a robust strategy for Identity and Access Management for AI, you are exposed to new threats, from credential theft and privilege escalation to data exfiltration and insider risk. This session will equip you with the knowledge to defend against these emerging threats. We’ll cover how to securely identify, authenticate, and authorize AI agents to perform tasks on behalf of human users, as well as how to govern these agents and manage their lifecycles. Join us to discover how to harness the power of agentic AI while maintaining a strong, defensible security posture.
11:25-12:10 EDT
In an age of rapid digital transformation, legacy identity management systems are becoming liabilities. From over-collection of static data to reliance on outdated verification processes, these systems fall short in today’s threat landscape. This panel will explore the inherent weaknesses of traditional identity strategies and how they contribute to rising security and compliance risks. Industry leaders will discuss the evolving needs of identity programs and what it takes to transition to more dynamic, context-aware frameworks that thrive in an AI-driven world.
12:10-12:40 EDT
12:40-1:00 EDT
What if your privileged access strategy wasn’t just about control, but about resilience? As attack techniques evolve, traditional PAM isn’t keeping up.
1:00-1:45 EDT
Non-human identities (NHIs) — such as service accounts, bots, and IoT devices — now outnumber human identities in many environments and managing them has become one of the most complex challenges in cybersecurity. This panel will focus on the unique threats and operational issues posed by NHIs. Panelists will discuss lifecycle management, access governance, and how AI and automation can help bring order to this fast-growing identity domain. Attendees will walk away with practical guidance for improving visibility, security, and trust around machine identities.
1:45-2:05 EDT
Attacks on user identities and credentials, including sophisticated phishing and biometrics-based attacks, are escalating. Fortunately, technology has evolved to help organizations lock down the user account lifecycle and prevent stolen credentials and breaches. Join this presentation to learn how to leverage today’s technology to future-proof your IAM strategy against current and emerging threats.
2:05-2:50 EDT
As organizations move toward zero trust and AI-enhanced security models, real-time and decentralized identity verification is gaining momentum. This panel will examine how continuous identity monitoring and decentralized identity frameworks can reduce reliance on static credentials, enhance user autonomy, and build greater trust. The conversation will center around practical implementation strategies, use cases, and the evolving standards that make this transformation possible.
Discuss and share the latest in cyber protection with our renowned security experts during interactive panels and roundtable discussions.
The Cybersecurity Summit connects cutting-edge solution providers with cybersecurity practitioners who are involved in evaluating solutions and influencing purchasing decisions. We provide an outstanding exhibition hall and an agenda stacked with interactive panels and engaging sessions.
Find out how you can become a sponsor and grow your business by meeting and spending quality time with key decision makers and dramatically shorten your sales cycle. View Prospectus
| Cookie | Duration | Description |
|---|---|---|
| cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
| cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
| cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
| cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
| cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
| viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |







