Have you ever wanted to go behind the velvet ropes and have an all access pass to one of those top secret, closed door meetings where key government and private-industry leaders shared their working knowledge of cybersecurity policy developments, the latest technology initiatives being adopted to combat cybersecurity threats and the best practices for managing access to electronic information?