[1 CPE] 2026 Global Threat Report: Why Speed, Scale, & Lifecycle Visibility Now Define Cyber Risk

  Presented by Brad Daniels, Systems Engineer • Fortinet

This session explores how cybercrime has evolved into a fully industrialized ecosystem, breaking down the modern threat lifecycle from initial exposure through weaponization, exploitation, and large-scale monetization—often operating at machine speed. Attendees will gain insight into the rise of cloud- and identity-driven attacks, along with practical strategies to increase defensive velocity, disrupt adversaries earlier, and improve visibility across the entire attack lifecycle.

[1 CPE] Why Modern Enterprises Invest in REAL Security

  Presented by Mac Avancena, Field CISO • Check Point Software

Cybersecurity isn’t failing because of technology. It’s failing because we’re talking about it the wrong way.

In today’s boardroom, cyber risk is financial risk. Yet most organizations still treat security as a cost center rather than a performance driver. The result? Overspend, complexity, and risk continue to compound.

In this session, Mac Avancena challenges that model, showing how leading enterprises are rewriting the narrative. By aligning security to business outcomes, simplifying fragmented environments, and leading with data, they’re transforming cybersecurity from overhead into a competitive advantage.

This isn’t about more tools or better alerts. It’s about changing the conversation—so security drives growth, resilience, and measurable ROI.

If you can’t tie security to business performance, you’re not securing the business—you’re slowing it down.

[1 CPE] From Initial Access to Full Control: Live Hacking, Remote Shells, and Command & Control

  Presented by Wayne Johnson, Chief Executive Officer • Stellar

Step into the attacker’s perspective in this live, unscripted demonstration of real-world hacking techniques. We’ll walk through every phase of a modern intrusion: crafting initial payloads to gain foothold, establishing resilient remote shells, and building robust command and control (C2) channels that blend into normal network traffic.

This session will showcase:

  • Methods for delivering and executing payloads without triggering defenses.
  • Techniques for spawning and managing reverse shells on Windows and Linux.
  • Approaches to encrypting and obfuscating C2 communications.
  • Tips for evading detection and maintaining persistence.

Whether you’re defending enterprise environments or learning to think like an adversary, you’ll leave with practical insights into how attackers operate—and how you can detect and disrupt them. Live Q&A will follow, so bring your questions and curiosity.

[1 CPE] Ransomware Resilience: Navigating Threats in a Hybrid-Cloud World

  Presented by Ken Smallwood, Systems Engineer, Data Services and Storage • HPE

This presentation explores how organizations are navigating rising cyber threats, evolving workloads, and stricter regulations while managing legacy environments. We will discuss the growing risk of ransomware, fragmented data across cloud and edge, and the need for unified, resilient data protection strategies.

[1 CPE] Seamless Hybrid Connectivity: Leveraging Cellular (5G) and LEO

  Presented by Ericsson

In an era of digital transformation, enterprises need agile, secure, and reliable connectivity that overcomes the limitations of terrestrial networks. This presentation shows how Wireless WAN edge routers, cloud management platforms, through Public/Private/LEO options unlocks the full potential of WAN Connectivity. Attendees will learn how to deploy Wireless WAN for fast primary, Day-1 Internet, WAN redundancy, IoT and In-Vehicle applications. Extending seamless coverage with private 5G for challenging indoor/outdoor environments and apply zero-trust security through simplified SASE to protect against growing threats.

Through real-world examples, discover how these solutions enable rapid deployment at distributed sites, vehicles, IoT ecosystems, and pop-up locations—driving better performance, operational efficiency, enhanced mobility, and business growth without infrastructure constraints. Leave equipped to harness 5G/Hybrid Connectivity for innovation and scalability anywhere.

[1 CPE] Rethinking Fire Suppression in Mission Critical Facilities

  Presented by Jeff De Hart, Director of Data Center Vertical Development • Kidde Fire Systems

As data centers continue to scale in size and complexity, traditional fire suppression approaches are being challenged to keep pace. In this session, Jeff De Hart, Director of Data Center Vertical Development at Kidde Fire Systems, draws on nearly three decades of experience to explore modern strategies for protecting mission-critical environments. Attendees will learn how simplified system design can reduce hardware requirements, lower installation and recharge costs, and deliver continuous protection across the data hall—without compromising safety or resilience.

Jeff leads the hyperscale data center and BESS strategy across the United States and Canada, is a recognized authority in special-hazard and clean-agent solutions for mission-critical environments, and serves on the Fire Suppression Systems Association (FSSA) Technical Committee.

[1 CPE] Observations from the Front Lines: The People Behind the Threats and Trends

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

Cybersecurity threats don’t emerge in isolation—they are observed, analyzed, and stopped by real people working on the front lines every day. This session pulls back the curtain on modern security operations, focusing on the human-driven research that powers effective threat detection, incident response, and adaptive security strategies.

Drawing on Arctic Wolf Labs research, SOC analyst expertise, and real-world incident data, this talk examines how today’s attacks are identified, contextualized, and disrupted in live environments. Attendees will gain insight into the patterns behind the most persistent threats, how adversaries continually adapt, and why defenders must evolve just as quickly. Rather than focusing solely on tools or alerts, this session highlights the people, processes, and intelligence that transform raw telemetry into actionable defense – illustrating how to turn frontline observations into scalable protection for organizations of all sizes.

[1 CPE] Industry Leading Alternatives to VMware and other Legacy Hypervisors

  Presented by Scale Computing

As organizations modernize their IT environments, many are exploring alternatives to traditional hypervisor platforms. Hyperconverged infrastructure (HCI) integrates compute, storage, and virtualization into a unified platform designed to simplify deployment, scaling, and management. This session will examine how these architectures can improve resilience, reduce operational complexity, and support both core data center and edge environments.

We’ll look closely at hyperconverged and edge computing solutions designed to make IT infrastructure simple, scalable, and highly available for organizations of all sizes and verticals –– integrating servers, storage, and virtualization into a single, easy-to-manage solution.

[1 CPE] The AI Mutiny: Regaining Control of the Unauthorized Intelligence Explosion

  Presented by Palo Alto Networks

Your employees are already using AI—the only question is whether you’re invited to the party. Statistics show that nearly 60% of the workforce has bypassed IT to use AI tools, leading to a surge in data exposure and breach incidents. The “Shadow” has returned, and it’s smarter than ever. Join us for a look at the reality of Shadow AI in the enterprise. We’ll analyze real-world breach scenarios and provide a roadmap for reclaiming control. Learn how to empower your workforce with approved, secure AI alternatives that satisfy the need for speed without sacrificing security.