Sessions
Registered Attendees
Technical Demos
Interactive Expo Hall
Resource Center
Gain Cutting-Edge Insights: Discover the latest trends, threats, and innovations in cloud and data security from industry-leading CISOs, researchers, and cybersecurity experts.
Stay Ahead of Evolving Threats: Learn practical strategies to defend against modern cyber threats targeting cloud infrastructures and sensitive data.
Network with Security Leaders: Connect with peers, thought leaders, and solution providers to share best practices and expand your professional network.
Access Exclusive Content: Get insider knowledge through expert panels, case studies, and sessions that aren’t available anywhere else.
SecurityWeek Virtual Events Provide
AI-powered applications are rapidly reshaping how businesses innovate—but they also expose organizations to a new wave of security threats. From model poisoning and namespace hijacking to data leakage and compromised AI agents, these risks extend beyond the reach of traditional cloud security tools. In this webinar, we’ll walk through the evolving architecture of AI applications and spotlight the most critical vulnerabilities across the pipeline. We’ll also share findings from our latest cloud security research, including real-world attack patterns we've observed and the implications for securing AI workloads at scale. Whether you’re in cloud security, DevSecOps, or AI development, you’ll walk away with practical strategies for protecting your data, models, and infrastructure.
Yotam Ben-Ezra
Palo Alto Networks, Director, Product Management
Cloud adoption, SaaS, and remote work have complicated security, expanding the attack surface. Identity is now the primary attack vector, causing over 80% of breaches. Discover how to improve your organization's security by enhancing your identity solution with features like end-to-end visibility, real-time threat remediation, and comprehensive service account management.
Alexandria Hodgson
Okta, Staff Product Marketing Manager
47% of companies have at least one exposed cloud-hosted database or storage bucket, with over 20% containing sensitive data. That’s why DSPM is essential to any cloud security strategy. Wiz Cloud DSPM provides a unified view of your cloud and data security posture—showing where sensitive data is, who has access, how it’s used, and what actions to take. Learn how Wiz continuously monitors data security policies to detect and address vulnerabilities and risks.
Snegha Ramnarayanan
Wiz, Staff Product GTM Manager
We'll be taking a quick break to give you time to network with fellow attendees and sponsors in the Exhibit Hall. They're standing by to answer your questions. Stop by their booths and take this time to review the amazing resources available to you.
If you’re driving digital transformation to the hybrid cloud, then you understand that data has never been as critical to your business. Yet, you face more threats like data corruption and deletions to disastrous threats like ransomware no matter if your workloads are running on your core production infrastructure, hosted by a software as a service (SaaS) solution, or running in a public cloud like AWS or Microsoft Azure. In this webinar, learn how you can unravel the complications associated with finding the right data protection solution to protect your most mission critical IT applications using a variety of cloud-based offerings that use or are a part of HPE Zerto Software. Join Anthony Dutra, Technical Marketing Engineer at HPE, to gain insight into:
Anthony Dutra
HPE Zerto Software, Technical Marketing Manager
Join us for a captivating fireside chat where storytelling meets cloud innovation. Forrest Brazeal—acclaimed cloud architect, author, and the creative mind behind cloud computing's most beloved cartoons—teams up with Head of Rubrik Zero Labs, Joe Hladik to explore the evolving challenges of data protection in a multi-cloud world.
Joe Hladik
Head of Rubrik Zero Labs
Forrest Brazeal
Acclaimed cloud architect & author
We hope you take this opportunity to network with fellow attendees and sponsors in the Exhibit Hall. Stop by their booths and take this time to review the amazing resources available to you. Thank you for your participation in today's virtual conference.
Artificial intelligence is transforming the cybersecurity landscape—not only as a tool for defense but as a weapon in the hands of attackers. In this session, Ping Identity experts will explore how AI is enabling more sophisticated phishing attacks, deepfake-based impersonations, and automated exploits that challenge traditional defense mechanisms. Attendees will gain insights into real-world threat scenarios, emerging trends in adversarial AI, and practical steps organizations can take to safeguard digital identities in an AI-powered threat environment.
Maya Ogranovitch Scott,
Ping Identity, Senior Product and Solutions Marketing Manager
Adam Preis
Ping Identity, Solution Marketing Director
As developers strive to move fast, security cannot be an afterthought. This talk explores how to embed DevSecOps practices throughout the software delivery process, from writing code on the developer’s machine to its deployment in production. We’ll discuss critical security checkpoints from developer machines to production deployment, and effective strategies to ensure a seamless, secure deployment. Join us to learn how to protect your application delivery pipeline!
Siri Varma Vegiraju
Microsoft Azure Security, Security Tech Lead
See how Cortex Cloud AI-SPM gives security and cloud teams full visibility and control across the AI development lifecycle—from model training to deployment. Built from the ground up as the only Code-to-Cloud-to-SOC platform, Cortex Cloud surfaces sensitive data exposure, detects AI-specific threats like model poisoning and prompt injection, and maps risks to compliance frameworks like OWASP and NIST. With real-time detection, graph-based context, and automated remediation, Cortex Cloud is purpose-built to secure AI-powered applications at scale—faster and smarter than any other solution.
The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.
In today’s fast-paced digital landscape, businesses are increasingly migrating their workloads to the cloud to enhance agility, scalability, and performance. However, with this shift comes the critical need for robust data protection, disaster recovery, and business continuity strategies to ensure resilience. Listen in to discover how HPE Zerto’s innovative software solutions seamlessly integrate with Microsoft Azure to deliver streamlined data replication, automated failover, and simplified management. Delve into how HPE Zerto empowers organizations to minimize downtime, recover from unexpected disruptions in minutes, and maintain operational continuity in the face of ever-evolving threats, including ransomware.
In this on-demand demo, we explore how Rubrik’s Cloud Native Protection solution addresses these challenges head-on. Geared towards technical IT professionals and security leaders responsible for cloud data protection, this demo covers:
This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.
See how Cortex Cloud AI-SPM gives security and cloud teams full visibility and control across the AI development lifecycle—from model training to deployment. Built from the ground up as the only Code-to-Cloud-to-SOC platform, Cortex Cloud surfaces sensitive data exposure, detects AI-specific threats like model poisoning and prompt injection, and maps risks to compliance frameworks like OWASP and NIST. With real-time detection, graph-based context, and automated remediation, Cortex Cloud is purpose-built to secure AI-powered applications at scale—faster and smarter than any other solution.
The cloud moves fast, and security needs to keep up. Wiz gives you full visibility and protection from code to runtime, enabling security, development, and operations teams to work together—without friction. See why leading organizations use Wiz to eliminate risks earlier, simplify security, and accelerate innovation.
In today’s fast-paced digital landscape, businesses are increasingly migrating their workloads to the cloud to enhance agility, scalability, and performance. However, with this shift comes the critical need for robust data protection, disaster recovery, and business continuity strategies to ensure resilience. Listen in to discover how HPE Zerto’s innovative software solutions seamlessly integrate with Microsoft Azure to deliver streamlined data replication, automated failover, and simplified management. Delve into how HPE Zerto empowers organizations to minimize downtime, recover from unexpected disruptions in minutes, and maintain operational continuity in the face of ever-evolving threats, including ransomware.
In this on-demand demo, we explore how Rubrik’s Cloud Native Protection solution addresses these challenges head-on. Geared towards technical IT professionals and security leaders responsible for cloud data protection, this demo covers:
This demo showcases the various deepfake detection capabilities provided by Ping Identity. It demonstrates both presentation attack and injection attack detection in real time.
SecurityWeek’s annual cloud and data security virtual summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure and APIs. Expect high-quality discussions and presentations on a variety of cloud security topics, including a surge in attacks targeting the identity ecosystem.