Date and Time | Title | |
---|---|---|
May 15, 2025 8:00am - 8:05am (Pacific) | Opening Introductions | |
May 15, 2025 8:00am - 9:00am (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 15, 2025 9:00am - 9:30am (Pacific) | LMNTRIX | SOC Strategies to Detect Earlier and Respond Faster | ![]() |
May 15, 2025 9:30am - 10:00am (Pacific) | ESET | Securing the Future of Cybersecurity Protection: Essentials in an AI-Driven Digital Landscape | ![]() |
May 15, 2025 10:00am - 10:30am (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 15, 2025 10:30am - 10:55am (Pacific) | Forescout | The Current Threat Landscape Requires a Unique Approach As the current threat landscape continues to evolve, we have learned a lot of hard lessons across the cybersecurity industry. This session will study the intersection of risks and threats while studying a collection of examples of high-profile security breaches in the last 3 years. The sophistication and persistence of threat actors and the successes they have had calls for a different approach, one that addresses mitigation of both risks and threats. Finally, we will conclude with an in-depth case study of a recent breach to see how this unique approach could have mitigated the attack. | ![]() |
May 15, 2025 10:55am - 11:15am (Pacific) | Contrast Security | Rethinking Cybersecurity for Covert Application Risks Application and API security are stuck in a spin cycle that AI can’t save. The prevailing approach relies on developers to fix vulnerabilities while holding SecOps teams accountable for breaches, creating an unsustainable dynamic. It’s time to rethink the strategy: by detecting and responding to both attacks and vulnerabilities directly in production. Join us to see how you can evolve your security program with Application Detection and Response (ADR) to achieve more effective, efficient security. | ![]() |
May 15, 2025 11:15am - 12:00pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 15, 2025 12:00pm - 12:55pm (Pacific) | Keynote | Fundamentals - Distressingly Overlooked As new threats dominate headlines, the quiet killers of cybersecurity programs remain the same: missing basics, misunderstood risk, and poorly planned resilience. David Elfering challenges the audience to rethink what true security maturity looks like. From passive risk retention to outcome-driven protection strategies, this session highlights why fundamentals — not flashy controls — are the foundation for surviving tomorrow’s inevitable disruptions. | ![]() |
May 15, 2025 12:55pm - 1:30pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 15, 2025 1:30pm - 2:00pm (Pacific) | Strac | Data Security in a SaaS, Cloud and Gen AI Era: Lessons Learnt and Best Practices for CISOs and Security Practitioners | ![]() |
May 15, 2025 2:00pm - 2:30pm (Pacific) | Cloudflare | You Had One Job: A K.I.S.S. Guide to Security That Doesn’t Suck In 2024, attackers didn’t need phishing emails to compromise enterprises; they just waited for the latest zero-day in your firewall to be weaponized. Mandiant’s M-Trends 2025 report reveals that most intrusions now start with exploited vulnerabilities in edge security devices. Meanwhile, credentials are stolen by malware faster than MFA can save you, and security vendors themselves are being turned into initial access brokers…unintentionally. This talk is a call to get back to basics. We’ll walk through the top 10 ways organizations are still failing at foundational security, and provide a clear, no-nonsense roadmap for how to fix it. Aligned to NIST, PCI DSS, and C2M2 frameworks, this approach avoids complexity, avoids buzzwords, and avoids blaming users. You don’t need another vendor: you need to configure what you already have properly, document it, and follow through. Because at the end of the day, no one wants to explain to leadership how your “security box” was the reason you got owned. | ![]() |
May 15, 2025 2:30pm - 2:50pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 15, 2025 2:50pm - 3:25pm (Pacific) | Fastly | Every APP & API Needs DDoS Protection The escalating sophistication and scale of Distributed Denial-of-Service (DDoS) attacks pose a significant threat to online services. Traditional, centralized security approaches often struggle to keep pace with these evolving threats, leading to service disruptions and financial losses. This presentation will explore the critical need for a modern, multi-layered DDoS defense strategy. We will delve into the limitations of legacy systems and examine the advantages of distributed mitigation techniques, focusing on real-time anomaly detection, intelligent traffic filtering, and protocol scrubbing. By emphasizing the importance of a flexible and adaptable security posture, this session will provide an overview of best practices for safeguarding online infrastructure against the growing tide of DDoS attacks, highlighting the necessity of scalable, geographically distributed solutions for robust protection. | ![]() |
May 15, 2025 3:15pm - 3:45pm (Pacific) | Axonius | Breaking Down Silos: Unify Assets, Minimize Attack Exposure In today’s rapidly evolving security landscape, organizations face the challenge of managing a wide array of tools across endpoints, identities, and networks. While each tool serves a critical purpose, they often operate in isolation, creating silos that obscure visibility and expose vulnerabilities. This session will address how the fragmentation of security systems and data increases attack surfaces and how integrating a unified cyber asset management approach can significantly reduce attack exposure. Join us as we explore how security professionals can move beyond disconnected tools to leverage a single, comprehensive view of their assets and threat exposures. We’ll highlight practical steps and present a preview of an end-to-end solution designed to break down silos, provide full cyber asset visibility, and enable a more holistic approach to minimizing security risks. As technology continues to evolve, managing disparate security systems will remain a pressing challenge. This session will offer actionable insights to security professionals looking to streamline their approach and safeguard their organizations from the growing complexities of cyber threats. | ![]() |
May 15, 2025 3:45pm - 4:10pm (Pacific) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
May 15, 2025 4:00pm - 5:00pm (Pacific) | Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices" | ![]() |
May 15, 2025 5:00pm - 5:15pm (Pacific) | Closing Remarks |