Agenda

Date and TimeTitle
Jun 26, 2025
8:00am - 8:05am (Eastern)
Opening Introductions
Jun 26, 2025
8:00am - 9:00am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 26, 2025
9:00am - 9:25am (Eastern)
Contrast Security | Rebuild Your Software Security Program from the Breach Up

Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through.
In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system.
This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending.

Jun 26, 2025
9:20am - 10:00am (Eastern)
Needling Worldwide | Shall I Certify You Sir?
Have you been tasked with obtaining a certification for your company?  Which one?  How?  What does this involve?  These questions and more will be answered so that you can gain support from your company and know which standard/frameworks are right for you.
Jun 26, 2025
9:45am - 10:30am (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 26, 2025
10:30am - 11:00am (Eastern)
Hughes | Convergence of Networking and Security

As digital infrastructure becomes increasingly complex and interconnected, the traditional boundaries between networking and security are dissolving. This talk explores the foundational principles of security—defining risk, the core triad of confidentiality, integrity, and availability—and how these principles underpin every secure system. We’ll examine the critical role of identity in modern architectures and trace the historical evolution of networking alongside the reactive development of security controls.

With this context, the session will delve into the challenges of implementing a true Zero Trust model in today’s dynamic environments, where perimeter-based defenses are no longer sufficient. Finally, we’ll explore how the advent of 5G technology exemplifies the convergence of networking and security, enabling orchestration, automation, and policy enforcement at unprecedented scale and speed. Attendees will leave with a deeper understanding of how integrated approaches are shaping the future of secure, resilient networks.

Jun 26, 2025
10:55am - 11:30am (Eastern)
Forescout | Today’s Threat Landscape Requires a Unique Approach

Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments.

Jun 26, 2025
11:30am - 12:00pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 26, 2025
12:00pm - 1:00pm (Eastern)
Keynote | Leading with humanity in the era of LLM-driven transformation.
Jun 26, 2025
1:00pm - 1:30pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 26, 2025
1:30pm - 1:52pm (Eastern)
Myriad360 | Ransomware: A Security Reference Architecture

We will dive into the increasing threat posed by ransomware and why it’s critical to address this challenge head-on. Myriad360 will explain the value of a Reference Architecture in building a strong defense against these attacks. They will also explore how ransomware tactics are continuously evolving, requiring organizations to stay agile in their security approach. Lastly, they touch on other key factors that should be considered when planning a comprehensive cybersecurity strategy to protect against ransomware and other threats.

Jun 26, 2025
1:50pm - 2:30pm (Eastern)
AccessIT Group | A Governance-Driven Holistic Approach to Cybersecurity

Cybersecurity is no longer just a technical issue. It’s a core component of strategic business leadership and organizational resilience that must be embedded into the fabric of enterprise governance. This session explores how a governance-driven, holistic approach to cybersecurity empowers organizations to align security initiatives with business objectives, manage risk proactively, and build resilience across all operational domains.

Attendees will gain insights into establishing executive accountability, defining clear roles and responsibilities, and integrating cybersecurity into strategic planning, compliance, and enterprise risk management frameworks. Real-world examples will illustrate how governance frameworks such as NIST CSF, ISO 27001, and CIS Controls can be leveraged not only to enhance security posture but to strengthen organizational decision-making and drive sustainable value.

Jun 26, 2025
2:25pm - 2:45pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 26, 2025
2:45pm - 3:20pm (Eastern)
Seemplicity | Fix What Matters: A Roadmap for CTEM-Driven Remediation

Security teams don’t have a visibility problem; they have an action problem. With findings everywhere, the real challenge is knowing what to fix, when, and how to move fast. This session will break down Gartner’s CTEM framework and explore how organizations are using it to prioritize risk, reduce noise, and improve remediation outcomes. Whether you’re just getting started or scaling up, you’ll leave with a clearer understanding of how to make vulnerability & exposure  management more focused and effective.

Jun 26, 2025
3:20pm - 3:55pm (Eastern)
11:11 Systems | Cyber Risk Quantification – A Smarter Approach to Cyber Resilience
Understand how Cyber Risk Quantification (CRQ) can help your organization make more informed and cost-effective cyber resilience investments:
  • Optimizes Investments (ensures spending is aligned with the highest cyber risk areas)
  • Supports Compliance and Insurance Needs (provides defensible metrics for compliance and cyber insurance)
  • Enhances Executive-Level Communications (translate cybersecurity into business terms executives understand)
Jun 26, 2025
3:45pm - 4:10pm (Eastern)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Jun 26, 2025
4:10pm - 5:05pm (Eastern)
Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Jun 26, 2025
5:00pm - 5:10pm (Eastern)
Closing Remarks