| Date and Time | Title | |
|---|---|---|
| Sep 25, 2025 8:00am - 9:00am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Sep 25, 2025 8:00am - 8:06am (Central) | Opening Introductions | |
| Sep 25, 2025 9:00am - 9:30am (Central) | FRSecure | AI’s Influence on Cybersecurity and How to Prepare | ![]() |
| Sep 25, 2025 9:30am - 10:00am (Central) | Forescout | The Current Threat Landscape Requires a Unique Approach As the current threat landscape continues to evolve, we have learned a lot of hard lessons across the cybersecurity industry. This session will study the intersection of risks and threats while studying a collection of examples of high-profile security breaches in the last 3 years. The sophistication and persistence of threat actors and the successes they have had calls for a different approach, one that addresses mitigation of both risks and threats. Finally, we will conclude with an in-depth case study of a recent breach to see how this unique approach could have mitigated the attack
| ![]() |
| Sep 25, 2025 10:00am - 10:30am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Sep 25, 2025 10:30am - 11:00am (Central) | IP Pathways | From Spam to Sophistication: How Email Threats Evolved with Phishing-as-a-Service Since the mid-1990s, phishing has evolved into a foundational attack method and remains one of the most common cybersecurity threats organizations face today. It’s also become a key focus of employee training programs across industries. In this session, we’ll explore the history of email security, trace how phishing techniques have adapted over time, and take a closer look at the emerging threat of Phishing-as-a-Service (PhaaS) — a new, scalable model that’s lowering the barrier to entry for cybercriminals. | ![]() |
| Sep 25, 2025 11:00am - 11:30am (Central) | Contrast Security | Shift Show: Why Our Best Intentions in AppSec Are Failing As the current threat landscape continues to evolve, we have learned a lot of hard lessons across the cybersecurity industry. This session will study the intersection of risks and threats while studying a collection of examples of high-profile security breaches in the last 3 years. The sophistication and persistence of threat actors and the successes they have had calls for a different approach, one that addresses mitigation of both risks and threats. Finally, we will conclude with an in-depth case study of a recent breach to see how this unique approach could have mitigated the attack | ![]() |
| Sep 25, 2025 11:30am - 12:00pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Sep 25, 2025 12:00pm - 12:55pm (Central) | Keynote | Recalibrate Your Thinking: Overcoming Bias to Build Proactive, Trust-Centered Security Programs Security decisions aren’t made in a vacuum — they’re often shaped by mental shortcuts, outdated assumptions, and pressure to act fast. Cognitive biases like anchoring, availability, and confirmation bias often sneak into risk assessments, leading to reactive strategies, overemphasis on headline threats, or clinging to legacy controls. This session will dive into how we can break free from “we’ve always done it this way” thinking and steer their programs with greater clarity and impact. We’ll explore how common decision-making traps surface in the real world and how they quietly shape policy, control choices, and impact standard work. By taking a fresh lens on how bias affects your program’s security posture, we’ll discuss tactics to shift from a reactive to proactive strategy through practical methods that leverage data to build a trust-aligned program that scale. Whether you’re maturing a SOC, leading cloud transformation, securely enabling artificial intelligence efforts, or maturing your zero-trust roadmap, this session will equip you with tools to spot hidden biases — and replace them with stronger, clearer judgment. | ![]() |
| Sep 25, 2025 12:55pm - 1:30pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Sep 25, 2025 1:30pm - 1:55pm (Central) | Sophos | How to Get Away with Cybercrime We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections. | ![]() |
| Sep 25, 2025 1:55pm - 2:25pm (Central) | Sterling | Identity Is Necessary—AI‑Native Defenses Are Next From roles to real‑time policy, trust layers, and AI‑driven detection AI and large language models are transforming how organizations operate—and how attackers exploit new gaps. Traditional identity and Zero Trust controls remain essential, but they’re not enough for AI‑driven workflows. This session introduces three emerging defense patterns designed for the AI era: adding a trust layer to monitor and govern model interactions, enabling security operations to detect and respond to AI‑specific threats, and securing the AI supply chain to maintain integrity and resilience. We’ll connect these patterns to leading risk frameworks and conclude with a practical decision aid and clear next steps for securing your organization. | ![]() |
| Sep 25, 2025 2:25pm - 2:45pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Sep 25, 2025 2:45pm - 3:15pm (Central) | LMNTRIX | Cyber Defense Strategies For Earlier Detection and Faster Response | ![]() |
| Sep 25, 2025 3:15pm - 3:40pm (Central) | Colortokens | Be Breach Ready In today’s threat landscape, breaches are no longer rare events—they’re a reality. While preventing every intrusion is unrealistic, limiting its impact is achievable. This session explores how microsegmentation serves as a foundational control in implementing Zero Trust, helping organizations contain attacks and maintain business continuity. Microsegmentation enables security teams to isolate workloads, users, and devices by creating fine-grained security zones across IT, IoT, and OT environments. When applied correctly, it prevents unauthorized lateral movement and reduces the blast radius of cyberattacks—especially crucial in hybrid and legacy infrastructures. | ![]() |
| Sep 25, 2025 3:40pm - 4:00pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Sep 25, 2025 4:00pm - 5:00pm (Central) | Panel | Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices | ![]() |
| Sep 25, 2025 5:00pm - 5:15pm (Central) | Closing Remarks |

