Date and Time | Title | |
---|---|---|
Jun 26, 2025 8:00am - 8:05am (Eastern) | Opening Introductions | |
Jun 26, 2025 8:00am - 9:00am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 26, 2025 9:00am - 9:25am (Eastern) | Contrast Security | Rebuild Your Software Security Program from the Breach Up Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. | ![]() |
Jun 26, 2025 9:20am - 10:00am (Eastern) | Needling Worldwide | Shall I Certify You Sir? | ![]() |
Jun 26, 2025 9:45am - 10:30am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 26, 2025 10:30am - 11:00am (Eastern) | Hughes | Convergence of Networking and Security As digital infrastructure becomes increasingly complex and interconnected, the traditional boundaries between networking and security are dissolving. This talk explores the foundational principles of security—defining risk, the core triad of confidentiality, integrity, and availability—and how these principles underpin every secure system. We’ll examine the critical role of identity in modern architectures and trace the historical evolution of networking alongside the reactive development of security controls. With this context, the session will delve into the challenges of implementing a true Zero Trust model in today’s dynamic environments, where perimeter-based defenses are no longer sufficient. Finally, we’ll explore how the advent of 5G technology exemplifies the convergence of networking and security, enabling orchestration, automation, and policy enforcement at unprecedented scale and speed. Attendees will leave with a deeper understanding of how integrated approaches are shaping the future of secure, resilient networks. | ![]() |
Jun 26, 2025 10:55am - 11:30am (Eastern) | Forescout | Today’s Threat Landscape Requires a Unique Approach Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments. | ![]() |
Jun 26, 2025 11:30am - 12:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 26, 2025 12:00pm - 1:00pm (Eastern) | Keynote | Leading with humanity in the era of LLM-driven transformation. | ![]() |
Jun 26, 2025 1:00pm - 1:30pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 26, 2025 1:30pm - 1:52pm (Eastern) | Myriad360 | Ransomware: A Security Reference Architecture We will dive into the increasing threat posed by ransomware and why it’s critical to address this challenge head-on. Myriad360 will explain the value of a Reference Architecture in building a strong defense against these attacks. They will also explore how ransomware tactics are continuously evolving, requiring organizations to stay agile in their security approach. Lastly, they touch on other key factors that should be considered when planning a comprehensive cybersecurity strategy to protect against ransomware and other threats. | ![]() |
Jun 26, 2025 1:50pm - 2:30pm (Eastern) | AccessIT Group | A Governance-Driven Holistic Approach to Cybersecurity Cybersecurity is no longer just a technical issue. It’s a core component of strategic business leadership and organizational resilience that must be embedded into the fabric of enterprise governance. This session explores how a governance-driven, holistic approach to cybersecurity empowers organizations to align security initiatives with business objectives, manage risk proactively, and build resilience across all operational domains. Attendees will gain insights into establishing executive accountability, defining clear roles and responsibilities, and integrating cybersecurity into strategic planning, compliance, and enterprise risk management frameworks. Real-world examples will illustrate how governance frameworks such as NIST CSF, ISO 27001, and CIS Controls can be leveraged not only to enhance security posture but to strengthen organizational decision-making and drive sustainable value. | ![]() |
Jun 26, 2025 2:25pm - 2:45pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 26, 2025 2:45pm - 3:20pm (Eastern) | Seemplicity | Fix What Matters: A Roadmap for CTEM-Driven Remediation Security teams don’t have a visibility problem; they have an action problem. With findings everywhere, the real challenge is knowing what to fix, when, and how to move fast. This session will break down Gartner’s CTEM framework and explore how organizations are using it to prioritize risk, reduce noise, and improve remediation outcomes. Whether you’re just getting started or scaling up, you’ll leave with a clearer understanding of how to make vulnerability & exposure management more focused and effective. | ![]() |
Jun 26, 2025 3:20pm - 3:55pm (Eastern) | 11:11 Systems | Cyber Risk Quantification – A Smarter Approach to Cyber Resilience Understand how Cyber Risk Quantification (CRQ) can help your organization make more informed and cost-effective cyber resilience investments:
| ![]() |
Jun 26, 2025 3:45pm - 4:10pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Jun 26, 2025 4:10pm - 5:05pm (Eastern) | Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices" | ![]() |
Jun 26, 2025 5:00pm - 5:10pm (Eastern) | Closing Remarks |