Phoenix-Scottsdale Cybersecurity Conference

  • Conference

Don't wait for a breach to happen, take action and safeguard your digital assets now!  This is your chance to stay ahead of potential attacks by learning about the latest cybersecurity threats, trends, and solutions at the Phoenix Cybersecurity Conference.  Hear from cybersecurity experts and leaders, and connect with other cybersecurity professionals from the region while gaining an edge against nefarious cybersecurity threat actors.

Admission is $150 (without a promo code) for each attendee, which includes a full catered lunch, breakfast, snacks, cocktail networking reception, access to all educational presentations, keynote speakers, panel discussions, and exhibit hall.

YOU CAN’T AFFORD TO MISS THIS CONFERENCE:

green-single-small-dot
Education

Each full-day conference includes a complete schedule of insightful, education-focused presentations and discussions. Learn from industry leaders and luminaries during highly curated panels and keynote sessions on how to improve your organization’s security posture.

orange-four-dot
Access

Whether you’re looking for leading-edge technology solutions, insights from government security agencies, or thought leadership from industry experts, you’ll be met with extensive networking opportunities and opportunities to engage.

yellow-double-small-dot
Experience

Spend the day in comfort, as we provide an executive venue experience. Enjoy abundant breakfasts and lunches, ample drinks and snacks throughout the day, plus a classy networking reception to end the night – all of which is included with your attendance.

blue-five-dot
CPE Credits

By attending the extensive educational sessions, you’ll be eligible for CPE credits, which you can claim to further your professional development.

blue-three-dot
Impact

It’s impossible to put a value on how much your organization could gain through your attendance. Knowledge is power, and your attendance will provide you with the skills and insight that could help your business mitigate inevitable cyber threats.

EVENT SCHEDULE

Each session will focus on various ways to manage your organization’s position in the complex cybersecurity landscape. You’ll learn how to bolster your defenses, protect your data and learn what the best solutions are for your goals.
06:30 AM to 07:00 AM
Networking Breakfast & Exhibit Hall Opens
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Breakfast with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
07:00 AM to 08:30 AM
Training Workshop: Secure Your Organization Today! Key Security Settings that Every Organization Needs to Verify ASAP!
Solutions Showcase
Nanitor@DerekMelber
Derek Melber
Chief Strategist at Nanitor

Security must improve to protect our enterprises. The old-way of buying “point security solutions” is not working, as these solutions are not integrated, don’t correlate, use different risk scoring, etc. The new and improved method of securing an enterprise is to use a unified and continuous threat exposure management solution, which solves the issues that plague organizations trying to work with their disparate solutions. In this workshop, 19X Microsoft MVP Derek Melber will guide you through the specifics of what a typical exposure management platform includes, focusing on the details so you can immediately update your existing solutions. The workshop will show you how to verify existing security settings, using scripts and PowerShell, to verify that your current solutions are not functioning the way you would expect. This exposure to the reality of your existing security will be eye-opening and become the foundation for moving to a unified exposure management platform! Come prepared to learn a ton, have a list of action items to perform when you get back to the office, and overall learn about:

  • What security settings you need to verify today, to ensure you are secure TODAY!
  • How you alter your security mindset to secure your network from attacks
  • What is included in a unified continuous threat exposure management platform
  • What should you look for in a unified CTEM platform

This workshop will be “demo driven” and “action item driven”. Meaning, you will see the scripts and PowerShell commands in action, live (No pathetic recordings!). You will have explanations of each and every setting discussed, so you know the “why” of what you need to verify. 

08:45 AM to 09:15 AM
A Zero Trust Journey for Data Security and Enterprise AI
General Sessions
PD Prasad
Co-Founder and Chief Product Officer at Lightbeam
Add to Calendar 02/08/2024 08:45 AM 02/08/2024 09:15 AM A Zero Trust Journey for Data Security and Enterprise AI
09:15 AM to 09:45 AM
Presentation by Seceon
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
09:45 AM to 10:15 AM
Protecting Against Cyber Attacks
General Sessions
event-simple-logo
Andrew Stone
CTO-Americas at Pure Storage
10:40 AM to 11:00 AM
The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity
General Sessions
Bruce Esposito
Global Strategist at One Identity
Add to Calendar 02/08/2024 10:40 AM 02/08/2024 11:00 AM The Impact of Expanding Attack Surfaces on Enterprise Cybersecurity

Attack surfaces for enterprises are constantly changing due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. Every day, proactive cybercriminals are exploiting new vulnerabilities with skill. In this context, comprehensive Identity Security is crucial to managing risks. However, maintaining a strong Identity and Access Management (IAM) strategy can be a complex task given the multitude of tools involved. This session will address how a unified identity security strategy is key addressing the constantly evolving challenges of today and tomorrow’s cyber threats.

Attack surfaces for enterprises are constantly changing due to the integration of cloud-based infrastructure, interconnected devices, and third-party solutions. Every day, proactive cybercriminals are exploiting new vulnerabilities with skill. In this context, comprehensive Identity Security is crucial to managing risks. However, maintaining a strong Identity and Access Management (IAM) strategy can be a complex task given the multitude of tools involved. This session will address how a unified identity security strategy is key addressing the constantly evolving challenges of today and tomorrow’s cyber threats.

11:00 AM to 11:30 AM
Cyber Inter-Agency Collaboration Panel
General Sessions
event-simple-logo
Jerry D. Keely
Cyber Security Advisor at Dept. of Homeland Security
William Mack
SAIC at USSS
11:20 AM to 11:50 AM
Lunch Break
Solutions Showcase
event-simple-logo
Meet, Engage & Enjoy Lunch with fellow Business Leaders, Cyber Experts, Government Officials & Thought Leaders.
12:00 PM to 12:30 PM
Keynote Presentation: Dare to Think Differently About Your Enterprise Security Approach in 2024
General Sessions
event-simple-logo
Derek Melber
Chief Strategist at Nanitor
Add to Calendar 02/08/2024 12:00 PM 02/08/2024 12:30 PM Keynote Presentation: Dare to Think Differently About Your Enterprise Security Approach in 2024

Thank goodness 2023 is over! Recession, staff reductions, continued cyber attacks, and more breaches! The time is now to consider changing things up! Traditional security solutions such as basic firewalls, vulnerability management, and endpoint detections is just not sufficient for the onslaught of different tactics by attackers. Let 19X Microsoft MVP Derek Melber guide you through some radical thinking regarding the various aspects of securing your endpoints, servers, data, resource access, and more. Just a hint: good core security starts with good security hygiene! By the time you are finished with this engaging keynote, you will want to start analyzing your current approach and considering how you will revamp your security strategies to make a bigger impact in your overall security risk and hygiene.

Thank goodness 2023 is over! Recession, staff reductions, continued cyber attacks, and more breaches! The time is now to consider changing things up! Traditional security solutions such as basic firewalls, vulnerability management, and endpoint detections is just not sufficient for the onslaught of different tactics by attackers. Let 19X Microsoft MVP Derek Melber guide you through some radical thinking regarding the various aspects of securing your endpoints, servers, data, resource access, and more. Just a hint: good core security starts with good security hygiene! By the time you are finished with this engaging keynote, you will want to start analyzing your current approach and considering how you will revamp your security strategies to make a bigger impact in your overall security risk and hygiene.

12:55 PM to 01:15 PM
Presentation by Cymulate
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
01:15 PM to 01:35 PM
Presentation by GitLab, Inc.
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
02:35 PM to 02:05 PM
Opportunities & Risks for Industries - Generative AI Models
General Sessions
event-simple-logo
Joe Vaddakan
Executive Board Member & CISO, Cyber Security Global Alliance
Add to Calendar 02/08/2024 02:35 PM 02/08/2024 02:05 PM Opportunities & Risks for Industries - Generative AI Models
02:25 PM to 02:45 PM
Presentation by ESET
General Sessions
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
02:25 PM to 02:45 AM
Session #8
General Sessions
event-simple-logo
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
03:05 PM to 03:25 AM
Session #9
General Sessions
event-simple-logo
Gain invaluable knowledge and practical insights that will empower you to protect your organization's digital assets with confidence.
03:30 PM to 04:00 PM
Cyber Executive Roundtable
General Sessions
event-simple-logo

Our cybersecurity executive roundtable discussion is always a big highlight of our conferences and is usually a lot of fun!  It’s your opportunity to get unbiased opinions and experiences from executive cybersecurity leaders in this region.  We’re very honored they took the time to be here with us today so let’s make good use of their time and ask them some of those burning questions you have for them.

04:00 PM to 05:00 PM
Networking Reception
Solutions Showcase
event-simple-logo
Join us at the cybersecurity networking reception, where you'll have the opportunity to mingle with top industry thought-leaders and luminaires, exchanging insights and forging valuable connections in the ever-evolving world of cybersecurity.

Gold Partners

Silver Partners

Bronze Partners

Exhibiting Partners

Affiliate Partners

Sponsor

Our cybersecurity conferences empower you to make a personal connection with potential customers. Get your brand in front of key decision-makers who come to our conference looking for solutions to their security challenges.

Contact Us

We’re here to answer your questions, listen to your feedback and hear your comments. Please click on the button below to send us a message – feel free to share potential speakers, ask about sponsorships, or get attendance details.