GConferenceGridThe Conference Catalogue · Vol. 2026Folio № AF8993
Technology

Nevada Public Sector Cybersecurity Summit 2026

T

he Nevada Public Sector Cybersecurity Summit is a specialized event for government IT security leaders, risk managers, and public officials to combat the ever-changing cyber threats faced by state and local government. With sessions led by experts, peer exchanges, and real-world case studies, attendees gain actionable strategies for boosting cyber resilienc…

Visit the official site
15Voices
40Underwriters
23Exhibitors
11On the bill · sessions
53Companies · in total
§I

The Voices

Programmed at Nevada, in alphabetical order.
Alan Jones
Chief Information Security Officer, MGT Impact Solutions · MGT Impact Solutions
Bob Leek
Chief Information Officer, Clark County, NV · Clark County, NV
Carl Jones
Director of Information Security, Clark County School District · Clark County School District
Darla Dodge
Senior Deputy Chief Information Officer, Chief Operations Officer, Office of the Chief Information Officer, State of Nevada · Office of the Chief Information Officer, State of Nevada
Dave Ahn
Chief Architect and VP Intelligence, Centripetal · Centripetal
Dr. Donald Barnwell
Executive Director, Information Technology, University Medical Center of Southern Nevada · University Medical Center of Southern Nevada
Jeramie Brown
Chief, Information Technology Division, Nevada Department of Transportation, State of Nevada · Nevada Department of Transportation, State of Nevada
Kivanc Oner
Vice President, Digital Transformation and Chief Information Officer, Information Technology, University of Nevada, Las Vegas · University of Nevada, Las Vegas
Liese Miller
Sr. National Conference Director, Government Technology · Government Technology
Michael Hanna-Butros Meyering
Chief Communication and Policy Officer, Governor's Technology Office, State of Nevada · Governor's Technology Office, State of Nevada
Patrick Sullivan
Chief Information Security Officer, The Redesign Group · The Redesign Group
Ray Cone
vCISO/ Principal Security Architect, Insight · Insight
Tarah Wheeler
Cybersecurity Expert, White Hat Hacker
Timothy Galluzi
State Chief Information Officer, Governor’s Technology Office, State of Nevada · Governor’s Technology Office, State of Nevada
Vito Rocco
Chief Information Security Officer, Office of Information Technology, University of Nevada Las Vegas · University of Nevada Las Vegas
§II

Underwritten By

The houses behind the program. Tiers as disclosed.
AccelaPatron Sponsor
AMS.NET | MGTAnchor Sponsor
Arctic WolfExhibitor Sponsor
Arctiq | Cato NetworksExhibitor Sponsor
ArmisPatron Sponsor
CDWPatron Plus Sponsor
CentripetalAnchor Sponsor
CGIPatron Sponsor
Cisco | Amplify|SIExhibitor Sponsor
CohesityPatron Sponsor
Cribl | WizExhibitor Sponsor
DelineaExhibitor Sponsor
DynatraceExhibitor Sponsor
Everpure Inc. | CommvaultExhibitor Sponsor (Cocktail Round)
ExtraHop | CrowdStrikeExhibitor Sponsor
FortinetExhibitor Sponsor
HalcyonExhibitor Sponsor
Hitachi VantaraExhibitor Sponsor
IBM | V3GateExhibitor Sponsor
ID DatawebAnchor Sponsor
ID.mePatron Plus Sponsor
InfobloxExhibitor Sponsor
Insight Public SectorAnchor Sponsor
In Time TecPatron Plus Sponsor
Island | Abnormal AIExhibitor Sponsor
IvantiPatron Plus Sponsor
Lumu TechnologiesExhibitor Sponsor
MicroAge | NinjaOneExhibitor Sponsor
OktaAnchor Sponsor
Rubrik | ZscalerExhibitor Sponsor
SAP Public Services, Inc.Patron Sponsor
SentinelOneExhibitor Sponsor
SHI Public Sector | Palo Alto NetworksExhibitor Sponsor
Splunk, a Cisco Company | NuHarbor Security, Inc.Exhibitor Sponsor
SynackPatron Plus Sponsor
TaniumAnchor Sponsor
TenableExhibitor Sponsor
The Redesign Group | DellAnchor Sponsor
VeeamExhibitor Sponsor
Veracode, Inc.Exhibitor Sponsor
§III

The Programme

Selected from 11 sessions on the bill.
  • Wednesday, May 6, 10:15 am Pacific

    General Session - Agentic AI: From Possibility to Secure Practice

    Move past the usual AI conversations and discover what sets Agentic AI apart. This session introduces AI agents as a “third dimension” of AI - systems that can autonomously perform…

  • Wednesday, May 6, 1:10 pm Pacific

    Bits and Bytes – Statewide SOC Update

    A comprehensive update on the progress of Nevada’s statewide Security Operations Center, formally established through recent legislation.

  • Wednesday, May 6, 11:10 am Pacific

    From Sprawl to Strategy: Managing Technical Debt as a Cybersecurity Risk

    As technology environments grow more complex, unmanaged sprawl and technical debt increasingly undermine cybersecurity efforts. You can’t manage what you’re not tracking! In this s…

    Concurrent Sessions
  • Wednesday, May 6, 11:10 am Pacific

    Identity Is the New Perimeter: Securing Constituent Access

    As traditional network boundaries fade, managing constituent identity has become foundational to public-sector cybersecurity and digital services. This session will examine the cha…

    Concurrent Sessions
  • Wednesday, May 6, 11:10 am Pacific

    Incident Response in the Public Eye: Roles, Responsibilities, and Trust

    Cyber incidents are not just technical events - they are organizational crises that demand coordinated action. This session will explore the roles and responsibilities involved in …

    Concurrent Sessions
  • Wednesday, May 6, 1:45 pm Pacific

    Demystifying Zero Trust: Fundamentals and Practical Steps for Any Budget

    Zero Trust is more than a buzzword, it’s a mindset for securing modern networks. This session will break down the fundamentals of Zero Trust - what it is, why it matters, and how i…

    Concurrent Sessions
  • Wednesday, May 6, 1:45 pm Pacific

    From Awareness to Action: Creating a Cyber-Smart Culture

    Cybersecurity doesn’t have to be intimidating - it can be interactive, engaging, and even fun! Join us to explore how to build a culture where employees understand risks, practice …

    Concurrent Sessions
  • Wednesday, May 6, 1:45 pm Pacific

    Know Your Data to Protect It: Data Governance as Cyber Hygiene

    Effective cybersecurity starts with understanding the data you manage. This session will explore how data governance and classification support cyber hygiene by clarifying what dat…

    Concurrent Sessions
  • Wednesday, May 6, 3:15 pm Pacific

    General Session - Cybersecurity Transformed: From Social Engineering to Quantum (Mini-Radar for Cybersecurity)

    As cyber threats evolve, so must our defenses. From sophisticated social engineering attacks to the looming impact of quantum computing, cybersecurity is undergoing a transformatio…

Intermission
Part the Second · For the Buyer

What does it mean when 53 companies show up — and 24 bet on three roles at once?

53 companies. 24 are betting more than once.

The numbers below are derived from the speakers, sponsors, and exhibitors on this page — cross-referenced into one ledger. They are the only thing here that 10times.com cannot tell you.

01Fig. 01 — Composition of the House
24All threespeak · spons · exh
16Sponsoringsponsor only
0Exhibitingexhibitor only
13Speakingspeaker only

The Triple-Threat

Arctic Wolf·Arctiq | Cato Networks·Cisco | Amplify|SI·Cribl | Wiz·Delinea·Dynatrace·Everpure Inc. | Commvault·ExtraHop | CrowdStrike·Fortinet·Halcyon·Hitachi Vantara·IBM | V3Gate·Infoblox·Island | Abnormal AI·Lumu Technologies·MicroAge | NinjaOne·Rubrik | Zscaler·SentinelOne·SHI Public Sector | Palo Alto Networks·Splunk, a Cisco Company | NuHarbor Security, Inc.·Tenable·Veeam

02Fig. 02 — The Voices, by Seniority

80% of the speakers carry senior titles — C-suite, Founder, VP, or Director-level.

  • C-suite960%
  • Director / Head of320%
  • Manager / Lead17%
  • Other roles213%

Of 15 on the bill · classified by free-text title

03Fig. 03 — The Heaviest in the Room
  1. 01Arctic WolfSp·EEx
  2. 02Arctiq | Cato NetworksSp·EEx
  3. 03Cisco | Amplify|SISp·EEx
  4. 04Cribl | WizSp·EEx
  5. 05DelineaSp·EEx
  6. 06DynatraceSp·EEx
  7. 07Everpure Inc. | CommvaultSp·EEx
  8. 08ExtraHop | CrowdStrikeSp·EEx
  9. 09FortinetSp·EEx
  10. 10HalcyonSp·EEx
  11. 11Hitachi VantaraSp·EEx
  12. 12IBM | V3GateSp·EEx
  13. 13InfobloxSp·EEx
  14. 14Island | Abnormal AISp·EEx
04Fig. 04 — By Tier
anchor sponsor7
18% of 40
exhibitor sponsor22
55% of 40
exhibitor sponsor (cocktail round)1
3% of 40
patron plus sponsor5
13% of 40
patron sponsor5
13% of 40
05Fig. 05 — The Missing · who's at peer events but not here

These companies sponsored two or more peer events recently, but aren't on this program. For an organizer, that's a list of warm prospects.

06Fig. 06 — Adjacent Convocations · by shared underwriters