The event that connects IT & Security leaders to help navigate the everyday challenges of the modern threat landscape.
Data Security Summit is fundamentally different.
We've stripped away the noise to create a focused experience – both in person and online – built to connect IT and Security leaders tackling the same high-stakes challenges.
This isn't about vendor pitches. It's about hearing directly from your peers - the ones who've faced the threats you're planning for and who are shaping what comes next.
Defense alone won’t save you. Discover strategies to bounce back fast from attacks, protect your critical data and keep your business running when chaos hits.
Get ahead of today’s threats with smarter, faster data protection strategies.
Learn how to tackle Shadow AI risks, secure non-human identities and prepare for ransomware that strikes your data first.
Hear how top leaders translate security gaps into action—and boardroom confidence.
|
Oct 7th | North America |
OCTOBER 7, 2025 |
Event Format |
HD livestream of all main sessions |
Half day in-person event of New York City |
||||
Engagement opportunities |
Engage with Rubrik experts via real-time chat |
In-person networking with IT and security leaders, and a live Q&A with speakers |
||||
Digital resources library |
Yes |
Yes: Access to all virtual content |
||||
Available on-demand |
Yes |
Yes |
||||
Hands-on workshops / demos |
No |
Yes: Launching exclusive the Zero Hour tabletop |
||||
Happy hour & networking |
No |
Yes |
||||
Meet & greet with speaker |
No |
Limited spaces |
||||
Registration Requirements |
Open to all (not capped) |
Request to attend (limited seats) |
Event Format |
HD livestream of all main sessions |
|
Engagement opportunities |
Engage with Rubrik experts via real-time chat |
|
Digital resources library |
Yes |
|
Available on-demand |
Yes |
|
Hands-on workshops / demos |
No |
|
Happy hour & networking |
No |
|
Meet & greet with speaker |
No |
|
Registration Requirements |
Open to all (not capped) |
Event Format |
Half day in-person event of New York City |
|
Engagement opportunities |
In-person networking with IT and security leaders, and a live Q&A with speakers |
|
Digital resources library |
Yes: Access to all virtual content |
|
Available on-demand |
Yes |
|
Hands-on workshops / demos |
Yes: Launching exclusive the Zero Hour tabletop |
|
Happy hour & networking |
Yes |
|
Meet & greet with speaker |
Limited spaces |
|
Registration Requirements |
Request to attend (limited seats) |
Today’s most dangerous attackers don’t just steal data—they exploit gaps across your identities, cloud, and processes to disrupt your entire business. Groups like Scattered Spider prove that prevention alone isn’t enough. This keynote ex... See more
Modern breaches don’t start with malware—they start with compromised identities. As organizations expand across cloud and SaaS, identity sprawl—including human, and non-human identities—has dramatically increased the attack surface. This... See more
AI tools are transforming how employees work—but they’re also creating a new kind of insider risk. As teams adopt generative AI and automation without security oversight, sensitive data can be exposed in ways organizations never intended... See more
The role of the security leader is changing fast. Today’s CISOs and security executives must lead beyond technology—balancing risk, resilience, talent strategy, and rising regulatory pressure. This session explores how AI is reshaping te... See more
Today’s most dangerous attackers don’t just steal data—they exploit gaps across your identities, cloud, and processes to disrupt your entire business. Groups like Scattered Spider prove that prevention alone isn’t enough. This keynote explo... See more
Today’s most dangerous attackers don’t just steal data—they exploit gaps across your identities, cloud, and processes to disrupt your entire business. Groups like Scattered Spider prove that prevention alone isn’t enough. This keynote explo... See more
Rubrik Data Security Summit | October 9, 2025
The Future of Data Security Starts Here
The event that connects IT & Security leaders to help navigate the everyday challenges of the ... See
more
Rubrik Data Security Summit | October 9, 2025
The Future of Data Security Starts Here
The event that connects IT & Security leaders to help navigate the everyday challenges of the ... See
more
Modern breaches don’t start with malware—they start with compromised identities. As organizations expand across cloud and SaaS, identity sprawl—including human, and non-human identities—has dramatically increased the attack surface. This se... See more
Modern breaches don’t start with malware—they start with compromised identities. As organizations expand across cloud and SaaS, identity sprawl—including human, and non-human identities—has dramatically increased the attack surface. This se... See more
AI tools are transforming how employees work—but they’re also creating a new kind of insider risk. As teams adopt generative AI and automation without security oversight, sensitive data can be exposed in ways organizations never intended. T... See more
AI tools are transforming how employees work—but they’re also creating a new kind of insider risk. As teams adopt generative AI and automation without security oversight, sensitive data can be exposed in ways organizations never intended. T... See more
The role of the security leader is changing fast. Today’s CISOs and security executives must lead beyond technology—balancing risk, resilience, talent strategy, and rising regulatory pressure. This session explores how AI is reshaping teams... See more
The role of the security leader is changing fast. Today’s CISOs and security executives must lead beyond technology—balancing risk, resilience, talent strategy, and rising regulatory pressure. This session explores how AI is reshaping teams... See more
Today’s most dangerous attackers don’t just steal data—they exploit gaps across your identities, cloud, and processes to disrupt your entire business. Groups like Scattered Spider prove that prevention alone isn’t enough. This keynote explo... See more
Modern breaches don’t start with malware—they start with compromised identities. As organizations expand across cloud and SaaS, identity sprawl—including human, and non-human identities—has dramatically increased the attack surface. This se... See more
AI tools are transforming how employees work—but they’re also creating a new kind of insider risk. As teams adopt generative AI and automation without security oversight, sensitive data can be exposed in ways organizations never intended. T... See more
The role of the security leader is changing fast. Today’s CISOs and security executives must lead beyond technology—balancing risk, resilience, talent strategy, and rising regulatory pressure. This session explores how AI is reshaping teams... See more
Today’s most dangerous attackers don’t just steal data—they exploit gaps across your identities, cloud, and processes to disrupt your entire business. Groups like Scattered Spider prove that prevention alone isn’t enough. This keynote ex... See more
Modern breaches don’t start with malware—they start with compromised identities. As organizations expand across cloud and SaaS, identity sprawl—including human, and non-human identities—has dramatically increased the attack surface. This... See more
AI tools are transforming how employees work—but they’re also creating a new kind of insider risk. As teams adopt generative AI and automation without security oversight, sensitive data can be exposed in ways organizations never intended. T... See more
The role of the security leader is changing fast. Today’s CISOs and security executives must lead beyond technology—balancing risk, resilience, talent strategy, and rising regulatory pressure. This session explores how AI is reshaping teams... See more
Ever wonder if you're truly prepared for a cyberattack? Step into our immersive "Zero Hour" Cloud Cyber Recovery tabletop and find out. You'll be in the hot seat, making real-time decisions during a live ransomware assault on a fictional... See more
Join us for an exclusive happy hour in Midtown NYC! This is your perfect opportunity to expand your network, foster new relationships, and catch up with peers. Enjoy drinks and light refreshments as you mingle with industry leaders and f... See more
Join us in Midtown – or from wherever you are – for the Data Security Summit. Whether you're attending in person in the heart of Manhattan or tuning in virtually, you'll gain invaluable insights, hear from leading voices in cybersecurity, and connect with peers shaping the future of data security. Discover where the industry is headed – and how security leaders are turning resilience into a competitive advantage.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Donec tortor magna, fermentum eget sapien vitae, consequat dignissim nunc. Sed posuere neque sit amet elit fermentum, sed pellentesque ex tempus. Ut nibh justo, posuere id ante at, luctus condimentum nulla. Sed massa augue, convallis eu dapibus nec, bibendum vulputate enim. Nulla tempus, orci sed iaculis vestibulum, urna dolor rutrum erat, eget placerat.
Drown Out Distractions. Register for and attend Data Security Summit to be entered to win 1 of 5 Sony Wireless Noise Canceling Headphones.
*Terms and conditions apply.
Regional virtual broadcasts will start at the following dates & times:
Virtual: To attend, simply complete your registration and add the event to your calendar. All calendar holds will have a link to join the event embedded in them. You will also receive an email 24 hours and 30 minutes prior to the event with links to join.
In-person: For those interested in attending the in-person event, please complete the in-person registration form to request a seat. You will receive notification within 2 business days regarding the status of your in-person attendance request.
There is no cost to attend Data Security Summit.
By joining this virtual event, you’ll also be eligible for 2 CPE credits (1 per hour watched) through (ISC)^2.
Following the event, you can submit your credits through the (ISC)^2 member dashboard, with the course name of Rubrik Data Security Summit. Your attendee email will qualify as proof of attendance.
Yes, all sessions from Data Security Summit will be available to registered attendees to view on demand after the regional broadcasts have ended.
Details on the location will be announced shortly
Yes, in-person attendance is limited due to venue capacity constraints. We highly recommend requesting your seat as early as possible to secure your spot.
After you submit your registration form requesting an in-person seat, your application will be reviewed. We will be in touch soon with an official calendar hold should you be approved to attend this event. Please keep an eye on your inbox (and spam folder) for this notification.
Light snacks and refreshments will be available for all in-person attendees. Please be sure to indicate any dietary restrictions during the registration process.
If you find that you are no longer able to attend the in-person event, please notify us as soon as possible by reaching out to support@rubrik.events. This allows us to offer the seat to another interested attendee from our waitlist. There are no penalties for cancelling your in-person registration.