Call for Presentations

Submissions are now closed

Thank you for your presentation proposals!

All proposals are being evaluated and speakers will be notified whether their proposal has been selected.

Please check back soon for details on selected speakers and Summit agenda details.


Suggested Topics

This conference is for you and about you. Your expertise and creativity are welcome in shaping the topics that will be covered. Suggestions for presentations could include but are not limited to the following topics:

What boards of directors, c-level executives, and managers need to know about cyber security
  • Risk management in an increasingly connected world
  • Breach preparedness for the c-suite
  • Considerations when dealing with cyber extortion or disruptive threat actors
  • Implications of cyber security talent shortages
  • Securing information in the cloud era
  • The evolving threat landscape
  • Role of artificial intelligence in cyber security
  • Implications of IoT on cyber security
  • Rise of the nation-state cybercriminal and implications to organizations and/or agencies
  • The value of compromise assessment and red teaming
  • The future state of cyber security
  • Busting the myths of cyber security
  • Strategic, legal and/or operational considerations regarding incident detection and response
  • Managing communications during a cyber breach: the dos, don’ts, and best practices
  • How much is enough in cyber security?
  • Industry specific sessions: Solutions, best practices, compliance for securing government, healthcare, financials, etc.
What practitioners need to know to secure their organizations and agencies
  • Tales from the front lines – the latest on security breaches
  • Defending against nation-state sponsors/threat groups
  • Understanding the cyber threat attack cycle
  • Running effective red teaming and blue teaming
  • Using strategic threat intelligence to hunt and prevent threats
  • Reverse engineering the SOC analyst
  • The future of security operations
  • Role of artificial intelligence in cyber security
  • Securing data in the cloud
  • Advances in tools or methodologies for incident prevention, detection, response or containment
  • Case studies highlighting unique, real-world intrusion scenarios and investigation and response efforts
  • Digital forensics applied to host- and network-based sources of evidence
  • Use of network security monitoring, host-based tools, and SIEM solutions to detect and respond to enterprise-scale attacks
  • Malware analysis and mitigation
  • Challenges, strategies and processes for addressing cloud and mobile security
  • Industry specific sessions: Solutions, best practices, compliance for securing government, healthcare, financials, etc.
How FireEye solutions are used on the front lines of cyber security
  • Real-world examples FireEye offerings leveraged to prevent cyber attacks and protect an organization’s assets
  • Best practices on how to gather, share, and use intelligence to stay a step ahead of attackers
  • Insight into the unique nature of regional threats and how to leverage FireEye to mitigate those challenges
  • Lessons learned on addressing the particular challenges of cyber security within your industry (cite examples of what’s unique about your industry’s security challenges and how you leveraged FireEye to address them)
  • Showcase of successful experiences with FireEye Helix, FireEye’s Network Security, Endpoint Security, Email Security, Managed Defense, threat intelligence, investigations and incident response offerings