Frequently Asked Questions

What is Hexnode Partner Summit?

The Hexnode Partner Summit is Hexnode’s annual partner event where all our reseller, distributor and technology partners come together to share ideas and create new experiences.

When is Hexnode Partner Summit happening?

Hexnode Partner Summit 2022 will be held on April 21, 2022.

Is it held virtually or in-person?

Keeping the safety of our partners and the Hexnode team in mind, the event will continue to be held virtually.

What is the cost of attending?

Hexnode partner summit 2022 is free to attend for our partners.

Where can I access the agenda?

The agenda will be updated as all the speakers are confirmed. The topics are selected as close to the date of the event as possible to ensure relevance.

I did not receive a confirmation email after registering

All registrations go through a validation process to ensure authenticity. Contact for any queries.

I have more questions

Contact the events team at or the partner team at

Zero Trust Approach to Cybersecurity

Still on the fence about Zero Trust Approach? Don McLean dives into the fundamentals of Zero Trust Approach, the problems it solves and why it is a topic of relevance.

Help us get to know you a little better

Please enter the six-digit code you received at
Haven't received the OTP? Resend

Featured Speakers

Don Maclean

Chief Cybersecurity Technologist

DLT Solutions

Certified as a Forrester Zero Trust eXtended (ZTX) Strategist, Don Maclean currently serves as DLT’s Chief Cybersecurity Technologist. A recipient of the FedScoop 50 award and ICIT Fellow, Mr. Maclean’s duties include formulating and executing cybersecurity portfolio strategy, speaking and writing on security topics, and socializing DLT’s cybersecurity offerings. In this capacity, Mr. Maclean also advises CEOs on Federal go-to-market strategies for cybersecurity products. Before joining DLT in 2015, Mr. Maclean ran security programs for U.S. Federal agencies, including DOJ, DOL, FAA, FBI, and Treasury. This experience allowed him to observe the strengths and limitations of traditional cybersecurity defenses.