Phoenix-Scottsdale Cybersecurity Conference

  • Conference

Don't wait for a breach to happen, take action and safeguard your digital assets now!  This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the Phoenix Cybersecurity Conference.  Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors.

Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
06:30 AM to 07:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
07:00 AM to 08:30 AM
Consistency: Driving Security for 2024
Solutions Showcase
Nanitor@DerekMelber
Derek Melber
Chief Strategist at Nanitor

Whether you are an SMB, Enterprise, or MSSP, you need to know what your endpoints are running. You need to know your endpoints are secured and have not drifted from running approved software. You need to know your endpoints have the proper patches for the OS, software, and even device drivers. This is only possible with solutions that are dedicated for such tasks. Let 19X Microsoft MVP Derek Melber describe the ideal scenario that every organization can create to help them establish endpoints that can withstand some of the most brutal attacks. This is a combination of keynote and workshop, so bring your thinking caps! 

08:45 AM to 09:15 AM
A Zero Trust Journey for Data Security and Enterprise AI
General Sessions
PD Prasad
Co-Founder and Chief Product Officer at Lightbeam
Add to Calendar 02/08/2024 08:45 AM 02/08/2024 09:15 AM A Zero Trust Journey for Data Security and Enterprise AI
09:15 AM to 09:45 AM
Presentation by Seceon
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
09:45 AM to 10:15 AM
Protecting Against Cyber Attacks
General Sessions
event-simple-logo
Andrew Stone
CTO-Americas at Pure Storage
10:40 AM to 11:00 AM
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity
General Sessions
Bruce Esposito
Global Strategist at One Identity
Add to Calendar 02/08/2024 10:40 AM 02/08/2024 11:00 AM The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity

Attack surfaces for enterprises are constantly changing due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. Every day, proactive cybercriminals are exploiting new vulnerabilities with skill. In this context, comprehensive Identity Security is crucial to managing risks. However, maintaining a strong Identity and Access Management (IAM) strategy can be a complex task given the multitude of tools involved. This session will address how a unified identity security strategy is key addressing the constantly evolving challenges of today and tomorrow’s cyber threats.

Attack surfaces for enterprises are constantly changing due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. Every day, proactive cybercriminals are exploiting new vulnerabilities with skill. In this context, comprehensive Identity Security is crucial to managing risks. However, maintaining a strong Identity and Access Management (IAM) strategy can be a complex task given the multitude of tools involved. This session will address how a unified identity security strategy is key addressing the constantly evolving challenges of today and tomorrow’s cyber threats.

11:00 AM to 11:30 AM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
Jerry D. Keely
Cyber Security Advisor at Dept. of Homeland Security
William Mack
SAIC at USSS
Riley Montgomery
SSA
11:20 AM to 11:50 AM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:00 PM to 12:30 PM
Keynote Presentation: Dare to Think Differently About Your Enterprise Security Approach in 2024
General Sessions
event-simple-logo
Derek Melber
Chief Strategist at Nanitor
Add to Calendar 02/08/2024 12:00 PM 02/08/2024 12:30 PM Keynote Presentation: Dare to Think Differently About Your Enterprise Security Approach in 2024

Thank goodness 2023 is over! Recession, staff reductions, continued cyber attacks, and more breaches! The time is now to consider changing things up! Traditional security solutions such as basic firewalls, vulnerability management, and endpoint detections is just not sufficient for the onslaught of different tactics by attackers. Let 19X Microsoft MVP Derek Melber guide you through some radical thinking regarding the various aspects of securing your endpoints, servers, data, resource access, and more. Just a hint: good core security starts with good security hygiene! By the time you are finished with this engaging keynote, you will want to start analyzing your current approach and considering how you will revamp your security strategies to make a bigger impact in your overall security risk and hygiene.

Thank goodness 2023 is over! Recession, staff reductions, continued cyber attacks, and more breaches! The time is now to consider changing things up! Traditional security solutions such as basic firewalls, vulnerability management, and endpoint detections is just not sufficient for the onslaught of different tactics by attackers. Let 19X Microsoft MVP Derek Melber guide you through some radical thinking regarding the various aspects of securing your endpoints, servers, data, resource access, and more. Just a hint: good core security starts with good security hygiene! By the time you are finished with this engaging keynote, you will want to start analyzing your current approach and considering how you will revamp your security strategies to make a bigger impact in your overall security risk and hygiene.

12:55 PM to 01:15 PM
Today's Cybersecurity Arsenal: 3 Methods to Effectively Protect Your Infrastructure Against the Rising Tide of Cyber Attacks
General Sessions
Michael Saladino
Senior Security Solutions Architect at Cymulate
Add to Calendar 02/08/2024 12:55 PM 02/08/2024 01:15 PM Today's Cybersecurity Arsenal: 3 Methods to Effectively Protect Your Infrastructure Against the Rising Tide of Cyber Attacks

Organizations of all shapes and sizes are fighting battles against threat actors. As seen in recent years, cyber-attacks have become more sophisticated, making them harder to detect and mitigate. 

 

Today, there are two main methods relied upon by CISOs, and organizations in general, to verify that their infrastructure and their data and IP are protected. The risk assessment these methods generate might satisfy compliance regulators, but they fail to accurately validate the organization's actual security posture, especially against emerging threats, multi-vector attacks, and APTs. 

 

In this session, you’ll learn about a three-part purple teaming framework that helps you prepare for future bouts… especially when it comes to sophisticated, multi-vector attacks.

Organizations of all shapes and sizes are fighting battles against threat actors. As seen in recent years, cyber-attacks have become more sophisticated, making them harder to detect and mitigate. 

 

Today, there are two main methods relied upon by CISOs, and organizations in general, to verify that their infrastructure and their data and IP are protected. The risk assessment these methods generate might satisfy compliance regulators, but they fail to accurately validate the organization's actual security posture, especially against emerging threats, multi-vector attacks, and APTs. 

 

In this session, you’ll learn about a three-part purple teaming framework that helps you prepare for future bouts… especially when it comes to sophisticated, multi-vector attacks.

01:15 PM to 01:35 PM
Shifting Responsibility Left - Transforming Software Security for Innovation and Compliance
General Sessions
Bradley Lee
Solutions Architect at GitLab
Add to Calendar 02/08/2024 01:15 PM 02/08/2024 01:35 PM Shifting Responsibility Left - Transforming Software Security for Innovation and Compliance
02:35 PM to 02:05 PM
Opportunities & Risks for Industries - Generative AI Models
General Sessions
event-simple-logo
Joe Vadakkan
Executive Board Member & CISO, Cyber Security Global Alliance
Add to Calendar 02/08/2024 02:35 PM 02/08/2024 02:05 PM Opportunities & Risks for Industries - Generative AI Models

Generative AI models can perform tasks that traditionally require creativity

and human understanding. They learn patterns from existing data during training and can subsequently generate new content, such as texts, images, and music, that follow these patterns. Due to their versatility and generally high-quality results, they, on the one hand, represent an opportunity for digitalization. On the other hand, the use of generative AI models introduces novel IT security risks that need to be considered for a comprehensive analysis of the threat landscape in relation to IT security. we will be diving into risk analysis, measures 

and operational model with utilizing Gen AI

Generative AI models can perform tasks that traditionally require creativity

and human understanding. They learn patterns from existing data during training and can subsequently generate new content, such as texts, images, and music, that follow these patterns. Due to their versatility and generally high-quality results, they, on the one hand, represent an opportunity for digitalization. On the other hand, the use of generative AI models introduces novel IT security risks that need to be considered for a comprehensive analysis of the threat landscape in relation to IT security. we will be diving into risk analysis, measures 

and operational model with utilizing Gen AI

02:25 PM to 02:45 PM
The Importance of Meeting cyber insurance requirements
General Sessions
Raymond Neff
Field Sales Engineer II at ESET
Add to Calendar 02/08/2024 02:25 PM 02/08/2024 02:45 PM The Importance of Meeting cyber insurance requirements Coming Soon :)
02:25 PM to 02:45 AM
Session #8
General Sessions
event-simple-logo
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
03:05 PM to 03:25 AM
Session #9
General Sessions
event-simple-logo
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
03:30 PM to 04:00 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo

Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun!  It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region.  We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.

04:00 PM to 05:00 PM
Networking Reception
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.

Gold Partners

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.