Date and Time | Title | |
---|---|---|
Sep 4, 2025 8:00am - 9:00am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Sep 4, 2025 8:00am - 8:05am (Eastern) | Opening Introductions | |
Sep 4, 2025 9:00am - 9:30am (Eastern) | Atlantic Data Security | As if Shadow AI isn't scary enough... While the prevalence of Shadow AI continues to increase and pose new challenges for security teams, there is a deeper, darker threat hiding within the shadows of the shadows – threatening to undermine and circumvent all of the good work we’re doing to get AI under control. In this session, we’ll look at how these threats have evolved, share examples to illustrate the challenges they pose, and share practices to successfully combat them. | ![]() |
Sep 4, 2025 9:30am - 10:00am (Eastern) | ESET | Securing the Future: Cyber Risk Essentials in an Ai-Driven Digital Landscape As AI reshapes the digital world, cyber threats are growing in scale and complexity. This session explores the essentials of cyber risk insurance—who’s at risk, why coverage matters, and how AI is transforming both the threat landscape and defense strategies. Learn how to leverage AI for proactive protection and align insurance with evolving risks to safeguard your organization. | ![]() |
Sep 4, 2025 10:00am - 10:30am (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Sep 4, 2025 10:30am - 11:00am (Eastern) | Contrast Security | Rebuild Your Software Security Program from the Breach Up Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introduce a new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – that teams can use to stop guessing and start defending. | ![]() |
Sep 4, 2025 11:00am - 11:26am (Eastern) | Hughes | Convergence of Networking and Security As digital infrastructure becomes increasingly complex and interconnected, the traditional boundaries between networking and security are dissolving. This talk explores the foundational principles of security—defining risk, the core triad of confidentiality, integrity, and availability—and how these principles underpin every secure system. We’ll examine the critical role of identity in modern architectures and trace the historical evolution of networking alongside the reactive development of security controls. With this context, the session will delve into the challenges of implementing a true Zero Trust model in today’s dynamic environments, where perimeter-based defenses are no longer sufficient. Finally, we’ll explore how the advent of 5G technology exemplifies the convergence of networking and security, enabling orchestration, automation, and policy enforcement at unprecedented scale and speed. Attendees will leave with a deeper understanding of how integrated approaches are shaping the future of secure, resilient networks. | ![]() |
Sep 4, 2025 11:25am - 12:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Sep 4, 2025 12:00pm - 1:00pm (Eastern) | Keynote | Evolution on the role of CISO in the age of AI | ![]() |
Sep 4, 2025 1:00pm - 1:30pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Sep 4, 2025 1:30pm - 2:00pm (Eastern) | Secure Ideas | Resistance is Futile: How AI Assimilated Custom Exploit Development Most cybersecurity executives think they understand AI’s impact on their threat profile—automated scanners, intelligent reports, enhanced SOC capabilities. They’re missing the real revolution. AI isn’t just automating existing security tools; it’s democratizing custom exploit development that was previously limited to nation-state actors and elite criminal groups. Through a real-world penetration testing case study, this presentation reveals how AI has fundamentally eliminated the technical barriers that have long protected proprietary systems and custom protocols through security through obscurity. More critically, it demonstrates why every “accepted risk” in your risk register that relies on attack complexity as a mitigating factor requires immediate re-evaluation. Attendees will leave with insights for updating their risk frameworks to address a threat landscape where complexity no longer provides meaningful protection. | ![]() |
Sep 4, 2025 2:00pm - 2:30pm (Eastern) | Microsoft | Navigating the Modern Threat Landscape: Key Insights from the Microsoft Digital Defense Report The cyber threat landscape is evolving at an unprecedented pace, driven by the convergence of nation-state and criminal actors, the rise of AI-enabled threats, and the growing sophistication of ransomware and fraud campaigns. This session distills key findings from the Microsoft Digital Defense Report, offering a strategic overview of the most pressing cybersecurity challenges facing organizations today. | ![]() |
Sep 4, 2025 2:30pm - 2:45pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Sep 4, 2025 2:45pm - 3:15pm (Eastern) | Cyberhaven | Securing Data in the GenAI Era Generative AI has ushered in a new era of data creation, processing, and consumption, presenting both innovative opportunities and substantial security risks. The emergence of shadow AI (unauthorized or unmanaged AI tools) and the persistence of dark data (unmonitored and unsecured information) are key challenges in this landscape. Consequently, organizations must adapt their data security strategies. This session explores how modern data security solutions are evolving to address these emerging threats. | ![]() |
Sep 4, 2025 3:15pm - 3:45pm (Eastern) | Centripetal | Cybersecurity using the Ultimate Threat Intelligence | ![]() |
Sep 4, 2025 3:45pm - 4:00pm (Eastern) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
Sep 4, 2025 4:00pm - 5:10pm (Eastern) | Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices" | ![]() |
Sep 4, 2025 5:10pm - 5:20pm (Eastern) | Closing Remarks |