5th Annual Cybersecurity Summit

Cybersecurity is an organizational responsibility, not an Information Technology initiative.

Register Now   Sponsor Event

 

Event Details

Format: In Person
Date: February 25–28, 2025
Please be sure to register for this event as well as add it to your calendar!
Download Calendar Reminder   Add to Google Calendar (opens in new tab)   Add to Office 365 (opens in new tab)

Join us for a three-day IN PERSON event dedicated to strengthening cyber defenses for tribes and tribal enterprises. This event offers an opportunity to connect with top cybersecurity experts and fellow leaders to address the most pressing cyber threats facing tribes today.

Gain crucial insights into the roles, responsibilities, and investments needed for protecting tribal entities and avoiding costly security mistakes. Connect with peers, experts, and tribal and federal organizations to strengthen your tribe's cybersecurity posture with the latest tools, resources, and best practices.

Keynotes, Workshops, Sessions, Tribal-ISAC working groups, Vendor Expo, Networking Events and Golf...we'll meet you there!

Hotel Information

Miccosukee Casino & Resort

Address: 500 SW 177th Ave, Miami, FL 33194

Room Rate- $179++/night. Discount rate expires February 1.

Book Hotel

Exterior photo of Miccosukee Casino & Resort

Toni Pepper giving a presentation

Why Attend

• Learn about the critical role and responsibilities of Tribal Executives, Tribal Regulators and Tribal technology resources in protecting and preparing your tribe or tribal enterprise
• Build and gain insight into the necessary and critical investments required for cybersecurity
• Learn about what costly information security mistakes to avoid in order to minimize the risk of your tribe or enterprise being a victim or target
• Enhance existing knowledge of security tools and best practices
• Ability to learn more about what other tribes are doing to improve their security posture
• Understand the availability of more tools and resources
• Make connections with peers, industry experts along with tribal and federal entities

Who Should Attend

Executive Level Decision Makers in Tribal Gaming:
• CEOs
• GMs
• Finance
• Gaming Commission
• Regulators
• Risk Management

Executive Level Decision Makers at Tribal Government and Health Facilities:
• Tribal Council/Administration
• Executive Directors
• Health Directors

Information Technology Department:
• CIOs
• IT Directors and Managers
• CISOs
• and other Security Related titles in IT

What People Are Saying

Today, more than ever, it is imperative for business leadership to understand the risk that cyber threats present to the business and how cybersecurity can mitigate the risk effectively. Knowledge and awareness are the critical investments great leaders can make to provide the best financial, security and business decisions for their organization. The Tribal Cybersecurity Summit will provide every Leader with insightful and valuable knowledge which will allow you to ask proper questions, invest in key areas and understand the risks presented by your technologists.

Lee Edberg
Director of Cybersecurity
SMSC Gaming Enterprise

Cybersecurity is an organizational responsibility, not an IT initiative. Ensuring there is broad exposure to the threat landscape at all levels in an organization is key, especially at the senior level, as support of the investment required to protect the organization is imperative. At the Tribal Cybersecurity Summit, you will gain a deeper understanding of current trends/challenges that tribes are facing collectively and hear from experts in the field as well as some of your peers on strategies to fend off the bad guys. We are stronger together!

Toni Pepper
CEO
Pepper Consulting, LLC

Advisory Board

2025 Cybersecurtiy Board

Director, Global Cybersecurity Information Technology
Mohegan
Vice President of Information Technology
Cache Creek Casino & Resort
IT Security Manager
Casino Arizona
Executive Director, IT Security
Wind Creek Hospitality
Director of IT
Paskenta Band of Nomlaki Indians
Executive Director of Cybersecurity
Twenty-Nine Palms Band of Mission Indians
CIO & SVP of IT
Four Winds Casino
Director of IT
Kalispel Tribe of Indians
Director of Information Security
Cache Creek Casino Resort
Information Security Officer
Fond du Lac Band of Lake Superior Chippewa
Chief Information Security and Privacy Officer
Indian Health Service, California Area Office
CIO/CISO
Cherokee Nation Business
Chief Information Security Risk Officer
San Manuel Band of Mission Indians
IT Security Engineer Casino-Information Technology
Sycuan Casino Resort

Sessions

Agenda
Time Session Speaker Track Location Access
Tuesday, February 25, 2025
9:15am to 9:20am
EST
Shuttle to Tribal-ISAC Golf Outing

_

N/A
Golf Outing Miccosukee Resort Main Entrance
9:30am to 10:30am
EST
Player Check-In - kick things off with a warm welcome and chance to win some fun prizes!

_

N/A
Golf Outing Miccosukee Golf & Country Club
11:00am to 11:05am
EST
Shotgun Start - Tribal-ISAC Golf Outing- 4-person scramble, club rentals available for purchase, lunch at the turn on behalf of our sponsors

_

N/A
Golf Outing Miccosukee Golf & Country Club
4:00pm to 4:30pm
EST
Awards & Prizes

_

N/A
Golf Outing Miccosukee Golf & Country Club
4:30pm to 4:35pm
EST
Shuttle back to Hotel

_

N/A
Golf Outing Course Main Entrance
Wednesday, February 26, 2025
7:30am to 4:00pm
EST
Registration/Check-In/Badge Pickup

_

N/A
N/A 2nd floor- Ballroom Foyer All
7:30am to 9:00am
EST
Breakfast on Behalf of our Sponsors

_

N/A
N/A Cafe Hammocks All
9:00am to 10:00am
EST
Opening Keynote: Digital Impersonations - Get ahead of this in 2025 and beyond

What do you get when you mix social media platforms, AI tools, virtual reality and deep fake technology together?? A growing BIG headache for people, businesses, and cyber security teams. Fake digital images and phishing emails have become much harder to identifty when they look and feel like they are coming from you or some other reputable source. Are you prepared to respond if someone steals your identify, your organizations identity, your image, your logo or posts misinformation that appears to be coming directly from you or your organization? What can you do? What should you be prepared to do? Join this session to be part of the discussion about how to prepare yourself, your team, your employees and your tribe or tribal enterprise for this growing issue.

TBD
All Ballroom B ALL
10:15am to 11:15am
EST
Introduction to Table Top Exercises and Cyber Games- why they matter

What is a "table top exercise" or "cyber game", and why are they important and something that we should support and implement at our tribe or tribal enterprise? In this session we will cover the tremendous benefits that can be acheived through executive level table top exercises as well as more technical cyber game scenarios. Actually testing your cyber policies, processes, controls and communications is absolutely critical to chances of improving your threat prevention and your ability to respond and recover to any and all threats that are presented to you. Everyone will leave this session understanding more about this subject and how they might be successfully (or more successfully) used in your own organization, and anyone wanting to take an even deeper and more hands-on technical dive can move right into our Capture The Flag (CTF) cyber game in our "Let's Get Technical" educational track immediately following this session.

TBD
All Ballroom B ALL
11:15am to 11:30am
EST
AM Break

_

N/A
N/A Ballroom Foyer ALL
11:30am to 12:30pm
EST
The Cyber Security Program

Every tribe or tribal enterprise requires a solid cyber security program and foundation. Whether you are just establishing a cyber program or well on your way, this session is going to discuss the important functions and elements that are required to truly have a best practice cyber program. This includes adopting an industry framework along with implementation of secure policies, procedures and core cyber functions.

TBD
Main Cyber Ballroom B ALL
11:30am to 3:45pm
EST
Capture The Flag (CTF) Workshop/Exercise- Responding to Real Cyber Problems

Ready to get your hands on some real cyber tools, have fun and work hand-in-hand with some of your technology and cyber peers from tribes across the nation? If so, this "by registration only" workshop is for you! Get ready as our CTF session sponsor opens up their CTF environment and resources to a curated afternoon of hands-on cyber challenges designed to help you learn, apply knowledge and solve real world cyber challenges. This workshop includes a proctored environment, labs and hands-on access to Red Team and Blue Team tools. Bring your own team or join a team of peers from other tribes to learn and perhaps hoist a trophy at the conclusion as most effective cyber team. Pre-registration for this session when completing your conference registration form is required to attend this session.

TBD
Let's Get Technical Ballroom C ALL
12:30pm to 1:30pm
EST
Lunch on Behalf of Our Sponsors

_

N/A
N/A Cafe Hammocks ALL
1:30pm to 2:30pm
EST
Business Continuity and Disaster Recovery

The unthinkable has happened and your operations have been compromised or damaged to the point that operations across the board are brought to a complete standstill. Now what? What happens to your employees, your customers, your data and your reputation? This session is all about discussing the importance of well prepared and tested business continuity and DR plans. Attendees will also leave with access to templates that they can reference to help them improve their own business continuity planning as well as disaster recovery.

TBD
Main Cyber Ballroom B ALL
2:30pm to 2:45pm
EST
PM Break

_

N/A
N/A Ballroom Foyer ALL
2:45pm to 3:45pm
EST
Defining and Understanding Artificial Intelligence (AI) and Practical Steps to Get Started with AI

Everybody seems to want AI, every vendor seems to say they have AI, and yet very few people or organizations feel like they fully understand AI or feel they are prepared for it. This session is designed to give you a more complete understanding of what AI is, what it is NOT, and what it is all about. We will also spend some time discussing the foundational policies and practical guidelines that you should have in place now as your organization and your employees look to leverage the many opportunities that AI presents.

TBD
Main Cyber Ballroom B ALL
3:45pm to 5:45pm
EST
Vendor Expo OPEN- with cocktails and entertainment

_

N/A
N/A Ballroom A ALL
5:45pm to 7:45pm
EST
Opening Day Meet & Greet Event- onsite

_

N/A
N/A Patio ALL
Thursday, February 27, 2025
7:30am to 12:30pm
EST
Registration/Check-In/Badge Pickup

_

N/A
N/A 2nd floor- Ballroom Foyer ALL
7:30am to 9:30am
EST
Breakfast on Behalf of Our Sponsors

_

N/A
N/A Cafe Hammocks ALL
9:00am to 11:30am
EST
Vendor Expo OPEN for One on One Meetings

_

N/A
N/A Ballroom A ALL
9:00am to 9:30am
EST
Tech Tour with Miccosukee IT Department

Take a tour led by our host site IT department!

9:30am to 11:30am
EST
Tribal Cybersecurity Roundtable- Uniting a Nationwide Community (ATTENDEES ONLY- CLOSED TO VENDORS)

Led by the Steering Committee of the Tribal-ISAC (the not-for-profit national (cyber) security community that is by tribes and for tribes). This engaging and interactive session is designed to introduce you to your peers from other tribes across the nation, learn about how other tribes and tribal enterprises are tackling cybersecurity challenges and understand the value and importance of all tribes working together to protect government, gaming & hospitality, health and member services and tribal sovereignty from cybersecurity threats. Isolation and working on your own is NOT the answer to better cyber security practices and it makes your tribe and all tribe LESS safe. In this session you will learn about your peers, cyber resources available to you and why collaborating and sharing cyber information with other tribes and the Tribal-ISAC is a best practice.

TBD
All Ballroom B ATTENDEES ONLY
11:30am to 12:30pm
EST
Lunch on Behalf of Our Sponsors

_

N/A
N/A Cafe Hammocks ALL
12:30pm to 2:00pm
EST
Vendor Expo Prizes & Closing

_

N/A
N/A Ballroom A ALL
2:00pm to 3:00pm
EST
Third Party Risk and Security Management

You rely on third party providers which often include their products, services, software and their own company partnerships and cyber infrastructure. How do you properly and thoroughly assess if a vendor, their product, their services or their own internal practices present a risk to your tribe or tribal enterprise? You are only as secure as your weakest link, and how can you be certain that weak link is not one of your many third party providers? Join us in this session to learn more and each attendee can expect to leave with some great guidance as well as access to some great third party assessment tools.

TBD
Main Cyber Ballroom B ALL
2:00pm to 3:00pm
EST
Incident Response & Threat Hunting

In this session we will mix a bit of proactive threat hunting best practices, tools and techniques with some first response reactive best practices for incident response. Designed to be more technical in nature, this session will cover logs, user and network patterns, vulnerability scanning and tools and techniques that tribes can and should utilize to better protect their networks and respond quickly to threats and anomalies.

TBD
Let's Get Technical Ballroom C ALL
2:30pm to 2:45pm
EST
PM Break

_

TBD
N/A Ballroom Foyer ALL
3:00pm to 4:00pm
EST
The Most Effective Cyber Key Performance Indicators (KPI's)

It can be extremely difficult to articulate or explain the successes, failures, needs, accomplishments and overall health of your cyber security team, programs and initiatives. This is where the development, use and communication of key cyber KPI's can be a game changer. The effective use of easy to understand KPI's can make it easier for your executive team to understand the organizations cyber situation, the gaps, cyber funding needs, the threat level, the size and nature of current threats and the behind the scenes accomplishments of the cyber security team. In this session you will learn about the types of KPI's that any tribal organization can use to communicate important cyber facts about the organization.

TBD
Main Cyber Ballroom B ALL
3:00pm to 4:00pm
EST
Adding Some Offense to Your Cyber Defense

Threat actors are not the only ones that can create deception, and sometimes the best defense is adding a bit of offense. In this session we will take a look at methods that you can implement that are designed to protect your network, data and resources while increasing the speed of visibility of any potential threats or intrusions into your organization. Learn more about the creation and implemenation of honeypot decoy systems or networks and other methods that can effectively lure, trap and identify malicious actors before they can cause you any harm.

TBD
Let's Get Technical Ballroom C ALL
Friday, February 28, 2025
8:00am to 9:30am
EST
Breakfast on Behalf of Our Sponsors

_

N/A
N/A Cafe Hammocks ALL
9:30am to 10:30am
EST
Your Data and AI

AI wants your data - and in order to fully benefit from AI your employees WANT AI to have access to your data. So, what does that mean when it comes to data security, data sovereignty, personal data security and protecting the crown jewels of your tribe or tribal enterprise? Is your data ready for AI, and are you prepared to trust providing access to AI with that data? How can you safely use AI to let your tribe and employees succeed when it comes to your sensitive data?

TBD
Main Cyber Ballroom B ALL
9:30am to 10:30am
EST
What Exactly Is on MY Network?

How confident are you that you understand everything that is attached to your network, when something new attaches and vulnerabilities that exist? Both active and passive scanning are core components of cyber security programs, and this session will look into best practices when it comes to gaining more visibility to what is attaching (or attempting to attach) and/or communicate across your network.

TBD
Let's Get Technical Ballroom C ALL
10:30am to 10:45am
EST
AM Break

_

N/A
N/A Ballroom Foyer ALL
10:45am to 11:45am
EST
Data Governance and Classification

"Know thy data" - the 11th commandment when it comes to cyber security. You can't effectively secure what is undefined, poorly understood or unknown. Without clearly understanding the most important assets, processes and the data crown jewels of the organization - your limited cyber resources cannot be utilized as effectively as possible. Learn about effective methods of implementing reasonable data governance and data classification that can make it easier for your cyber resources to improve their cyber program with the right focus on what really matters to your tribe or tribal enterprise.

TBD
Main Cyber Ballroom B ALL
10:45am to 11:45am
EST
Cloud and Container Security

How do you REALLY know if your cloud systems or data are secure? How can you monitor your security in the cloud? In this session you can expect to hear about tools, techniques and best practices when it comes to securing your cloud hardware, cloud data and the instances or containers of your data and applications deployed to the cloud.

TBD
Let's Get Technical Ballroom C ALL

Download PDF Schedule

Event Sponsors

Four golfers at the Tribal-ISAC golf outing

Golf Outing

Tribal-ISAC logo

Par-TEE Fore Security
What’s a TribalHub event without creating time for some purposeful fun? Support the non-profit Tribal-ISAC and the entire tribal community while getting to know fellow attendees at this 4-Person Scramble on February 25, 2025 at the Miccosukee Golf & Country Club! Be sure to mark “I’m Interested in Golfing” on your registration form!

Learn More   Sponsor Golf Outing

Membership Means More

TribalHub members are a community of like-minded peers supporting a deeper purpose that together creates a positive difference for all tribes. Your TribalHub membership benefits you and your tribe, but you are now a part of something much bigger.

Tribal Government & Enterprise Membership is for technology and business leaders working at tribal governments, health centers, and enterprises while Associate Membership is for other organizations (vendors/suppliers, native-owned companies, and non-profits) working in and with the tribal market.

Learn More About Membership

TribalHub members
Ready to attend the TribalHub 5th Annual Cybersecurity Summit?

Register now to access the benefits of meeting with your peers in person!

Register Now

 
Interested in sponsoring this TribalHub 5th Annual Cybersecurity Summit?

Get more detailed information about the benefits of sponsoring the 5th Annual Cybersecurity Summit and how you can book your participation.

Sponsor Now