Agenda

Date and TimeTitle
Aug 14, 2025
8:00am - 9:00am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Aug 14, 2025
8:00am - 8:06am (Central)
Opening Introductions
Aug 14, 2025
9:00am - 9:30am (Central)
Nile | Is AI the Answer to Solving Network Complexity?

AI is being touted as the solution to modern networking challenges—promising to simplify operations, improve security, and ease the burden on IT teams. With networks growing more complex than ever, the appeal of AI-driven automation is undeniable. But can AI truly solve the underlying problems, or is it just addressing symptoms? In this presentation, we’ll explore the evolution of network complexity, why traditional architectures are so difficult to manage, and how AI is being applied to address these challenges. We’ll examine the reality behind AI’s promises and whether it can finally deliver the simplicity and efficiency network operators have been chasing for decades. Is AI the breakthrough we’ve been waiting for, or is there something deeper at play? Let’s find out!

Aug 14, 2025
9:30am - 10:00am (Central)
IP Pathways | From Spam to Sophistication: How Email Threats Evolved with Phishing-as-a-Service

Since the mid-1990s, phishing has evolved into a foundational attack method and remains one of the most common cybersecurity threats organizations face today. It’s also become a key focus of employee training programs across industries. In this session, we’ll explore the history of email security, trace how phishing techniques have adapted over time, and take a closer look at the emerging threat of Phishing-as-a-Service (PhaaS)—a new, scalable model that’s lowering the barrier to entry for cybercriminals.

Aug 14, 2025
10:00am - 10:30am (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Aug 14, 2025
10:30am - 11:00am (Central)
RiskRecon | Taking A Data-First Approach to Cyber Risk Management

Cyber Risk Management has evolved. Every new vulnerability or regulation adds further pressures on already stretched teams to predict and manage the weakest links within your internal IT infrastructure. Piling on to today’s cyber risk landscape is the ever-expanding digital supply chain, and the need to onboard, assess, and monitor third parties, fourth parties, and Nth parties.

But does it really have to be that way?

Join this session from Mastercard Cybersecurity for an exclusive presentation on how a proactive “data-first” approach to cyber risk management can help you:

  • Improve monitoring for critical vulnerabilities to determine which ones really matter
  • Identify, Prioritize and Assess affected third parties in real-time
  • Leverage objective risk data into the decision-making processes
  • Streamline workflows and scale your operations
Aug 14, 2025
11:00am - 11:30am (Central)
Contrast Security | From Blind Spots to Clarity: The Case for Runtime Security
Modern application development and deployment have outpaced the capabilities of traditional security solutions. While Web Application Firewalls (WAFs) and Endpoint Detection and Response (EDR) platforms provide a critical layer of defense, they often lack the deep, contextual visibility needed to stop sophisticated, application-layer attacks. In this session, we’ll make the case for a new approach: runtime security through software instrumentation, and share real-world research, demonstrating how runtime security fills the gaps left by WAFs and EDRs. By embedding lightweight security sensors directly into the application, you  gain unparalleled visibility into its internal behavior, data flows, and dependencies. This “inside-out” perspective allows for highly accurate, real-time threat detection and prevention without relying on signatures or external traffic analysis. 
Aug 14, 2025
11:30am - 12:00pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Aug 14, 2025
12:00pm - 1:00pm (Central)
Keynote | Recalibrate Your Thinking: Overcoming Bias to Build Proactive, Trust-Centered Security Programs

Security decisions aren’t made in a vacuum — they’re often shaped by mental shortcuts, outdated assumptions, and pressure to act fast. Cognitive biases like anchoring, availability, and confirmation bias often sneak into risk assessments, leading to reactive strategies, overemphasis on headline threats, or clinging to legacy controls.

This session will dive into how we can break free from “we’ve always done it this way” thinking and steer their programs with greater clarity and impact. We’ll explore how common decision-making traps surface in the real world and how they quietly shape policy, control choices, and impact standard work. By taking a fresh lens on how bias affects your program’s security posture, we’ll discuss tactics to shift from a reactive to proactive strategy through practical methods that leverage data to build a trust-aligned program that scale.

Whether you’re maturing a SOC, leading cloud transformation, securely enabling artificial intelligence efforts, or maturing your zero-trust roadmap, this session will equip you with tools to spot hidden biases — and replace them with stronger, clearer judgment.

Aug 14, 2025
1:00pm - 1:30pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Aug 14, 2025
1:30pm - 2:00pm (Central)
SOPHOS | How to Get Away with Cybercrime

We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections.

Aug 14, 2025
2:00pm - 2:30pm (Central)
Menlo Security | Workspace Security: Are you Ready?

The modern workspace is increasingly reliant on cloud-based applications, browser-first access, and AI integration, and faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks, leading to data breaches and operational disruptions. This session will critically examine these gaps – network, identity, endpoint, and cloud security – and demonstrate how a fundamental shift in security focus towards the browser is required.

Aug 14, 2025
2:15pm - 2:40pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Aug 14, 2025
2:40pm - 3:10pm (Central)
LMNTRIX | Cyber Defense Strategies: For Earlier Detection and Faster Response

Despite all the tools, talent, and investment, breaches still happen – often to organizations doing all the “right” things. In this session, Rishi Joshee from LMNTRIX shares 10 practical strategies for building (or rebuilding) a modern SOC that helps reduce risk.

Drawing from real-world experience, you’ll learn how to cut through alert noise, detect threats faster, automate where it matters, and structure your team for long-term resilience. It’s a practical, honest look at what works, what doesn’t, and why running a SOC today is equal parts strategy, technology, and controlled chaos.

Aug 14, 2025
3:05pm - 3:25pm (Central)
ColorTokens | Be Breach Ready

In today’s threat landscape, breaches are no longer rare events—they’re a reality. While preventing every intrusion is unrealistic, limiting its impact is achievable. This session explores how microsegmentation serves as a foundational control in implementing Zero Trust, helping organizations contain attacks and maintain business continuity.

Microsegmentation enables security teams to isolate workloads, users, and devices by creating fine-grained security zones across IT, IoT, and OT environments. When applied correctly, it prevents unauthorized lateral movement and reduces the blast radius of cyberattacks—especially crucial in hybrid and legacy infrastructures.

Aug 14, 2025
3:25pm - 3:50pm (Central)
Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice!

Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies!

Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live!

Aug 14, 2025
3:50pm - 4:50pm (Central)
Panel | "Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices"
Aug 14, 2025
5:00pm - 5:10pm (Central)
Closing Remarks