Why You Should Attend

In past years, attendees have said Security Summit gives them incredible
opportunities to network and learn.


Thursday, February 22nd
5:30 p.m. – 7 p.m.
Pinyon 5
Opening Keynote
One on One with a Legend
Kevin Mitnick and Jason Sabin
7 p.m. – 9 p.m.
Bristlecone 6
Welcome Reception
Casino Night
Friday, February 23rd
8:30 a.m. – 9 a.m.

Pinyon 1, 2, and 3

9 a.m. – 10:15 a.m.
Pinyon 5
Pen Testing, Breaching Systems
Brady Bloxham
10:15 a.m. – 10:45 a.m.
Pinyon 5
A New Era in SSL
John Merrill
10:45 a.m. – 11 a.m. Break
11 a.m. – 12 p.m.
Pinyon 5
The Biggest Thing in PKI Since PKI
Jeremy Rowley
12 p.m. – 1 p.m.
Pinyon 1, 2, and 3
1 p.m. – 1:30 p.m.
Pinyon 5
Mining for Raw Water: The Future of Tech in 2018
Sarah Cooper
1:30 p.m. – 2:30 p.m. Customer Panel
Q&A: Vegas Style
2:30 p.m. – 2:45 p.m. Break
2:45 p.m. – 3:30 p.m.
Pinyon 5
Industry Standards
Dean Coclin and Tim Hollebeek
3:30 p.m. – 4:10 p.m.
Pinyon 5
Closing Keynote
Hardenize: Improving Security of Complex Ecosystems
Ivan Ristic
4:10 p.m. – 4:30 p.m.
Pinyon 5
Closing Remarks
7 p.m. – 10 p.m. Dinner at Herringbone Restaurant
Saturday, February 24nd

Contact Us

Have questions about the event?



Relive the Experience

Watch speakers from previous years discuss emerging trends, security best practices, and the latest innovations.

Know Your Threat

Know Your Threat

Learn about the state of corporate network security and common pitfalls organizations experience.

Complexities in<br>Managing Enterprise PKI

Complexities in
Managing Enterprise PKI

Deploying an enterprise PKI can be daunting and complex. Learn how to manage initial deployment, deploy at a scale, and perform on-going maintenance.

Secrets Management

Secrets Management

Mismanaging your secrets, including certificates, keys, and database passwords, can lead to fatal consequences, like leaks, outages, and compliance violations.

IoT Security Gets Real:<br>Provisioning, Managing and<br>Securing Connected Devices

IoT Security Gets Real:
Provisioning, Managing and
Securing Connected Devices

Gain insight into the complexities of securing connected devices as panelists share use cases of provisioning devices and the obstacles that came with it.

Why Medical Device<br>Manufacturers are Turning to<br>PKI

Why Medical Device
Manufacturers are Turning to

Scott and Darin present use cases highlighting four different vulnerabilities for connected medical devices to demonstrate how PKI can be used to mitigate each situation.

Making Better Decisions:<br>A History Lesson

Making Better Decisions:
A History Lesson

Learn how to keep your organizations secure in a rapidly evolving threat landscape.