[1 CPE] Observations from the Front Lines: The People Behind the Threats and Trends

  Presented by Peter Ingebrigtsen, Sr Technical Marketing Manager • Arctic Wolf

Cybersecurity threats don’t emerge in isolation—they are observed, analyzed, and stopped by real people working on the front lines every day. This session pulls back the curtain on modern security operations, focusing on the human-driven research that powers effective threat detection, incident response, and adaptive security strategies.

Drawing on Arctic Wolf Labs research, SOC analyst expertise, and real-world incident data, this talk examines how today’s attacks are identified, contextualized, and disrupted in live environments. Attendees will gain insight into the patterns behind the most persistent threats, how adversaries continually adapt, and why defenders must evolve just as quickly. Rather than focusing solely on tools or alerts, this session highlights the people, processes, and intelligence that transform raw telemetry into actionable defense – illustrating how to turn frontline observations into scalable protection for organizations of all sizes.

[1 CPE] Protect Against Organized Attackers with Verified Trust for the Extended Workforce

  Presented by Fernando Barcelo, Sr Sales Engineer • Ping Identity

Organized attacker groups aren’t just hammering your perimeter anymore—they’re impersonating your employees, contractors, and partners across hiring, access, and the helpdesk. AI-powered deepfakes, credential-stuffing, MFA fatigue, and social engineering are turning the extended workforce into the easiest path into critical systems. In this session, we will show how to move from implicit trust to Verified Trust: a continuous, identity-centric security model that binds every digital interaction back to a real, verified human—without slowing them down. You’ll see practical patterns for adding high-assurance verification and adaptive controls on top of your existing IdPs and infrastructure to stop organized attackers before they can establish a foothold.

Key Takeaways:

  • Understand how AI-driven impersonation and organized attacker groups exploit gaps across hiring, workforce access, and helpdesk workflows.
  • Learn how Continuous Verification, Verified Onboarding, Verified Access, and Verified Helpdesk reduce risk across your extended workforce without adding friction.
  • See how to layer verification, credentials, and orchestration capabilities on top of your existing identity and security stack to strengthen Zero Trust initiatives.

[1 CPE] Applied AI for Business: Turning Hype into Measurable Impact

  Presented by Greg Hatch, Sr Vice President, Strategic Growth • Gage Technologies

Despite widespread AI adoption in 2025–2026, only a small percentage of organizations are realizing significant business impact. This session cuts through the hype to clarify what AI truly is, explore the rise of generative and agentic AI, and highlight where real value is emerging—particularly in customer experience (CX) and security. Drawing on recent industry research and practical experience, we examine why many initiatives stall and what differentiates successful ones.

Participants will leave with a practical roadmap for AI success: aligning initiatives to clear business outcomes, assessing readiness, managing risks, and embedding security and governance from the start. The message is simple—AI transformation is less about the technology itself and more about strategy, data, leadership, and disciplined execution.

[1 CPE] From Endless Alerts to Continuous Action: Why CISOs Are Shifting to CTEM

  Presented by George Tang, Solution Engineer • Zafran Security

First introduced by Gartner in 2022, Continuous Threat Exposure Management (CTEM) has quickly moved beyond buzzword status to become a cornerstone of modern cybersecurity programs. Beyond traditional vulnerability management programs, CTEM focuses on continuously identifying, validating, and prioritizing exposures so security teams can act with precision.

But the stakes are rising. Adversaries are weaponizing AI to discover and exploit vulnerabilities faster than ever, leaving organizations little margin for error. For CISOs, the challenge isn’t just finding exposures—it’s keeping pace with an accelerating threat landscape while making smarter use of existing resources.

[1 CPE] The Enterprise Buyer’s Guide to AI Security Platforms

  Presented by Cato Networks

AI adoption is accelerating faster than security and governance, exposing organizations as sensitive data flows through copilots, LLM-powered apps, and agentic systems that legacy tools can’t properly protect. With a surge of AI security vendors entering the market, buying the right platform can be confusing. This presentation helps security leaders evaluate AI security solutions by clarifying the new risks AI creates, explaining the core pillars of AI security, and outlining how to compare platforms, ask the right questions, and avoid common buying mistakes.

[1 CPE] From Liability to Asset: Securing Unstructured Data at Scale in the Era of AI

  Presented by Rubrik

Unstructured data is the lifeblood of the modern organization, yet its sheer volume often outpaces the strategies meant to protect it. As this data becomes the fuel for future AI initiatives and business intelligence, the “old way” of managing NAS has become a primary point of failure.

In this session, we’ll dive into how Rubrik NAS Cloud Direct (NCD) redefines the protection of PB-scale file systems. We will explore a modern architectural approach that provides the speed, visibility, and cloud-native flexibility required to turn massive data sets into resilient assets. Whether you are preparing for an AI-driven future or simply struggling with the growth of your current footprint, this session will provide a blueprint for total unstructured data control.

[1 CPE] The Speed of Trust: Why Your AI Strategy is Only as Fast as Your Security Architecture

  Presented by Chris Staley, SASE Specialist • Palo Alto Networks

In the race for AI dominance, many businesses are hitting the brakes because their security can’t keep up. They’re stuck in the “Fragmentation Tax”—managing 60+ tools that don’t talk to each other while trying to govern a world of prompt injections and “Shadow AI.” Chris Staley, SASE Specialist at Palo Alto, will present on how organizations need to think about these challenges. Many organizations are caught between the need to reduce tool sprawl and contending with the hidden costs of adopting incomplete platforms.

[1 CPE] Cybersecurity and Compliance For 2026

  Presented by Structured

This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.

[1 CPE] 6 Hard Lessons from Zero Trust Deployments: What the Field is Actually Seeing

  Presented by John Spiegel, Security CTO and HPE Distinguished Technologist • HPE Networking

Zero Trust has quickly moved from security concept to board-level mandate. Yet the reality inside most organizations is far messier than the architecture diagrams suggest.

Based on several hundred interviews with IT and security practitioners as well as the analyst community, this session explores what actually happens when organizations attempt to implement Zero Trust. The findings are sobering: roughly 60–70% of Zero Trust initiatives stall before reaching maturity, and fewer than 20% achieve a fully realized Zero Trust architecture.

Rather than focusing on theory or vendor frameworks, this session examines six hard lessons from the field, highlighting both the successes and the failures organizations encounter along the way. Topics include why many Zero Trust initiatives stall, where organizations underestimate complexity, the architectural decisions that matter most, and what successful deployments do differently.

This presentation is not a product pitch. Instead, it’s a candid discussion of the hard realities of Zero Trust deployment, grounded in the experiences of practitioners across hundreds of organizations. Attendees will leave with practical insights into what works, what fails, and how to move a Zero Trust initiative from concept to operational reality.

[1 CPE] Inside the 2026 Threat Detection Report: A First Look at this Year’s Report

  Presented by Red Canary

Join us for a deep dive into our 2026 Threat Detection Report. We’ll reveal how identity threats have skyrocketed to account for more than half of all detected threats. We will discuss how adversaries are weaponizing the “human element” through “paste-and-run” tactics and discover why the browser has become the ultimate frontline for both defenders and attackers alike. You’ll leave with better knowledge of the top threats and techniques, along with our recommendations on how to handle them.