SecurityWeek’s annual cloud security virtual summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. Expect high-quality discussions and presentations on a variety of cloud security topics, including a surge in attacks targeting the identity ecosystem.

Reserve your free spot now.

Why Attend?

Gain Cutting-Edge Insights: Discover the latest trends, threats, and innovations in cloud and data security from industry-leading CISOs, researchers, and cybersecurity experts.

Stay Ahead of Evolving Threats: Learn practical strategies to defend against modern cyber threats targeting cloud infrastructures and sensitive data.

Network with Security Leaders: Connect with peers, thought leaders, and solution providers to share best practices and expand your professional network.

Access Exclusive Content: Get insider knowledge through expert panels, case studies, and sessions that aren’t available anywhere else.

Sponsors

SecurityWeek Virtual Event Sponsorships

I want to become a sponsor

SecurityWeek Virtual Events Provide

  • BRAND AWARENESS: Introduce your brand to a large audience and deepen connections with existing customers and prospects through powerful brand integration by being part of a high-profile event that is heavily marketed for months.
  • THOUGHT LEADERSHIP: Demonstrate expertise and build trust by presenting to a targeted, information-hungry audience of cybersecurity professionals.
  • LEAD GENERATION: The scale of SecurityWeek’s virtual events serve as a cost effective lead generation platform to fuel your sales teams.

Agenda

July 16, 2025 11:00

New Threats in AI App Development: Securing Models, Data, and Pipelines

AI-powered applications are rapidly reshaping how businesses innovate—but they also expose organizations to a new wave of security threats. From model poisoning and namespace hijacking to data leakage and compromised AI agents, these risks extend beyond the reach of traditional cloud security tools. In this webinar, we’ll walk through the evolving architecture of AI applications and spotlight the most critical vulnerabilities across the pipeline. We’ll also share findings from our latest cloud security research, including real-world attack patterns we've observed and the implications for securing AI workloads at scale. Whether you’re in cloud security, DevSecOps, or AI development, you’ll walk away with practical strategies for protecting your data, models, and infrastructure.

speaker headshot

Yotam Ben-Ezra
Palo Alto Networks, Director, Product Management

July 16, 2025 11:30

Secure Identity. Secure Everything

Cloud adoption, SaaS, and remote work have complicated security, expanding the attack surface. Identity is now the primary attack vector, causing over 80% of breaches. Discover how to improve your organization's security by enhancing your identity solution with features like end-to-end visibility, real-time threat remediation, and comprehensive service account management.

speaker headshot

Alexandria Hodgson
Okta, Staff Product Marketing Manager

July 16, 2025 11:50

DSPM: Discover and Protect Your Sensitive Data in the Cloud

47% of companies have at least one exposed cloud-hosted database or storage bucket, with over 20% containing sensitive data. That’s why DSPM is essential to any cloud security strategy. Wiz Cloud DSPM provides a unified view of your cloud and data security posture—showing where sensitive data is, who has access, how it’s used, and what actions to take. Learn how Wiz continuously monitors data security policies to detect and address vulnerabilities and risks.

speaker headshot

Snegha Ramnarayanan
Wiz, Staff Product GTM Manager

July 16, 2025 12:15

BREAK

We'll be taking a quick break to give you time to network with fellow attendees and sponsors in the Exhibit Hall. They're standing by to answer your questions. Stop by their booths and take this time to review the amazing resources available to you.

July 16, 2025 12:30

Elevate Your Business Continuity to the Cloud with HPE Zerto Software

If you’re driving digital transformation to the hybrid cloud, then you understand that data has never been as critical to your business. Yet, you face more threats like data corruption and deletions to disastrous threats like ransomware no matter if your workloads are running on your core production infrastructure, hosted by a software as a service (SaaS) solution, or running in a public cloud like AWS or Microsoft Azure. In this webinar, learn how you can unravel the complications associated with finding the right data protection solution to protect your most mission critical IT applications using a variety of cloud-based offerings that use or are a part of HPE Zerto Software. Join Anthony Dutra, Technical Marketing Engineer at HPE, to gain insight into:

  • The top challenges and threats plaguing data protection strategies covering on-premises to/from/in-between public cloud providers like AWS and Microsoft Azure
  • How to combat them with cloud-based Disaster Recovery, Cyber Recovery, and Backup (particularly for SaaS applications!)
  • Get started with HPE Zerto Software, the HPE Zerto Cloud Vault, and HPE Zerto Backup for SaaS Software, powered by Keepit can help keep you safe & secure!
speaker headshot

Anthony Dutra
HPE Zerto Software, Technical Marketing Manager

July 16, 2025 12:55

Cloud Conversations: A fireside chat with Forrest Brazeal and Rubrik

Join us for a captivating fireside chat where storytelling meets cloud innovation. Forrest Brazeal—acclaimed cloud architect, author, and the creative mind behind cloud computing's most beloved cartoons—teams up with Head of Rubrik Zero Labs, Joe Hladik to explore the evolving challenges of data protection in a multi-cloud world.

speaker headshot

Joe Hladik
Head of Rubrik Zero Labs

speaker headshot

Forrest Brazeal
Acclaimed cloud architect & author

July 16, 2025 15:45

Networking & Exhibit Hall Connections

We hope you take this opportunity to network with fellow attendees and sponsors in the Exhibit Hall. Stop by their booths and take this time to review the amazing resources available to you. Thank you for your participation in today's virtual conference.

July 16, 2025 13:30

AI Powered Identity Fraud: What You're Up Against

Artificial intelligence is transforming the cybersecurity landscape—not only as a tool for defense but as a weapon in the hands of attackers. In this session, Ping Identity experts will explore how AI is enabling more sophisticated phishing attacks, deepfake-based impersonations, and automated exploits that challenge traditional defense mechanisms. Attendees will gain insights into real-world threat scenarios, emerging trends in adversarial AI, and practical steps organizations can take to safeguard digital identities in an AI-powered threat environment.

speaker headshot

Maya Ogranovitch Scott,
Ping Identity, Senior Product and Solutions Marketing Manager

speaker headshot

Adam Preis
Ping Identity, Solution Marketing Director

July 16, 2025 13:55

From Code to Cloud: Embedding Security in Every Step

As developers strive to move fast, security cannot be an afterthought. This talk explores how to embed DevSecOps practices throughout the software delivery process, from writing code on the developer’s machine to its deployment in production. We’ll discuss critical security checkpoints from developer machines to production deployment, and effective strategies to ensure a seamless, secure deployment. Join us to learn how to protect your application delivery pipeline!

speaker headshot

Siri Varma Vegiraju
Microsoft Azure Security, Security Tech Lead

July 16, 2025 14:30

Secure the AI Pipeline with Cortex Cloud AI-SPM

See how Cortex Cloud AI-SPM gives security and cloud teams full visibility and control across the AI development lifecycle—from model training to deployment. Built from the ground up as the only Code-to-Cloud-to-SOC platform, Cortex Cloud surfaces sensitive data exposure, detects AI-specific threats like model poisoning and prompt injection, and maps risks to compliance frameworks like OWASP and NIST. With real-time detection, graph-based context, and automated remediation, Cortex Cloud is purpose-built to secure AI-powered applications at scale—faster and smarter than any other solution.

July 16, 2025 14:55

Wiz Demo

The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.

July 16, 2025 15:10

Remain Resilient in the Cloud with HPE Zerto Software for Microsoft Azure

In today’s fast-paced digital landscape, businesses are increasingly migrating their workloads to the cloud to enhance agility, scalability, and performance. However, with this shift comes the critical need for robust data protection, disaster recovery, and business continuity strategies to ensure resilience. Listen in to discover how HPE Zerto’s innovative software solutions seamlessly integrate with Microsoft Azure to deliver streamlined data replication, automated failover, and simplified management. Delve into how HPE Zerto empowers organizations to minimize downtime, recover from unexpected disruptions in minutes, and maintain operational continuity in the face of ever-evolving threats, including ransomware. 

July 16, 2025 15:25

Achieve complete cyber resilience for all your cloud data.

In this on-demand demo, we explore how Rubrik’s Cloud Native Protection solution addresses these challenges head-on. Geared towards technical IT professionals and security leaders responsible for cloud data protection, this demo covers: 

  • Mitigating cloud data exfiltration risks and building resilience against disruptions to minimize downtime in event of cyber attack 
  • Simplified cloud data security management through one unified platform 
  • Optimized costs associated with cloud data protection
July 16, 2025 15:35

An Introductory Demonstration of Deepfake Mitigation with PingOne Verify

This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.

[On-Demand] Secure the AI Pipeline with Cortex Cloud AI-SPM

See how Cortex Cloud AI-SPM gives security and cloud teams full visibility and control across the AI development lifecycle—from model training to deployment. Built from the ground up as the only Code-to-Cloud-to-SOC platform, Cortex Cloud surfaces sensitive data exposure, detects AI-specific threats like model poisoning and prompt injection, and maps risks to compliance frameworks like OWASP and NIST. With real-time detection, graph-based context, and automated remediation, Cortex Cloud is purpose-built to secure AI-powered applications at scale—faster and smarter than any other solution.

[On-Demand] Wiz's Demo

The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.

[On-Demand] Remain Resilient in the Cloud with HPE Zerto Software for Microsoft Azure

In today’s fast-paced digital landscape, businesses are increasingly migrating their workloads to the cloud to enhance agility, scalability, and performance. However, with this shift comes the critical need for robust data protection, disaster recovery, and business continuity strategies to ensure resilience. Listen in to discover how HPE Zerto’s innovative software solutions seamlessly integrate with Microsoft Azure to deliver streamlined data replication, automated failover, and simplified management. Delve into how HPE Zerto empowers organizations to minimize downtime, recover from unexpected disruptions in minutes, and maintain operational continuity in the face of ever-evolving threats, including ransomware. 

[On-Demand] Achieve complete cyber resilience for all your cloud data.

In this on-demand demo, we explore how Rubrik’s Cloud Native Protection solution addresses these challenges head-on. Geared towards technical IT professionals and security leaders responsible for cloud data protection, this demo covers: 

  • Mitigating cloud data exfiltration risks and building resilience against disruptions to minimize downtime in event of cyber attack 
  • Simplified cloud data security management through one unified platform 
  • Optimized costs associated with cloud data protection

[On-Demand] An Introductory Demonstration of Deepfake Mitigation with PingOne Verify

This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.

Register Now

SecurityWeek’s annual cloud and data security virtual summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. Expect high-quality discussions and presentations on a variety of cloud security topics, including a surge in attacks targeting the identity ecosystem.

FAQ


Yes, you’ll need to fill out our registration form to gain access to the event. Please fill in the registration form with some basic information to get started.
The information you provide upon registration will be used to establish you as a user on the platform.

SecurityWeek is committed to protecting and respecting your privacy. From time to time, we would like to contact you about our products and services, as well as other content and information from event sponsors that may be of interest to you. You may unsubscribe from these communications at any time.

By registering for this event, you consent to allow SecurityWeek to store and process the personal information submitted to provide you the content requested.
Yes, the vFairs platform is compatible with any computer or mobile device and any browser.
Yes, this event is completely free to attend. We encourage you to login and have a look around at your convenience.
Yes, the event will be available on-demand following the live broadcast.