Event Details
Format: In Person
Date: February 25–28, 2025
Please be sure to register for this event as well as add it to your calendar!
Download Calendar Reminder
Add to Google Calendar (opens in new tab)
Add to Office 365 (opens in new tab)
Join us for a three-day IN PERSON event dedicated to strengthening cyber defenses for tribes and tribal enterprises. This event offers an opportunity to connect with top cybersecurity experts and fellow leaders to address the most pressing cyber threats facing tribes today.
Gain crucial insights into the roles, responsibilities, and investments needed for protecting tribal entities and avoiding costly security mistakes. Connect with peers, experts, and tribal and federal organizations to strengthen your tribe's cybersecurity posture with the latest tools, resources, and best practices.
Keynotes, Workshops, Sessions, Tribal-ISAC working groups, Vendor Expo, Networking Events and Golf...we'll meet you there!
Hotel Information
Miccosukee Casino & Resort
Address: 500 SW 177th Ave, Miami, FL 33194
Room Rate- $179++/night. Discount rate expires February 1.
Why Attend
• Learn about the critical role and responsibilities of Tribal Executives, Tribal Regulators and Tribal technology resources in protecting and preparing your tribe or tribal enterprise
• Build and gain insight into the necessary and critical investments required for cybersecurity
• Learn about what costly information security mistakes to avoid in order to minimize the risk of your tribe or enterprise being a victim or target
• Enhance existing knowledge of security tools and best practices
• Ability to learn more about what other tribes are doing to improve their security posture
• Understand the availability of more tools and resources
• Make connections with peers, industry experts along with tribal and federal entities
Who Should Attend
Executive Level Decision Makers in Tribal Gaming:
• CEOs
• GMs
• Finance
• Gaming Commission
• Regulators
• Risk Management
Executive Level Decision Makers at Tribal Government and Health Facilities:
• Tribal Council/Administration
• Executive Directors
• Health Directors
Information Technology Department:
• CIOs
• IT Directors and Managers
• CISOs
• and other Security Related titles in IT
What People Are Saying
Today, more than ever, it is imperative for business leadership to understand the risk that cyber threats present to the business and how cybersecurity can mitigate the risk effectively. Knowledge and awareness are the critical investments great leaders can make to provide the best financial, security and business decisions for their organization. The Tribal Cybersecurity Summit will provide every Leader with insightful and valuable knowledge which will allow you to ask proper questions, invest in key areas and understand the risks presented by your technologists.
Cybersecurity is an organizational responsibility, not an IT initiative. Ensuring there is broad exposure to the threat landscape at all levels in an organization is key, especially at the senior level, as support of the investment required to protect the organization is imperative. At the Tribal Cybersecurity Summit, you will gain a deeper understanding of current trends/challenges that tribes are facing collectively and hear from experts in the field as well as some of your peers on strategies to fend off the bad guys. We are stronger together!
Advisory Board
2025 Cybersecurtiy Board
Sessions
Time | Session | Speaker | Track | Location | Access |
---|---|---|---|---|---|
Tuesday, February 25, 2025 | |||||
9:15am to 9:20am EST |
Shuttle to Tribal-ISAC Golf Outing
_ |
N/A
|
Golf Outing | Miccosukee Resort Main Entrance | |
9:30am to 10:30am EST |
Player Check-In - kick things off with a warm welcome and chance to win some fun prizes!
_ |
N/A
|
Golf Outing | Miccosukee Golf & Country Club | |
11:00am to 11:05am EST |
Shotgun Start - Tribal-ISAC Golf Outing- 4-person scramble, club rentals available for purchase, lunch at the turn on behalf of our sponsors
_ |
N/A
|
Golf Outing | Miccosukee Golf & Country Club | |
4:00pm to 4:30pm EST |
Awards & Prizes
_ |
N/A
|
Golf Outing | Miccosukee Golf & Country Club | |
4:30pm to 4:35pm EST |
Shuttle back to Hotel
_ |
N/A
|
Golf Outing | Course Main Entrance | |
Wednesday, February 26, 2025 | |||||
7:30am to 4:00pm EST |
Registration/Check-In/Badge Pickup
_ |
N/A
|
N/A | 2nd floor- Ballroom Foyer | All |
7:30am to 9:00am EST |
Breakfast on Behalf of our Sponsors
_ |
N/A
|
N/A | Cafe Hammocks | All |
9:00am to 10:00am EST |
Opening Keynote: Digital Impersonations - Get ahead of this in 2025 and beyond
What do you get when you mix social media platforms, AI tools, virtual reality and deep fake technology together?? A growing BIG headache for people, businesses, and cyber security teams. Fake digital images and phishing emails have become much harder to identifty when they look and feel like they are coming from you or some other reputable source. Are you prepared to respond if someone steals your identify, your organizations identity, your image, your logo or posts misinformation that appears to be coming directly from you or your organization? What can you do? What should you be prepared to do? Join this session to be part of the discussion about how to prepare yourself, your team, your employees and your tribe or tribal enterprise for this growing issue. |
TBD
|
All | Ballroom B | ALL |
10:15am to 11:15am EST |
Introduction to Table Top Exercises and Cyber Games- why they matter
What is a "table top exercise" or "cyber game", and why are they important and something that we should support and implement at our tribe or tribal enterprise? In this session we will cover the tremendous benefits that can be acheived through executive level table top exercises as well as more technical cyber game scenarios. Actually testing your cyber policies, processes, controls and communications is absolutely critical to chances of improving your threat prevention and your ability to respond and recover to any and all threats that are presented to you. Everyone will leave this session understanding more about this subject and how they might be successfully (or more successfully) used in your own organization, and anyone wanting to take an even deeper and more hands-on technical dive can move right into our Capture The Flag (CTF) cyber game in our "Let's Get Technical" educational track immediately following this session. |
TBD
|
All | Ballroom B | ALL |
11:15am to 11:30am EST |
AM Break
_ |
N/A
|
N/A | Ballroom Foyer | ALL |
11:30am to 12:30pm EST |
The Cyber Security Program
Every tribe or tribal enterprise requires a solid cyber security program and foundation. Whether you are just establishing a cyber program or well on your way, this session is going to discuss the important functions and elements that are required to truly have a best practice cyber program. This includes adopting an industry framework along with implementation of secure policies, procedures and core cyber functions. |
TBD
|
Main Cyber | Ballroom B | ALL |
11:30am to 3:45pm EST |
Capture The Flag (CTF) Workshop/Exercise- Responding to Real Cyber Problems
Ready to get your hands on some real cyber tools, have fun and work hand-in-hand with some of your technology and cyber peers from tribes across the nation? If so, this "by registration only" workshop is for you! Get ready as our CTF session sponsor opens up their CTF environment and resources to a curated afternoon of hands-on cyber challenges designed to help you learn, apply knowledge and solve real world cyber challenges. This workshop includes a proctored environment, labs and hands-on access to Red Team and Blue Team tools. Bring your own team or join a team of peers from other tribes to learn and perhaps hoist a trophy at the conclusion as most effective cyber team. Pre-registration for this session when completing your conference registration form is required to attend this session. |
TBD
|
Let's Get Technical | Ballroom C | ALL |
12:30pm to 1:30pm EST |
Lunch on Behalf of Our Sponsors
_ |
N/A
|
N/A | Cafe Hammocks | ALL |
1:30pm to 2:30pm EST |
Business Continuity and Disaster Recovery
The unthinkable has happened and your operations have been compromised or damaged to the point that operations across the board are brought to a complete standstill. Now what? What happens to your employees, your customers, your data and your reputation? This session is all about discussing the importance of well prepared and tested business continuity and DR plans. Attendees will also leave with access to templates that they can reference to help them improve their own business continuity planning as well as disaster recovery. |
TBD
|
Main Cyber | Ballroom B | ALL |
2:30pm to 2:45pm EST |
PM Break
_ |
N/A
|
N/A | Ballroom Foyer | ALL |
2:45pm to 3:45pm EST |
Defining and Understanding Artificial Intelligence (AI) and Practical Steps to Get Started with AI
Everybody seems to want AI, every vendor seems to say they have AI, and yet very few people or organizations feel like they fully understand AI or feel they are prepared for it. This session is designed to give you a more complete understanding of what AI is, what it is NOT, and what it is all about. We will also spend some time discussing the foundational policies and practical guidelines that you should have in place now as your organization and your employees look to leverage the many opportunities that AI presents. |
TBD
|
Main Cyber | Ballroom B | ALL |
3:45pm to 5:45pm EST |
Vendor Expo OPEN- with cocktails and entertainment
_ |
N/A
|
N/A | Ballroom A | ALL |
5:45pm to 7:45pm EST |
Opening Day Meet & Greet Event- onsite
_ |
N/A
|
N/A | Patio | ALL |
Thursday, February 27, 2025 | |||||
7:30am to 12:30pm EST |
Registration/Check-In/Badge Pickup
_ |
N/A
|
N/A | 2nd floor- Ballroom Foyer | ALL |
7:30am to 9:30am EST |
Breakfast on Behalf of Our Sponsors
_ |
N/A
|
N/A | Cafe Hammocks | ALL |
9:00am to 11:30am EST |
Vendor Expo OPEN for One on One Meetings
_ |
N/A
|
N/A | Ballroom A | ALL |
9:00am to 9:30am EST |
Tech Tour with Miccosukee IT Department
Take a tour led by our host site IT department! |
|
|||
9:30am to 11:30am EST |
Tribal Cybersecurity Roundtable- Uniting a Nationwide Community (ATTENDEES ONLY- CLOSED TO VENDORS)
Led by the Steering Committee of the Tribal-ISAC (the not-for-profit national (cyber) security community that is by tribes and for tribes). This engaging and interactive session is designed to introduce you to your peers from other tribes across the nation, learn about how other tribes and tribal enterprises are tackling cybersecurity challenges and understand the value and importance of all tribes working together to protect government, gaming & hospitality, health and member services and tribal sovereignty from cybersecurity threats. Isolation and working on your own is NOT the answer to better cyber security practices and it makes your tribe and all tribe LESS safe. In this session you will learn about your peers, cyber resources available to you and why collaborating and sharing cyber information with other tribes and the Tribal-ISAC is a best practice. |
TBD
|
All | Ballroom B | ATTENDEES ONLY |
11:30am to 12:30pm EST |
Lunch on Behalf of Our Sponsors
_ |
N/A
|
N/A | Cafe Hammocks | ALL |
12:30pm to 2:00pm EST |
Vendor Expo Prizes & Closing
_ |
N/A
|
N/A | Ballroom A | ALL |
2:00pm to 3:00pm EST |
Third Party Risk and Security Management
You rely on third party providers which often include their products, services, software and their own company partnerships and cyber infrastructure. How do you properly and thoroughly assess if a vendor, their product, their services or their own internal practices present a risk to your tribe or tribal enterprise? You are only as secure as your weakest link, and how can you be certain that weak link is not one of your many third party providers? Join us in this session to learn more and each attendee can expect to leave with some great guidance as well as access to some great third party assessment tools. |
TBD
|
Main Cyber | Ballroom B | ALL |
2:00pm to 3:00pm EST |
Incident Response & Threat Hunting
In this session we will mix a bit of proactive threat hunting best practices, tools and techniques with some first response reactive best practices for incident response. Designed to be more technical in nature, this session will cover logs, user and network patterns, vulnerability scanning and tools and techniques that tribes can and should utilize to better protect their networks and respond quickly to threats and anomalies. |
TBD
|
Let's Get Technical | Ballroom C | ALL |
2:30pm to 2:45pm EST |
PM Break
_ |
TBD
|
N/A | Ballroom Foyer | ALL |
3:00pm to 4:00pm EST |
The Most Effective Cyber Key Performance Indicators (KPI's)
It can be extremely difficult to articulate or explain the successes, failures, needs, accomplishments and overall health of your cyber security team, programs and initiatives. This is where the development, use and communication of key cyber KPI's can be a game changer. The effective use of easy to understand KPI's can make it easier for your executive team to understand the organizations cyber situation, the gaps, cyber funding needs, the threat level, the size and nature of current threats and the behind the scenes accomplishments of the cyber security team. In this session you will learn about the types of KPI's that any tribal organization can use to communicate important cyber facts about the organization. |
TBD
|
Main Cyber | Ballroom B | ALL |
3:00pm to 4:00pm EST |
Adding Some Offense to Your Cyber Defense
Threat actors are not the only ones that can create deception, and sometimes the best defense is adding a bit of offense. In this session we will take a look at methods that you can implement that are designed to protect your network, data and resources while increasing the speed of visibility of any potential threats or intrusions into your organization. Learn more about the creation and implemenation of honeypot decoy systems or networks and other methods that can effectively lure, trap and identify malicious actors before they can cause you any harm. |
TBD
|
Let's Get Technical | Ballroom C | ALL |
Friday, February 28, 2025 | |||||
8:00am to 9:30am EST |
Breakfast on Behalf of Our Sponsors
_ |
N/A
|
N/A | Cafe Hammocks | ALL |
9:30am to 10:30am EST |
Your Data and AI
AI wants your data - and in order to fully benefit from AI your employees WANT AI to have access to your data. So, what does that mean when it comes to data security, data sovereignty, personal data security and protecting the crown jewels of your tribe or tribal enterprise? Is your data ready for AI, and are you prepared to trust providing access to AI with that data? How can you safely use AI to let your tribe and employees succeed when it comes to your sensitive data? |
TBD
|
Main Cyber | Ballroom B | ALL |
9:30am to 10:30am EST |
What Exactly Is on MY Network?
How confident are you that you understand everything that is attached to your network, when something new attaches and vulnerabilities that exist? Both active and passive scanning are core components of cyber security programs, and this session will look into best practices when it comes to gaining more visibility to what is attaching (or attempting to attach) and/or communicate across your network. |
TBD
|
Let's Get Technical | Ballroom C | ALL |
10:30am to 10:45am EST |
AM Break
_ |
N/A
|
N/A | Ballroom Foyer | ALL |
10:45am to 11:45am EST |
Data Governance and Classification
"Know thy data" - the 11th commandment when it comes to cyber security. You can't effectively secure what is undefined, poorly understood or unknown. Without clearly understanding the most important assets, processes and the data crown jewels of the organization - your limited cyber resources cannot be utilized as effectively as possible. Learn about effective methods of implementing reasonable data governance and data classification that can make it easier for your cyber resources to improve their cyber program with the right focus on what really matters to your tribe or tribal enterprise. |
TBD
|
Main Cyber | Ballroom B | ALL |
10:45am to 11:45am EST |
Cloud and Container Security
How do you REALLY know if your cloud systems or data are secure? How can you monitor your security in the cloud? In this session you can expect to hear about tools, techniques and best practices when it comes to securing your cloud hardware, cloud data and the instances or containers of your data and applications deployed to the cloud. |
TBD
|
Let's Get Technical | Ballroom C | ALL |
Golf Outing
Membership Means More
TribalHub members are a community of like-minded peers supporting a deeper purpose that together creates a positive difference for all tribes. Your TribalHub membership benefits you and your tribe, but you are now a part of something much bigger.
Tribal Government & Enterprise Membership is for technology and business leaders working at tribal governments, health centers, and enterprises while Associate Membership is for other organizations (vendors/suppliers, native-owned companies, and non-profits) working in and with the tribal market.
Register now to access the benefits of meeting with your peers in person!
Get more detailed information about the benefits of sponsoring the 5th Annual Cybersecurity Summit and how you can book your participation.