Agenda

Date and TimeTitle
Dec 4, 2025
9:00am - 9:46am (Eastern)
[Opening Keynote ] Lessons from the Trenches: Frontline Intelligence on Today's Most Dangerous Threats

In today’s adversarial landscape, security teams are constantly playing catch-up against sophisticated, well-resourced attackers. Josh Iroko, a Managing Security Consultant with Mandiant, is on the frontlines of these battles, helping global organizations respond to their most critical breaches and transforming their security programs.

In this high-impact keynote, Mr. Iroko will share proprietary, real-world intelligence gleaned from Mandiant’s recent, high-profile incident response and strategic consulting engagements. He will move beyond mere headlines to unpack the current Tactics, Techniques, and Procedures (TTPs) that define modern attacks, including:

  • The New Initial Access: Analyzing the most effective entry points currently being exploited, from supply chain weaknesses to zero-day vulnerabilities in cloud infrastructure.
  • Post-Compromise Behavior: Detailing how threat actors—be they financially motivated or nation-state groups—escalate privileges, maintain persistence, and exfiltrate data after the initial breach, with a specific focus on challenges in hybrid and cloud-native environments.
  • Strategic Imperatives: Translating these frontline observations into actionable strategies for security leaders and practitioners. Attendees will learn how to shift their posture from purely reactive defense to an intelligence-led, proactive cyber resilience model that is proven to reduce the impact and duration of a compromise.

This session offers a rare opportunity to gain insights from one of the world’s leading incident response firms, equipping you with the knowledge needed to prepare for, and survive, the next major attack.

Dec 4, 2025
10:00am - 10:35am (Eastern)
The Five People You Meet in Cybersecurity

Cybersecurity isn’t just about systems—it’s about people. Inspired by The Five People You Meet in Heaven by Mitch Albom, this talk uses storytelling and lived experience to reveal five personas you’re likely to meet on the path to cyber transformation: from the under-resourced IT leader to the recently breached, the skeptic exec to the inspired keener, and the vulnerable populations most at risk. Amy Yee blends empathy, strategy, and systemic insight to reframe how we see our roles—and each other—in this high-stakes, human-centered field.

Dec 4, 2025
10:00am - 10:38am (Eastern)
Cyber Behavioral Profiling
Dec 4, 2025
10:00am - 10:42am (Eastern)
From Shadow IT to Shadow AI: Securing Data in the Age of Unsanctioned Intelligence

As generative AI adoption accelerates, a new risk emerges: Shadow AI. Just like Shadow IT before it, unsanctioned AI tools are quietly accessing sensitive data, often without visibility or control from security teams.

Join us to learn how Proofpoint is redefining data security with a unified, AI-aware platform that helps you discover where sensitive data resides, understand who’s using it, and prevent exposure through unauthorized AI applications.

In this session, you’ll learn:

  • How Shadow AI is reshaping the data-security landscape
  • Why traditional DLP falls short in today’s AI-driven world
  • How Proofpoint delivers visibility and control over unsanctioned AI use
  • How prebuilt policies and automated controls prevent data violations and govern access
  • Real-world examples of how organizations are securing data across hybrid workspaces
Dec 4, 2025
10:00am - 10:45am (Eastern)
AI-Assisted SDLC: Rapid Prototyping for Security Engineering
The age-old complaint in security engineering is that “big ideas die in the backlog.” Lengthy discovery, design, and coding cycles smother urgency—especially when threats are evolving faster than releases. Enter AI-first development, where language models collapse friction at every step of the SDLC and let small teams translate concept into running code in hours, not quarters.
 
This talk tells the inside story of how we built a working Al Assisted Alert Agent & an Insider Threat & Fraud Detection module in a couple afternoons—then generalized the method into a repeatable playbook any security team can copy.
 
Highlights include:
 
  • Rethink Development Cycles – AI-assisted competitive analysis, ROI modeling, architecture drafting, and test generation—each shaved from weeks to minutes.
  • Vibe Coding in practice – How “prompt-to-prototype” workflows boost individual throughput 30–40 % and democratize coding to non-developers.
  • New tools available to stitch together AI and Automation for app-like workflows.
Dec 4, 2025
11:00am - 11:35am (Eastern)
The Rise of Digital Ghosts: Managing Machines Before They Manage You

As organizations embrace automation, APIs, and AI-driven workflows, a new class of identities has quietly emerged—the non-human identities. These include machine agents, service accounts, bots, and API keys that carry out essential tasks but frequently function outside of conventional governance frameworks. Identifying, controlling, and safeguarding these digital “ghosts” before they become a blind spot in your security and compliance systems is the focus of this webinar. Participants will get an understanding through practical examples of how to apply GRC and privacy principles to machine identities, incorporate them into frameworks that correspond with ISO 27001/42001, and mitigate the risks associated with uncontrolled automation.

Dec 4, 2025
11:00am - 11:50am (Eastern)
What's Up? Hot Topics and Recent Headlines in Privacy, Cyber, and AI
Join us for a lively and engaging session that cuts through the noise of today’s privacy, cybersecurity, and artificial intelligence news. In this fast-paced presentation, we’ll dive into ten of the most significant and talked-about headlines, exploring the real-world legal and compliance implications for your business.
 
Our host will put an entertaining and perhaps comical spin on these headlines, framing complex issues in a way that’s a little more light-hearted. Then, our special guest will test their knowledge, attempting to identify each headline and provide a breakdown of why it matters—or why it doesn’t—for your organization. Get ready to sort through the hype and walk away with a clear understanding of the developments you need to know about right now.
Dec 4, 2025
11:00am - 11:45am (Eastern)
Frame by Frame: Deepfakes in the Wild and in Court

This presentation treats deepfakes as a dual problem: first, scalable social-engineering for fraud and extortion, second, evidentiary trust and admissibility.

We outline an operational triage for scams and a forensic pipeline for courtroom authentication. On the technical side, we interrogate video at three layers: container metadata, codec bitstream, and sensor. For HEVC (H.265) we examine GOP layout and I/P/B distributions in contrast to AI Generated Images.

AI-generated sequences are profiled for temporal inconsistencies, mouth-eye desynchrony, lighting and specular drift, unstable motion-vector fields relative to content, and atypical of camera originals. The goal is for a playbook for rapid scam mitigation and a repeatable, tool-logged, frame-by-frame method to either authenticate legitimate HEVC captures or challenge AI-assisted fabrications in court.

We also cover tools and methodology used in deepfakes.

Dec 4, 2025
11:00am - 11:39am (Eastern)
[Panel] The Rise of Zero-Touch Compliance: Automating Your Way Out of Audit Fear

The future of compliance isn’t about more headcount; it’s about zero-touch automation. This session brings together legal and technology experts to discuss how organizations can leverage modern IT automation platforms to achieve and maintain compliance effortlessly. Panelists will address critical questions like: How does automated proof of remediation change the auditor-IT relationship? and What is the legal perspective on trusting automated compliance evidence?

Discover how shifting from manual oversight to automated enforcement dramatically reduces risk and transforms compliance from an operational burden into a competitive advantage.

Dec 4, 2025
12:00pm - 12:38pm (Eastern)
A Practical Guide to Data Protection for Enterprise AI Adoption

As enterprises embrace the limitless possibilities of AI, we security professionals need to adapt to safeguard sensitive data. In this talk, we’ll unpack a few real-world patterns of how data leaks into or out of AI systems and offer a simple framework for threat-modeling enterprise AI usage without slowing down innovation.

Dec 4, 2025
12:00pm - 12:45pm (Eastern)
Leadership Excellence: Strategies to Enhance Productivity, Performance, and Collaboration

In today’s dynamic and diverse workplace, effective leadership requires more than just strategic thinking; it demands emotional intelligence, active listening, and the ability to inspire trust and collaboration. Leadership Excellence is a high-impact session designed to help leaders elevate performance while fostering a culture of belonging, collaboration, and well-being.

This engaging presentation equips professionals with actionable strategies to lead with clarity, connection, and confidence. Participants will explore a proven framework for listening beyond words, building trust across teams, managing conflict with empathy, and driving meaningful results, without sacrificing their own health or values.

Grounded in real-world application and supported by research, this session empowers leaders to balance professional excellence with personal well-being. Attendees will walk away with tools to minimize burnout, improve collaboration, and create psychologically safe environments where individuals and ideas thrive.

Through interactive exercises, real-time feedback, and practical takeaways, participants will learn how to become the kind of leader who energizes people, unites diverse perspectives, and delivers consistent results. Whether you’re an executive, team lead, or rising professional, this session offers a blueprint for sustainable success and impactful leadership.

Dec 4, 2025
12:00pm - 12:48pm (Eastern)
Maximizing Data Security ROI: Turn Managed Services into a Strategic Advantage

Data security is no longer just a cost center—it’s a driver of business value. Join Cyera’s experts for a thought-provoking discussion on how managed services can help organizations maximize ROI by improving compliance, reducing risk, and enabling scalability.

Dec 4, 2025
12:00pm - 12:49pm (Eastern)
[Panel] The Current Threat Landscape

The threat landscape is constantly evolving, with new and sophisticated attacks emerging daily. This expert panel provides critical insights into the latest cyber threats, equipping you with the knowledge and strategies to defend your organization.

Dec 4, 2025
1:00pm - 1:58pm (Eastern)
The Last Human Advantage: How Persuasion, Trust, and Influence Win Budget and the Battle for Security

Hackers don’t just exploit code, they exploit people. They use Cialdini-grade persuasion, authority cues, urgency, and trust triggers to get humans to click, comply, and reveal. In this provocative and practical session, former Fortune-1 cybersecurity and privacy executive Anthony Martin turns that playbook inside out—showing security leaders how to ethically apply those same influence principles to drive results in the boardroom instead of the inbox.

Attendees will learn why persuasion works at a neural level, how to translate “attacker psychology” into ethical communication, and how to use those levers to win budget, accelerate adoption, and build departmental trust. Whether you’re a rising manager or a CISO in waiting, this session will give you the science-backed techniques to sell your strategy, earn executive confidence, and move the needle on both your program and your career.

Key take-aways: 

  • Leverage “persuasion” or “influence” as the ultimate leadership differentiator
  • Transform technical expertise into influence that secures funding, drives adoption, and accelerates both organizational impact and personal career growth.
Dec 4, 2025
1:00pm - 1:55pm (Eastern)
The Data War Has Begun: Winning at the Intersection of Cybersecurity, Cloud, and AI

We are living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how data is created, accessed, manipulated, and weaponized. In this new era, your most valuable asset—your data—is under constant threat, not just from cybercriminals, but from your own infrastructure decisions.

In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots organizations face as they race to adopt AI and migrate to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional defenses, how AI is both a weapon and a shield, and why the cloud isn’t inherently secure—unless you make it so.

Whether you’re a CEO, CISO, or business leader, this session will empower you with actionable frameworks to:

  • Understand how AI and cloud reshape the cyber threat landscape
  • Identify data exposure risks that live outside your control—and how to reclaim it
  • Shift from a perimeter model to identity- and data-centric security
  • Build an AI-aware security posture that accelerates—not blocks—innovation
  • Win the new war for data ownership, visibility, and control

The convergence is already here. The question is, are you leading with confidence, or reacting with chaos?

Dec 4, 2025
1:00pm - 1:48pm (Eastern)
Cyber Intel Briefing

In an increasingly volatile world, this session offers a critical debrief on the most pressing global issues and their direct impact on organizational strategy and resilience. The talk will cover significant geopolitical developments, from shifting international power dynamics to the complex relationship between global events and digital security. It will also explore the dramatic changes in data privacy regulations driven by the rise of artificial intelligence, highlighting the new compliance and ethical responsibilities for all leaders. Finally, the presentation will provide a strategic framework for building resilience against modern threats, from digital attacks to supply chain disruptions. As we wrap up 2025 and start to think about 2026, attendees will leave with a clear understanding of the evolving landscape and a proactive plan to secure their operations in the year ahead.

Dec 4, 2025
1:00pm - 1:50pm (Eastern)
Ransomware: A Left of Boom Story

Ransomware isn’t an instantaneous event—it’s a multi-stage campaign, whether opportunistic or highly targeted. These critical, pre-deployment phases offer a window of opportunity for prevention, detection, and defense. In this presentation, we will dissect the stages leading up to the ransomware payload. We’ll share real-world examples from the Huntress SOC and our threat hunters and provide ways your organization can boost resilience against ransomware attacks.

Dec 4, 2025
2:00pm - 2:48pm (Eastern)
[Closing Keynote] Zero Trust and AI: Strengthening Security, Reducing Complexity, and Driving Innovation

Businesses stand to benefit from AI in unprecedented ways, but only if IT and security leaders overcome transformation challenges. This includes implementing a modern zero trust architecture to protect data and users, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based approach to security ensures CIOs and CISOs deliver a secure, phased transformation.

Join this session to:

  • Understand how zero trust and AI together, unlike firewalls, provide the strongest cyber defense by stopping threat actors from lateral movement within networks
  • Learn strategies for protecting AI applications developed internally for customers and employees, while preventing data leaks from public AI applications
  • Discover how AI is being leveraged for better cyber defense, in areas like segmentation, data classification and agentic operations