| Date and Time | Title | |
|---|---|---|
| Dec 10, 2025 8:00am - 8:06am (Central) | Opening Introductions | |
| Dec 10, 2025 8:05am - 9:00am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Dec 10, 2025 9:00am - 9:30am (Central) | Nile | The End of Legacy Network Security The End of Legacy Network Security, by Todd Ellison, argues for replacing layered, box‑centric designs with outcome‑driven networks where security is native. It champions “security built‑in, not bolted on” via native Zero Trust at the access layer, per‑device isolation to stop lateral movement, and an integrated, cloud‑driven architecture that operates at “cloud speed,” replacing brittle VLAN/ACL/NAC stacks with an identity‑aware fabric that’s continuously current, observable, and assured. | ![]() |
| Dec 10, 2025 9:30am - 10:00am (Central) | Forescout | Today’s Threat Landscape Requires a Unique Approach Specialized threats targeting OT environments have been around since at least 2010, with the reports of Stuxnet. Recognizing the criticality of these devices, Threat Actors have continued evolving, continuing to target OT devices, many of which are inherently insecure-by-design. Research, such as Vedere Labs’ OT:ICEFALL research project and Project Basecamp by Digital Bond from 10 years ago showed how significant the scope of vulnerable devices are that are pervasive in critical infrastructure systems. Today’s SOC needs to not only see those devices and the risks they pose while also ensuring accurate detection of the threats uniquely targeting those OT environments they’re deployed in. This session will explore this unique threat landscape and the capabilities required to combat the threats and automatically mitigate the risks specially targeting Operational Technology environments. | ![]() |
| Dec 10, 2025 10:00am - 10:30am (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Dec 10, 2025 10:30am - 11:00am (Central) | Contrast Security | Rebuild Your Software Security Program from the Breach Up Current security models are failing to keep up with the speed, complexity, and scale of modern software. Security professionals are doing their jobs—and yet, attacks still get through. In this session, hear the story of four people caught in the aftermath of a breach: a developer, a SecOps lead, an AppSec engineer, and a compliance officer. All working in good faith. All stuck in a broken system. This talk will introducea new blueprint for modern software defense, modeled on the smartest of cities that have instrumented infrastructure to see, adapt, and respond in real time. Walk away with a prescriptive framework – based on context, coordination, and culture – thatteams can use to stop guessing and start defending. | ![]() |
| Dec 10, 2025 10:58am - 11:30am (Central) | IBM | Detect Ransomware Instantly with AI-Powered Infrastructure In a world where ransomware evolves by the minute, the speed of detection is the difference between minor disruption and major loss. Learn how cutting-edge AI models integrated with intelligent storage systems can identify ransomware the moment it strikes, analyzing data in real time as it’s written. Reduce recovery times from days to minutes and gain visibility across your entire IT environment. See how advanced threat detection, automated alerts, and seamless integrations with your existing security tools empower your organization to stay one step ahead of cyber threats. | ![]() |
| Dec 10, 2025 11:30am - 12:00pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Dec 10, 2025 12:00pm - 1:00pm (Central) | Keynote | Warning: Sarcastic Cybersecurity | ![]() |
| Dec 10, 2025 1:00pm - 1:30pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Dec 10, 2025 1:30pm - 2:00pm (Central) | Proofpoint | Generative and Agentic AI: How They’re Reshaping Data Risk Generative and agentic AI are reshaping how data is created, accessed, and distributed across modern environments. As autonomous agents interact with systems and collaborate with users, they introduce new pathways for sensitive-data exposure, privilege expansion, and uncontrolled data propagation. In this session, we’ll cover:
| ![]() |
| Dec 10, 2025 2:00pm - 2:30pm (Central) | Sophos | How to Get Away with Cybercrime We often talk about threats in terms of dollars lost, data stolen, or headlines made. But the real threat lives deeper—in the structure, the strategy, and the growing ambition of the actors behind the screen. Today’s cybercriminals don’t just encrypt files; they build economies, launder, influence, and forge alliances that stretch across borders and industries. In this talk, we’ll peel back the layers of modern cybercrime and explore how loosely affiliated hackers have evolved into organized syndicates. These groups operate more like multinational corporations than rogue disruptors—complete with HR departments, recruitment pipelines, insider relationships, and state protections. | ![]() |
| Dec 10, 2025 2:30pm - 2:50pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Dec 10, 2025 2:50pm - 3:20pm (Central) | Cloudflare | Email at the Center of Workspace Security | ![]() |
| Dec 10, 2025 3:20pm - 3:50pm (Central) | Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Sponsor Networking Time | Chat with our sponsors for the chance to win a $50 Gift Card of your choice! Visit Sponsor Booths - find amazing people, information, and prizes! Get updated on the latest technologies! Chat with our sponsors for the chance to win a $50 Gift Card! Your Choice! All you have to do is have a great conversations with our sponsors and you are automatically entered to win! Drawing winners live! | |
| Dec 10, 2025 3:50pm - 4:50pm (Central) | Panel | Securing the Future: CISO Insights and Industry Leaders Discussing Current Cyber Threats and Strategic Defense Practices | ![]() |
| Dec 10, 2025 5:00pm - 5:10pm (Central) | Closing Remarks |

