Cybersecurity Defense Ecosystem Summit (CDES) + TopGolf

Is your business well-prepared to defend against the constant cyber attacks and, when you are breached, will you be ready to act fast and effectively to minimize damage and restore business continuity?

At this event, we are going to help you find the answers you need and empower you with the CDE resources and community to help you stay ahead of the cyber curve, 365 days a year!

The simplest way to describe CDES is “Extreme Cybersecurity Business Building in a Fun Environment”. You will go home with several ideas to build bigger, better, stronger and smarter cybersecurity managed services. The morning is loaded with very high-value real education from top-shelf speakers. The afternoon is packed with fun golf games, food, drinks and social networking.

If you want more, ask about the pre-day and post-day activities – Mastermind Peer Groups, Training and Coaching Sessions.

Join us at the upcoming one-day CDES. It’s at the epicentre of cybersecurity excellence now playing at TopGolf venues across the USA.

It’s the meeting pitstops of the Cybersecurity Defense Ecosystem community, your ultimate hub to find everything related to building and scaling a cybersecurity managed business practice! Check out the website to learn and find out if this is a fit for you!

This is NOT a traditional “boring/sales pitchy” tech conference of pay-to-play or education disguised at sales pitches. It’s more of a social networking activity for the cyber community with some unique educational content from a wider variety of amazing speakers and experts who are not the same-old.

Many tell us that just meeting and exchanging ideas with their peers is all the reason they need to attend and that everything else is a bonus. This event was designed to deliver big on peer-to-peer networking.

The CDE is loaded with all sorts cybersecurity solutions, tools and services. Some exclusive to the CDE! it’s also jam-packed with the best business-building tools, services and support. It’s where the best cybersecurity technologies meet the business of managed services.

Top 10 reasons to come to the TopGolf in Jacksonville, Florida on April 11th for the Cybersecurity Defense Ecosystem Summit:

  1. Julian Lee, Publisher of eChannelNEWS, will go over how you can improve and grow your managed services year-round with the Cybersecurity Defense Ecosystem’s resources and community.
  2. Learn from Mel Reyes, a top CISO, CIO, CTO and CEO with 30 years of cybersecurity experience about building a sustainable and predictable managed services business – ask any question.
  3. Get the most recent developments and trends in the cybersecurity sector from Canalys’ Analysts, Jay McBain.
  4. At the heart of any cybersecurity is data discovery, classification, protection, and forensics reporting after a breach. Jaap Mantel from Data and More will walk you through the latest practice and solution to overcome this very complicated challenge for MSPs. 
  5. The Davine Smith from the Kaseya team will speak to you about how the company is streamlining and consolidating cybersecurity and managed services for MSPs onto a single platform.
  6. The Crosshair Cyber CISO team will show you how to prepare for and deal with a breach when it happens and PEN testing to measure the strength of your cyber protection.
  7. Town-hall interactive audience discussion with CISOs. MSPs, MSSPs, and additional cybersecurity industry professionals.
  8. Lions’ Den 3-minute pitches from our sponsors
  9. Lunch, social networking, and enjoyable golf games
  10. Support and encourage more cybersecurity channel events to come to your local area instead of just the popular locations

👍 Key Take-Aways: These topics will change by event. We will have experts on-site to cover all of these topics and you can meet and connect with them as you wish throughout the afternoon. You can come early (8 AM) and start the conversation. You will also have an option to select from these and other topics of interest to experience post-event. Remember the CDE resource and partners are available 365 days to support all of your cybersecurity needs. You can access new content, podcasts and video discussions on the CDE News Blog! or on eChannelNEWS. We will also have a special mobile app on-site where you can instantly connect with all companies to learn more and book a one-on-one meeting.

  • KEYNOTE: What are the best CISOs doing to defend against cyber attacks every day
  • PANEL DISCUSSION: What are MSPs and MSSPs doing to defend themselves and their clients against cyber attacks every day
  • EXPERT: Are you prepared for a breach day
  • VENDOR: Simplifying and improving cybersecurity through automation, consolidation and artificial intelligence!
  • PARTNER: World Hacker Games: Hackers Vs Vendors!
  • PARTNER SOC: Build it or Outsource it?
  • VENDOR: Discovering, classifying and protecting your data, wherever it lives
  • VENDOR: Supply chain cybersecurity management and compliance
  • PARTNER: Building compliance as-a-service
  • PARTNER: PEN Testing-as-a-Service
  • PARTNER: Emergency Incident Response-as-a-Service
  • VENDORS: Breach warranty and insurance protection
  • PARTNER: Configuring and simplifying the delivery of cybersecurity solutions
  • PARTNER: Virtual CISO-as-a-Service
  • PARTNER: Marketing Automation for Cybersecurity channel partners
  • PARTNER: Cybersecurity-focused Mastermind Peer-Groups
  • VENDORS: Curated selection of the most effective cybersecurity solutions and services to cover all bases to identify, protect, detect, respond and recover with governance built in
  • Outstanding social networking experience with your peers and other cyber leaders
  • Entertaining golf game experience that anyone can enjoy
  • Great food, drinks and cool gifts

🚗 Why Attend:

  • Learn how to build a bigger, better, stronger and smarter cybersecurity business practice
  • Learn how to leverage the CDE resource of the best cybersecurity solutions and business-building services
  • Meet and collaborate with your peers
  • Build your cybersecurity network
  • Free to attend with your Free membership at (And, if you do not like what you see, just cancel your membership after you attend for free :o))

⭐️ Exclusive VIP Access for CDE Members (MSPs, MSSPs, and SOCs):

🌍 International:

  • Attend upcoming events in the USA, Canada, and the UK to expand your business and network

Don’t miss this opportunity to up your cyber game and sales.! Sign up to be a member and secure your spot for free:

Here is a 2 minute video overview of the event (Content is still being finalized so check back often):

Experience a dynamic mixture of high-value cybersecurity insights with an afternoon of golf gaming and social networking!

Event Details

With over 5,000 cybersecurity vendors currently on the market, choosing the right solution and vendor is a daunting challenge. Our event tackles this big challenge by only showcasing CISO-vetted solutions for MSPs, MSSPs, and SOCs to enhance cybersecurity postures and practices. You get to build sustainable and predictable long-term business practices with CISO-vetted solutions, experts, knowledge and tools. Everything else will be labeled as emerging vendors until they are verified and approved.

Learn strategies for creating sustainable revenue streams by identifying, filling and/or improving cybersecurity gaps for your clients.

Join us for a day of learning and fun social networking with golfing games at TopGolf—an entertainment complex with high-tech golf games, music, food, and drinks.

For MSPs, MSSPs, and SOCs: Learn more or request the CDE prospectus Members attend CDES events for FREE!

For Vendors: Learn more or request the CDE prospectus


What is the Cybersecurity Defense Ecosystem and why it matters to you? You will explore the current benefits and roadmap. Learn more Request the prospectus.

As more compliance, Government and insurance regulations become the law, everyone will need to step up. Ignoring or being ignorant to the regulations is no longer acceptable. In many cases you will not be able to sell to certain clients if you do not meet the compliance requirements. CISOs need to not just protect the company, but they also have to ensure that they are compliant to the latest regulations. The board must listen, understand and act accordingly. Similarly, the role of MSPs are changing as they move towards a more proactive approach in protecting their clients while protecting themselves. In this session we will discuss the changing roles and job descriptions of CISOs and other cybersecurity professionals.

Our keynote speaker will be Mel Rico Reyes, a QTE Board Certified Global Security & IT Leader / ICF ACC Certified – Coach, Mentor, & Mastermind Leader, and Government Policy Certification (Pending) with over ten years of professional and personal coaching and mentoring experience and 30 years of Cybersecurity & IT leadership experience.

As a Global Enterprise Security and Information Technology leader, Mel has navigated through four startups, two IPOs, three M&As, and two divestitures across three Financial Services institutions, three Media Agencies, a 5-year CPG contract with Pepsi, and the manufacturing sector.

Fractional CIO, CISO, CTO (Chaos to Order) executive providing services to Enterprises, SMB, Boards, & Startups – Leveraging over 30+ years of experience to help you build resilient teams and a culture that delivers.

Global CEO, Chief Information Officer, CISO, and CTO “Chaos to Order” executive driving quantifiable global strategies. Including cybersecurity, application product/development, and operations by delivering solutions in BI, Big Data, APIs, ERP, RPA, Cloud, Security, InfoSec, Compliance, AppSec, Agile, and M&A. Supporting global efforts in EMEA, LATAM, North America, and South Asia.

It's all about protecting the Data!

Staying on top of the latest in data security assessments and categorizations are mission critical in cyber risk management, saving time and costs. You have to know what types of data you have, how much of it and where it is - otherwise you cannot protect what you cannot see!

This area is undergoing constant innovations as several vendors try to solve this massive problem.

1. How do you locate, identify and classify all of your data, wherever it lives?

2. How do you analyze and classify the various types of data to determine the level of security protection each requires.

3. How do you perform forensics after a data breach to know exactly what and how much data has been compromised to guide your legal reporting, insurance and mediation requirements.


Your clients need penetration testing to meet compliance and cyber insurance requirements. However, the current manual process for penetration testing is far too expensive and time consuming. 
Join us to learn how vPenTest, Vonahi's automated network penetration testing platform, delivers true network penetration testing in a faster, more cost-effective way. 
vPenTest is essentially a hacker on a company’s network. It’s not just a vulnerability scanner. It looks for sensitive data, performs exploits, conducts man-in-the-middle attacks, cracks password hashes, escalates privileges on the network, and even impersonates users to find sensitive data. The results and reports meet regulatory compliance requirements for an external and internal penetration test. 
In this session you will see: 
1 The challenges solved with automated pentests and how you can add it to your service portfolio. 
2 The value of automated penetration testing for your clients. 
3 The deliverables and reports for technical and non-technical team members. 
4 How automation changes the game by allowing you to easily and affordably deliver penetration testing to your clients and how our partners package it to win new highly profitable revenue. 

What's your plan when you are breached?

In this session we will explore the "PLAN" that you must have in place to stop the break, comply with the reporting regulations and to fix the problem from happening again. In some cases, you will need to inform your customers and make appropriate amends as well as mediate and social media and dark-web exposure.

Stopping the breach is only one part, but important to mediate the risk. As such, we will be showcasing the Emergency Incident Response as-a-service to help you stop any breach as fast as possible 24/7/365!

Fixing the breach will stem from the forensics discovery and recommendations.

Preventing the next breach from happening will require more analysis as you now know that you are vulnerable.

How do you REALLY know if your current security stack, process and people are producing the optimal cybersecurity protection for you and your clients?

How do you choose the most appropriate and effective technology stack with so many moving parts in maintaining the best possible cybersecurity protection?

It's far easier said than done. The ramifications of selecting or keeping the incorrect stack (even one component) might be catastrophic for both the MSP and the client.

Even if you start with the proper technology stack, as solutions improve and hackers evolve, components of your technology stack may lose efficacy and become obsolete. Other technologies may be a far superior replacement.
How can you determine if your current cybersecurity stack is working properly? Do you base it on whether or not you are hacked? Hacked is bad? Not hacked is good? Maybe run an expensive PEN testing service?

Failure in your technology stack can be a ticking time bomb...

New tools are assisting in the monitoring and identification of possible problems in each component of the technology stack. You will also learn how to "stress-test" your actual cybersecurity technology stack.

Check out 3-minute pitches about solutions. The vendors will all be around for the entire day so you can seek them out to explore further and become a partner.

You will get the "one-mile" high overview of the various solutions and business tools. You will vote for a winner and have a chance to win some cash.

Note which vendors and tools seem to fit well with you then meet them in the afternoon in their golf bay to explore further, have a drink and play some games.

No pressure!

At the end of the day, all channel partners want to sell more and keep their customer longer. Today, you will get the inside scoop from the experts who have done it successfully.

Maintaining your competitive edge is crucial to customer retention and that requires you to always be improving their cybersecurity posture based on their specific business goals, budget and appetite for risks. You must deliver the right outcomes by staying on top of the technology stack, people, and processes, while keeping your clients updated! That requires proper reports to demonstrate what you are doing to protect them every day to keep "justifying" the money that they pay you each month! Remember you are required to continually improve the security posture of your clients and sometimes that may require you to make the case for them to invest more - at the very least you need ten to be informed and to make the decision.

Why is this REALLY important? Beyond the fast that a cyber breach can be detrimental yo their business and yours, you should be aware that buyers would seriously consider switching managed service providers if the rival could demonstrate that they can give significantly superior cybersecurity protection.You do not want your competitors poaching your customers!

How do you make the cybersecurity business case with your clients and align your company with your clients' interests to win more deals and remain sticky?

What should MSPs look for in a outsourcing partner to managed cybersecurity services?

What can and cannot you do in-house will be critical factors in your decisions. Once you know what you want to outsource, finding the right channel-friendly partner with the right SLA agreements, capabilities and customer support is the next phase.

In this session, we explore the criticality of automation, correlation, triangulation, integration and normalization in enhancing cybersecurity outcomes to truly operationalize your clients’ security AND, how the right outsource partner can help you do it right!

We will tackle these topics and explore the changing roles of today's CISO!

Exhibitors will be hosting their exclusive golf-bay area to showcase their solutions and do some fun golf games. Everyone will be networking. Drinks and snacks will be available.

Only for those who do NOT want to play Golf Games, you have an option to participate in a Mastermind Peer-Group whereby you collaborate with your peers to solve your pain points.

Usually, whoever is staying back will end up at the bar or for dinner to carry on the conversations.

Free with your CDE Membership (Non-Members Pay $500)

How do I become a free member of the CDE? Just sign up for free, cancel anytime at:

When should I arrive? We start sharp at 9 AM, so please plan to arrive by 8:30 AM to meet everyone with some breakfast snacks and coffee.

What is the address?10531 Brightman Blvd, Jacksonville, FL 32246, USA

More info, directions, contact, etc. in your confirmation email.

Where do I park? Parking is in front of the complex and FREE.

How can I see photos from previous CDE Summits? Click here to view pictures from the presentations, the Lion's Den awards, and the Topgolf play.

Do I need to be a good golf player to participate in the games? NO! Whether you’re an aspiring golf pro or picking up a club for the first time, Topgolf is fun for all. And it’s a unique way to share fun time with business friends and partners in a very non-corporate setting. Ditch the boring stuffy conference rooms. Corporate team building events at Topgolf are like nowhere else.


For more pictures from previous CDE Summits at Topgolf, please check out this website.

Event Details
Share on social media