| Date and Time | Title | |
|---|---|---|
| Dec 4, 2025 9:00am - 9:46am (Eastern) | [Opening Keynote ] Lessons from the Trenches: Frontline Intelligence on Today's Most Dangerous Threats In today’s adversarial landscape, security teams are constantly playing catch-up against sophisticated, well-resourced attackers. Josh Iroko, a Managing Security Consultant with Mandiant, is on the frontlines of these battles, helping global organizations respond to their most critical breaches and transforming their security programs. In this high-impact keynote, Mr. Iroko will share proprietary, real-world intelligence gleaned from Mandiant’s recent, high-profile incident response and strategic consulting engagements. He will move beyond mere headlines to unpack the current Tactics, Techniques, and Procedures (TTPs) that define modern attacks, including:
This session offers a rare opportunity to gain insights from one of the world’s leading incident response firms, equipping you with the knowledge needed to prepare for, and survive, the next major attack. | ![]() |
| Dec 4, 2025 10:00am - 10:35am (Eastern) | The Five People You Meet in Cybersecurity Cybersecurity isn’t just about systems—it’s about people. Inspired by The Five People You Meet in Heaven by Mitch Albom, this talk uses storytelling and lived experience to reveal five personas you’re likely to meet on the path to cyber transformation: from the under-resourced IT leader to the recently breached, the skeptic exec to the inspired keener, and the vulnerable populations most at risk. Amy Yee blends empathy, strategy, and systemic insight to reframe how we see our roles—and each other—in this high-stakes, human-centered field. | ![]() |
| Dec 4, 2025 10:00am - 10:38am (Eastern) | Cyber Behavioral Profiling | ![]() |
| Dec 4, 2025 10:00am - 10:42am (Eastern) | From Shadow IT to Shadow AI: Securing Data in the Age of Unsanctioned Intelligence As generative AI adoption accelerates, a new risk emerges: Shadow AI. Just like Shadow IT before it, unsanctioned AI tools are quietly accessing sensitive data, often without visibility or control from security teams. Join us to learn how Proofpoint is redefining data security with a unified, AI-aware platform that helps you discover where sensitive data resides, understand who’s using it, and prevent exposure through unauthorized AI applications. In this session, you’ll learn:
| ![]() |
| Dec 4, 2025 10:00am - 10:45am (Eastern) | AI-Assisted SDLC: Rapid Prototyping for Security Engineering The age-old complaint in security engineering is that “big ideas die in the backlog.” Lengthy discovery, design, and coding cycles smother urgency—especially when threats are evolving faster than releases. Enter AI-first development, where language models collapse friction at every step of the SDLC and let small teams translate concept into running code in hours, not quarters.
This talk tells the inside story of how we built a working Al Assisted Alert Agent & an Insider Threat & Fraud Detection module in a couple afternoons—then generalized the method into a repeatable playbook any security team can copy.
Highlights include:
| ![]() |
| Dec 4, 2025 11:00am - 11:35am (Eastern) | The Rise of Digital Ghosts: Managing Machines Before They Manage You As organizations embrace automation, APIs, and AI-driven workflows, a new class of identities has quietly emerged—the non-human identities. These include machine agents, service accounts, bots, and API keys that carry out essential tasks but frequently function outside of conventional governance frameworks. Identifying, controlling, and safeguarding these digital “ghosts” before they become a blind spot in your security and compliance systems is the focus of this webinar. Participants will get an understanding through practical examples of how to apply GRC and privacy principles to machine identities, incorporate them into frameworks that correspond with ISO 27001/42001, and mitigate the risks associated with uncontrolled automation. | ![]() |
| Dec 4, 2025 11:00am - 11:50am (Eastern) | What's Up? Hot Topics and Recent Headlines in Privacy, Cyber, and AI Join us for a lively and engaging session that cuts through the noise of today’s privacy, cybersecurity, and artificial intelligence news. In this fast-paced presentation, we’ll dive into ten of the most significant and talked-about headlines, exploring the real-world legal and compliance implications for your business.
Our host will put an entertaining and perhaps comical spin on these headlines, framing complex issues in a way that’s a little more light-hearted. Then, our special guest will test their knowledge, attempting to identify each headline and provide a breakdown of why it matters—or why it doesn’t—for your organization. Get ready to sort through the hype and walk away with a clear understanding of the developments you need to know about right now. | ![]() |
| Dec 4, 2025 11:00am - 11:45am (Eastern) | Frame by Frame: Deepfakes in the Wild and in Court This presentation treats deepfakes as a dual problem: first, scalable social-engineering for fraud and extortion, second, evidentiary trust and admissibility. We outline an operational triage for scams and a forensic pipeline for courtroom authentication. On the technical side, we interrogate video at three layers: container metadata, codec bitstream, and sensor. For HEVC (H.265) we examine GOP layout and I/P/B distributions in contrast to AI Generated Images. AI-generated sequences are profiled for temporal inconsistencies, mouth-eye desynchrony, lighting and specular drift, unstable motion-vector fields relative to content, and atypical of camera originals. The goal is for a playbook for rapid scam mitigation and a repeatable, tool-logged, frame-by-frame method to either authenticate legitimate HEVC captures or challenge AI-assisted fabrications in court. We also cover tools and methodology used in deepfakes. | ![]() |
| Dec 4, 2025 11:00am - 11:39am (Eastern) | [Panel] The Rise of Zero-Touch Compliance: Automating Your Way Out of Audit Fear The future of compliance isn’t about more headcount; it’s about zero-touch automation. This session brings together legal and technology experts to discuss how organizations can leverage modern IT automation platforms to achieve and maintain compliance effortlessly. Panelists will address critical questions like: How does automated proof of remediation change the auditor-IT relationship? and What is the legal perspective on trusting automated compliance evidence? Discover how shifting from manual oversight to automated enforcement dramatically reduces risk and transforms compliance from an operational burden into a competitive advantage. | ![]() |
| Dec 4, 2025 12:00pm - 12:38pm (Eastern) | A Practical Guide to Data Protection for Enterprise AI Adoption As enterprises embrace the limitless possibilities of AI, we security professionals need to adapt to safeguard sensitive data. In this talk, we’ll unpack a few real-world patterns of how data leaks into or out of AI systems and offer a simple framework for threat-modeling enterprise AI usage without slowing down innovation. | ![]() |
| Dec 4, 2025 12:00pm - 12:45pm (Eastern) | Leadership Excellence: Strategies to Enhance Productivity, Performance, and Collaboration In today’s dynamic and diverse workplace, effective leadership requires more than just strategic thinking; it demands emotional intelligence, active listening, and the ability to inspire trust and collaboration. Leadership Excellence is a high-impact session designed to help leaders elevate performance while fostering a culture of belonging, collaboration, and well-being. This engaging presentation equips professionals with actionable strategies to lead with clarity, connection, and confidence. Participants will explore a proven framework for listening beyond words, building trust across teams, managing conflict with empathy, and driving meaningful results, without sacrificing their own health or values. Grounded in real-world application and supported by research, this session empowers leaders to balance professional excellence with personal well-being. Attendees will walk away with tools to minimize burnout, improve collaboration, and create psychologically safe environments where individuals and ideas thrive. Through interactive exercises, real-time feedback, and practical takeaways, participants will learn how to become the kind of leader who energizes people, unites diverse perspectives, and delivers consistent results. Whether you’re an executive, team lead, or rising professional, this session offers a blueprint for sustainable success and impactful leadership. | ![]() |
| Dec 4, 2025 12:00pm - 12:48pm (Eastern) | Maximizing Data Security ROI: Turn Managed Services into a Strategic Advantage Data security is no longer just a cost center—it’s a driver of business value. Join Cyera’s experts for a thought-provoking discussion on how managed services can help organizations maximize ROI by improving compliance, reducing risk, and enabling scalability. | ![]() |
| Dec 4, 2025 12:00pm - 12:49pm (Eastern) | [Panel] The Current Threat Landscape The threat landscape is constantly evolving, with new and sophisticated attacks emerging daily. This expert panel provides critical insights into the latest cyber threats, equipping you with the knowledge and strategies to defend your organization. | ![]() |
| Dec 4, 2025 1:00pm - 1:58pm (Eastern) | The Last Human Advantage: How Persuasion, Trust, and Influence Win Budget and the Battle for Security Hackers don’t just exploit code, they exploit people. They use Cialdini-grade persuasion, authority cues, urgency, and trust triggers to get humans to click, comply, and reveal. In this provocative and practical session, former Fortune-1 cybersecurity and privacy executive Anthony Martin turns that playbook inside out—showing security leaders how to ethically apply those same influence principles to drive results in the boardroom instead of the inbox. Attendees will learn why persuasion works at a neural level, how to translate “attacker psychology” into ethical communication, and how to use those levers to win budget, accelerate adoption, and build departmental trust. Whether you’re a rising manager or a CISO in waiting, this session will give you the science-backed techniques to sell your strategy, earn executive confidence, and move the needle on both your program and your career. Key take-aways:
| ![]() |
| Dec 4, 2025 1:00pm - 1:55pm (Eastern) | The Data War Has Begun: Winning at the Intersection of Cybersecurity, Cloud, and AI We are living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how data is created, accessed, manipulated, and weaponized. In this new era, your most valuable asset—your data—is under constant threat, not just from cybercriminals, but from your own infrastructure decisions. In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots organizations face as they race to adopt AI and migrate to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional defenses, how AI is both a weapon and a shield, and why the cloud isn’t inherently secure—unless you make it so. Whether you’re a CEO, CISO, or business leader, this session will empower you with actionable frameworks to:
The convergence is already here. The question is, are you leading with confidence, or reacting with chaos? | ![]() |
| Dec 4, 2025 1:00pm - 1:48pm (Eastern) | Cyber Intel Briefing In an increasingly volatile world, this session offers a critical debrief on the most pressing global issues and their direct impact on organizational strategy and resilience. The talk will cover significant geopolitical developments, from shifting international power dynamics to the complex relationship between global events and digital security. It will also explore the dramatic changes in data privacy regulations driven by the rise of artificial intelligence, highlighting the new compliance and ethical responsibilities for all leaders. Finally, the presentation will provide a strategic framework for building resilience against modern threats, from digital attacks to supply chain disruptions. As we wrap up 2025 and start to think about 2026, attendees will leave with a clear understanding of the evolving landscape and a proactive plan to secure their operations in the year ahead. | ![]() |
| Dec 4, 2025 1:00pm - 1:50pm (Eastern) | Ransomware: A Left of Boom Story Ransomware isn’t an instantaneous event—it’s a multi-stage campaign, whether opportunistic or highly targeted. These critical, pre-deployment phases offer a window of opportunity for prevention, detection, and defense. In this presentation, we will dissect the stages leading up to the ransomware payload. We’ll share real-world examples from the Huntress SOC and our threat hunters and provide ways your organization can boost resilience against ransomware attacks. | ![]() |
| Dec 4, 2025 2:00pm - 2:48pm (Eastern) | [Closing Keynote] Zero Trust and AI: Strengthening Security, Reducing Complexity, and Driving Innovation Businesses stand to benefit from AI in unprecedented ways, but only if IT and security leaders overcome transformation challenges. This includes implementing a modern zero trust architecture to protect data and users, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based approach to security ensures CIOs and CISOs deliver a secure, phased transformation. Join this session to:
| ![]() |

