Cloud & Data Security Summit

Cloud Security Conferences: 2025

July 16, 2025 – Register

SecurityWeek’s annual cloud security virtual summit returns with a deliberate focus on exposed attack surfaces and weaknesses in public cloud infrastructure. Expect high-quality discussions and presentations on a variety of cloud security topics, including a surge in attacks targeting the identity ecosystem.

SecurityWeek editors will curate an agenda exploring the latest trends in the world of SaaS security, case studies of cyberattacks against cloud infrastructure, vendor patch management responsibilities, data security posture management (DSPM), and the hype and promise of AI and LLM technologies.

Register for Virtual Cloud Security Summit

Sponsorship Information

Platinum Sponsors

Wiz

 

Palo Alto NetworksOkta

Gold Sponsors

Zerto

Ping Identity

Silver Sponsors

Google CloudAutomox

As enterprises adopt cloud-based services to leverage benefits such as scalability, increased efficiency, and as cost savings, security has remained a top concern. SecurityWeek’s 2025 Cloud & Data Security Summit will help organizations learn how to utilize tools, controls, and design models needed to properly secure cloud environments. Attendees will be able to interact with leading solution providers and other end users facing similar challenges in securing a variety of cloud deployments.

time iconJuly 16, 2025 11:00

New Threats in AI App Development: Securing Models, Data, and Pipelines

AI-powered applications are rapidly reshaping how businesses innovate—but they also expose organizations to a new wave of security threats. From model poisoning and namespace hijacking to data leakage and compromised AI agents, these risks extend beyond the reach of traditional cloud security tools. In this webinar, we’ll walk through the evolving architecture of AI applications and spotlight the most critical vulnerabilities across the pipeline. We’ll also share findings from our latest cloud security research, including real-world attack patterns we've observed and the implications for securing AI workloads at scale. Whether you’re in cloud security, DevSecOps, or AI development, you’ll walk away with practical strategies for protecting your data, models, and infrastructure.

speaker headshot

Yotam Ben-Ezra
Palo Alto Networks, Director, Product Management

time iconJuly 16, 2025 11:30

Secure Identity. Secure Everything

Cloud adoption, SaaS, and remote work have complicated security, expanding the attack surface. Identity is now the primary attack vector, causing over 80% of breaches. Discover how to improve your organization's security by enhancing your identity solution with features like end-to-end visibility, real-time threat remediation, and comprehensive service account management.

speaker headshot

Alexandria Hodgson
Okta, Staff Product Marketing Manager

time iconJuly 16, 2025 11:50

DSPM: Discover and Protect Your Sensitive Data in the Cloud

47% of companies have at least one exposed cloud-hosted database or storage bucket, with over 20% containing sensitive data. That’s why DSPM is essential to any cloud security strategy. Wiz Cloud DSPM provides a unified view of your cloud and data security posture—showing where sensitive data is, who has access, how it’s used, and what actions to take. Learn how Wiz continuously monitors data security policies to detect and address vulnerabilities and risks.

speaker headshot

Snegha Ramnarayanan
Wiz, Staff Product GTM Manager

time iconJuly 16, 2025 12:15

BREAK

We'll be taking a quick break to give you time to network with fellow attendees and sponsors in the Exhibit Hall. They're standing by to answer your questions. Stop by their booths and take this time to review the amazing resources available to you.

time iconJuly 16, 2025 12:30

Elevate Your Business Continuity to the Cloud with HPE Zerto Software

If you’re driving digital transformation to the hybrid cloud, then you understand that data has never been as critical to your business. Yet, you face more threats like data corruption and deletions to disastrous threats like ransomware no matter if your workloads are running on your core production infrastructure, hosted by a software as a service (SaaS) solution, or running in a public cloud like AWS or Microsoft Azure. In this webinar, learn how you can unravel the complications associated with finding the right data protection solution to protect your most mission critical IT applications using a variety of cloud-based offerings that use or are a part of HPE Zerto Software. Join Anthony Dutra, Technical Marketing Engineer at HPE, to gain insight into:

  • The top challenges and threats plaguing data protection strategies covering on-premises to/from/in-between public cloud providers like AWS and Microsoft Azure
  • How to combat them with cloud-based Disaster Recovery, Cyber Recovery, and Backup (particularly for SaaS applications!)
  • Get started with HPE Zerto Software, the HPE Zerto Cloud Vault, and HPE Zerto Backup for SaaS Software, powered by Keepit can help keep you safe & secure!
speaker headshot

Anthony Dutra
HPE Zerto Software, Technical Marketing Manager

time iconJuly 16, 2025 12:55

Cloud Conversations: A fireside chat with Forrest Brazeal and Rubrik

Join us for a captivating fireside chat where storytelling meets cloud innovation. Forrest Brazeal—acclaimed cloud architect, author, and the creative mind behind cloud computing's most beloved cartoons—teams up with Head of Rubrik Zero Labs, Joe Hladik to explore the evolving challenges of data protection in a multi-cloud world.

speaker headshot

Joe Hladik
Head of Rubrik Zero Labs

time iconJuly 16, 2025 13:30

AI Powered Identity Fraud: What You're Up Against

Artificial intelligence is transforming the cybersecurity landscape—not only as a tool for defense but as a weapon in the hands of attackers. In this session, Ping Identity experts will explore how AI is enabling more sophisticated phishing attacks, deepfake-based impersonations, and automated exploits that challenge traditional defense mechanisms. Attendees will gain insights into real-world threat scenarios, emerging trends in adversarial AI, and practical steps organizations can take to safeguard digital identities in an AI-powered threat environment.

speaker headshot

Maya Ogranovitch Scott,
Ping Identity, Senior Product and Solutions Marketing Manager

speaker headshot

Adam Preis
Ping Identity, Solution Marketing Director

time iconJuly 16, 2025 14:00

From Code to Cloud: Embedding Security in Every Step

As developers strive to move fast, security cannot be an afterthought. This talk explores how to embed DevSecOps practices throughout the software delivery process, from writing code on the developer’s machine to its deployment in production. We’ll discuss critical security checkpoints from developer machines to production deployment, and effective strategies to ensure a seamless, secure deployment. Join us to learn how to protect your application delivery pipeline!

speaker headshot

Siri Varma Vegiraju
Microsoft Azure Security, Security Tech Lead

SecurityWeek’s Cloud Security Summit will help organizations learn how to utilize tools, controls, and design models needed to properly secure cloud environments and be compliant with data protection regulations.

Agenda

time iconJuly 17, 2024 11:00

Optimizing Cloud Security Operations Through Data Consolidation and AI

Protecting, defending and reducing risk in a multi-cloud world is an ongoing struggle for all organizations. Gluing together disparate point solutions leads to data silos and a heavy lift to normalize and standardize into a common repository for effective reasoning and threat hunting. 

Join SentinelOne as we discuss the true value of an integrated cloud security platform that consolidates data and enables AI-driven insights and action. 

Singularity Cloud Security is SentinelOne’s comprehensive, high performing CNAPP. Powered by AI and built upon the Singularity Platform, SentinelOne consolidates security data into a single security data lake, where our proprietary AI reveals context that helps streamline analysis and prioritize backlog for maximum impact.

speaker headshot

Rick Bosworth
SentinelOne, Cloud Security Product Marketing Director

time iconJuly 17, 2024 11:30

Cyber Showdown: Unveiling APTs and Ransomware

Join us for an eye-opening session where we delve into the dark web to uncover chilling tales of cyberattacks and adversaries. We'll explore real-life examples of exploitations uncovered by our expert threat hunting team, highlighting how bad actors can exploit weak security practices to infiltrate organizations. Through detailed case studies, we’ll demonstrate the devastating impact of these cyber threats and provide insights on how to protect your organization. Don't miss this opportunity to learn from the mistakes of others and fortify your defenses against the lurking dangers of the dark web.

speaker headshot

Steve Baer
NetWitness, Global VP of Field Sales & Services

speaker headshot

John Pirc
NetWitness, VP of Product Line Management

time iconJuly 17, 2024 12:00

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer your questions.

time iconJuly 17, 2024 12:15

Protecting Data & AI in 2024

Join Prisma® Cloud data security expert, Yotam Ben-Ezra, Director of Product Management, to find out how the latest advancements in data security can help you discover, classify, protect and govern data in cloud environments. In this session, you'll learn:

  • Why the cloud creates a new attack surface that is inherently difficult to protect.
  • The security and compliance risks that stem from unprotected data and AI infrastructure in the cloud.
  • How agentless tools allow you to see a full picture of data risk in your environment within 24 hours, without impacting other business operations. - Getting started with data discovery and classification.
  • Monitoring data and responding to incidents in near-real time.

Stay one step ahead of data risk in 2024 to prevent costly breaches and compliance violations. Explore DSPM and DDR technologies and how they can help you discover, classify, protect and govern all your data across the different cloud environments.

speaker headshot

Yotam Ben-Ezra
Palo Alto Networks, Director of Product Management

time iconJuly 17, 2024 12:45

Using AWS SCPs to achieve least privilege while supporting developers

Traditionally, achieving least privilege means a lot of identity-by-identity policy creation and management. In this session, explore a new approach to least privilege that leverages AWS SCPs to centrally restrict excessive permissions and secure unused identities, services, and regions. By protecting only the most sensitive cloud permissions, developer innovation remains intact. Conclude with a demo featuring an innovative solution and walk away equipped with actionable insights to reduce IAM risk.

speaker headshot

Sandy Bird
Sonrai Security, CTO & Co-founder

time iconJuly 17, 2024 13:15

The State of AI in the Cloud

Over the past year and a half, generative AI has seen explosive growth among both end-users and businesses, and the cloud is no exception. AI tooling is on the rise in most organizations, but at what rate?  Watch as Wiz security researcher, Amitai Cohen, delves into the data and analysis of over 150,000+ cloud accounts to share what the team has learned, including:

  • The breakdown of generative AI’s impact on cloud landscapes
  • Statistics on the surge of AI services across major cloud providers
  • What this means to you: Rising costs and new security concerns

Skip the fluff and arm yourself with practical insights for a successful and secure AI integration in your cloud strategy.

speaker headshot

Amitai Cohen
Wiz, Threat Researcher

time iconJuly 17, 2024 13:45

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer your questions.

time iconJuly 17, 2024 14:00

Fireside Chat With Phil Venables, CISO at Google Cloud

Join us for a fireside chat with Phil Venables, the Chief Information Security Officer of Google Cloud. 

Venables leads the risk, security, compliance, and privacy teams for Google Cloud. Before joining Google, he was a Partner at Goldman Sachs where he held multiple roles over a long career, initially as their first Chief Information Security Officer, a role he held for 17 years.

In subsequent roles, Venables was Chief Operational Risk Officer, an operating partner in their private equity business and a Senior Advisor to the firm’s clients and executive leadership on cybersecurity, technology risk, digital business risk, and operational resilience. In addition to this, he was a Board Director of Goldman Sachs Bank. Before Goldman Sachs, Venables held multiple Chief Information Security Officer roles, and senior engineering roles across a range of finance, energy, and technology companies. 

Outside of Google, Venables is a member of the President’s Council of Advisors on Science and Technology.  He also serves on the boards of the NYU Tandon School of Engineering, the NYU Stern Business School Volatility and Risk Institute, the Information Security and Privacy Advisory Board of NIST and is a member of the Council on Foreign Relations.

speaker headshot

Phil Venables
Google Cloud, Chief Information Security Officer

speaker headshot

Ryan Naraine
SecurityWeek, Editor-at-Large

time iconJuly 17, 2024 14:45

NetWitness Demo: Defense Accelerated - How NetWitness is Revolutionizing Threat Detection, Investigation and Response

time iconJuly 17, 2024 15:05

Wiz Demo

time iconJuly 17, 2024 15:20

Sonrai Security Demo

Solutions Theater (On-demand)

{WEBINARS}

Event Details