Michigan Cybersecurity Summit 2025: Insights & Innovations

Michigan Cyber Summit 2025 cybersecurity strategies generative AI cyber threats network security
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
October 8, 2025 3 min read

TL;DR

The article covers the Michigan Cyber Summit 2025, featuring expert speakers discussing advanced cybersecurity strategies, including generative AI and risk management. Attendees will gain insights into protecting public and private interests while networking with industry leaders.

Michigan Cyber Summit 2025

Michigan Cyber Summit 2025 Banner
Image courtesy of Michigan Cyber Summit

The 14th Annual Michigan Cyber Summit will bring together local and national thought leaders, focusing on advanced strategies for defending against cyber threat actors. This event emphasizes the use of generative AI in cybersecurity, federal resource integration, and advancements in protecting public and private interests.

"The 2025 Michigan Cyber Summit gives us the opportunity to connect with cybersecurity experts from across the globe on a variety of topics, including new technologies and pressing threats."
Laura Clark, Chief Information Officer, State of Michigan

Speakers

Bryce Austin
Image courtesy of Michigan Cyber Summit

Bryce Austin, CEO of TCE Strategy, will share insights from his extensive experience in cybersecurity, emphasizing risk management strategies. His book, "Secure Enough? 20 Questions on Cybersecurity for Business Owners and Executives," addresses key cybersecurity concerns.

Erik Avakian
Image courtesy of Michigan Cyber Summit

Erik Avakian, Technical Counselor at Info-Tech Research Group, brings over 22 years of experience in cybersecurity and program management.

Michelle Checchi
Image courtesy of Michigan Cyber Summit

Michelle Checchi, Cloud Solution Architect at Microsoft, specializes in Data Security and the implementation of Microsoft Purview solutions, focusing on the challenges faced by public and private sectors.

Agenda Highlights

The summit agenda includes several key presentations and breakout sessions:

  • Keynote by Bryce Austin: "Keep Your Head Out of the Cyber Sand: Using Superior Communications to Get the Job Done!" at 9:10 am.
  • Concurrent Sessions: Covering topics such as "Agentic AI Meets Cyber Defense" and "The People Problem + Social Engineering."
  • Networking Opportunities: Participants will have breaks for networking and discussions.

Cybersecurity Summit at Western Michigan University

Brett Leatherman talks at a podium.
Image courtesy of WMU Cybersecurity Summit

The 4th Annual Cybersecurity Summit will be held on October 9, 2025, at the WMU Student Center from 8 a.m. to 4:30 p.m. This summit aims to empower digital citizens from all backgrounds.

Pathways

The event features four pathways tailored for different audiences:

  1. Cybersecurity Foundations & Futures: Focuses on foundational concepts and career pathways for students.
  2. Leadership in Cybersecurity Strategy: Emphasizes strategic planning and risk management for professionals.
  3. Cyber Defense & Innovation: Dives into threat detection and incident response for technical attendees.
  4. Everyday Cyber Safety: Offers practical knowledge for consumers on protecting personal data.

Keynote Speaker

Brett Leatherman, Assistant Director of the FBI Cyber Division, will deliver the keynote address on "How the FBI Defends America in Cyberspace."

Detroit Cybersecurity Summit

The Fifth Annual Detroit Cybersecurity Summit will feature Snehal Antani, CEO of Horizon3.ai, who will discuss the ease of compromising large networks. Key points include:

  • Use of OSINT and password spraying for system takeovers.
  • Strategies for expanding control with legitimate credentials.
  • Compromising cloud services through credential theft.

Cyber Summit Overview

Cyber Summit Logo
Image courtesy of Cyber Summit

The 2023 Michigan Cyber Summit is scheduled for October 18, 2023, at the Suburban Collection Showplace in Novi, Michigan. This event will host discussions on cybersecurity issues, featuring speakers from government and industry.

Key Topics

  • Government and private sector collaboration.
  • Cybersecurity workforce development.
  • Current trends in private sector cybersecurity.

For more details, visit Michigan Cyber Summit.

This article presents detailed technical insights into the upcoming cybersecurity events, their speakers, and key topics of discussion, ensuring participants can stay informed about the latest trends and strategies in the field.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends
React2Shell vulnerability

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends

Critical React2Shell RCE vulnerability exploited by threat actors. Learn about attacker techniques, observed payloads like crypto miners, and how to protect your systems. Read now!

By Divyansh Ingle December 12, 2025 8 min read
Read full article
WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups
WinRAR vulnerability

WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups

CISA flags WinRAR CVE-2025-6218 as actively exploited. Learn about this path traversal flaw and how to protect your systems. Update now!

By Jim Gagnard December 11, 2025 3 min read
Read full article
Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers
malicious VSCode extensions

Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers

Beware of malicious VSCode extensions & device code phishing scams. Learn how these attacks steal credentials, capture screens, and hijack sessions. Protect yourself now!

By Alan V Gutnov December 10, 2025 6 min read
Read full article
PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure
BRICKSTORM malware

PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure

Discover how PRC state actors are using BRICKSTORM malware to gain persistent access via VMware. Learn about its advanced evasion techniques and how to defend your systems. Read now!

By Divyansh Ingle December 9, 2025 3 min read
Read full article