[1 CPE] When Unchecked Innovation Becomes Institutional Risk: The Leadership Moment for AI

  Presented by Mac Avancena, Field CISO • Check Point Software

AI adoption is accelerating, but most organizations are not ready.

While investment surges, the majority of AI initiatives fail to scale, deliver value, or operate securely. The challenge isn’t the technology; it’s the inability to align AI with governance, financial realities, and measurable business outcomes.

In this session, Mac Avancena cuts through the hype to expose the real gap between AI ambition and execution. Learn why most AI programs stall, which organizations are actually succeeding, and how leaders can fund, secure, and scale AI in constrained environments.

This session delivers a clear framework to:

  • Connect AI initiatives to business value and funding priorities
  • Close the gap between innovation and governance
  • Manage risk across AI, identity, and data
  • Turn AI from experimental spend into a strategic advantage

AI won’t wait. The question is whether your organization can keep up, securely and profitably.

[1 CPE] From Initial Access to Full Control: Live Hacking, Remote Shells, and Command & Control

  Presented by Wayne Johnson, Chief Executive Officer • Stellar

Step into the attacker’s perspective in this live, unscripted demonstration of real-world hacking techniques. We’ll walk through every phase of a modern intrusion: crafting initial payloads to gain foothold, establishing resilient remote shells, and building robust command and control (C2) channels that blend into normal network traffic.

This session will showcase:

  • Methods for delivering and executing payloads without triggering defenses.
  • Techniques for spawning and managing reverse shells on Windows and Linux.
  • Approaches to encrypting and obfuscating C2 communications.
  • Tips for evading detection and maintaining persistence.

Whether you’re defending enterprise environments or learning to think like an adversary, you’ll leave with practical insights into how attackers operate—and how you can detect and disrupt them. Live Q&A will follow, so bring your questions and curiosity.

[1 CPE] From Known-Bad to Known-Normal: The Future of Threat Detection

  Presented by Patricia Titus, Field CISO • Abnormal

As email-based threats continue to evolve in speed and sophistication, traditional “known-bad” detection methods are no longer enough to protect modern organizations. This session explores the shift toward a “known-normal” security model, where behavioral AI establishes a dynamic baseline of trusted activity to identify anomalies, detect emerging threats, and stop attacks before they escalate.

Designed for executive and security leaders, this presentation will examine how behavioral-based threat detection strengthens resilience against advanced phishing, business email compromise, and AI-driven attacks. Attendees will leave with practical guidance for evaluating their current email security stack, adopting modern AI-powered defenses, and implementing key strategies to stay ahead of today’s rapidly changing threat landscape.

[1 CPE] 2026 Cyber Crime Trends from the FBI

  Presented by FBI

Hijacked networks, cryptocurrency heists, and corporate espionage are but a few examples of the spiraling cyber threat. Every year, our adversaries become savvier and increasingly callous – attacking power grids, shutting down hospitals, and stoking geopolitical tensions. State-sponsored cyber actors wield every element of their national power to target the United States and its critical infrastructure. Skilled cybercriminals exploit new and longstanding vulnerabilities to steal our money and hold our data for ransom.

Combating these threats is the primary mission of the FBI’s cyber program. As the lead federal agency for investigating cyberattacks and intrusions, we engage with victims and work to unmask those committing malicious cyber activities, wherever they are.

Join us for a session from an FBI Special Agent to learn how you can improve your security approach.

[1 CPE] Speaking the Language of Risk

  Presented by Tom Ruoff, Principal Consultant • ImageSource

Organizations face rapidly evolving cyber threats, yet many still view technology as a cost center rather than a strategic partner. This presentation reframes the conversation by translating technical risks into business and financial terms leaders understand. Attendees will learn how to identify Business Essential Functions (BEFs), quantify operational and financial impacts, and apply practical risk‑estimation methods. By establishing a common language of risk, leaders can align priorities, invest where it matters most, and meaningfully reduce enterprise exposure. The session equips both executives and IT teams with tools to build consensus and drive smarter, outcome‑based cybersecurity decisions.

Tom Ruoff serves as Principal Consultant for ImageSource, Inc. providing cybersecurity consulting services (risk assessments, threat hunting, pen testing, breach remediation, security architectures, policies, business impact assessment) to commercial clients including Native American Tribes and Tribal Casinos, he is also a founder and current CEO of Zorse Cyber. Tom retired from the Dept of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA) in June 2023, as Chief, Methodology Branch, supervising vulnerability assessments for elections, power generation/distribution, and pipelines, and Federal Government IT systems. Before DHS, Tom was the Director of Systems Division at Northrop Grumman, developing cross domain solutions (CDS) for National Security Agency (NSA) and Central Intelligence Agency (CIA). Air Force veteran with tours at NSA, CIA element of the National Geospatial-Intelligence Agency, and Defense Intelligence Agency He is a Level III Federally Certified Program Manager, PMP, CISSP, CMMI Associate, MS/BS degrees in physics and electrical engineering.

[1 CPE] 2026 Global Threat Report: Why Speed, Scale, & Lifecycle Visibility Now Define Cyber Risk

  Presented by Brad Daniels, Systems Engineer • Fortinet

This session explores how cybercrime has evolved into a fully industrialized ecosystem, breaking down the modern threat lifecycle from initial exposure through weaponization, exploitation, and large-scale monetization—often operating at machine speed. Attendees will gain insight into the rise of cloud- and identity-driven attacks, along with practical strategies to increase defensive velocity, disrupt adversaries earlier, and improve visibility across the entire attack lifecycle.

[1 CPE] The Foundation of Strong Security

  Presented by Nick McGillivray, Sr Sales Engineer  • Axonius

Tired of compliance that doesn’t translate into actual risk reduction? This session brings CIS Controls 1 & 2 to life with practical, actionable steps that strengthen your security foundation.

Learn how to improve asset visibility, enforce configuration discipline, and drive measurable security outcomes beyond simply checking compliance boxes. Today’s environments change faster than traditional tools can track —new servers, SaaS apps, AI software, IoT/OT, and NHIs constantly appear, creating blind spots where risk hides.

We’ll cover how to aggregate and correlate data from all your security and IT tools to deliver a single source of truth for your entire attack surface. The result: complete asset intelligence, clear ownership, and the ability to proactively remediate & spot exposures before they become incidents.

[1 CPE] Latest Data Breaches, Quantum Computing, External Key Management in the Cloud

  Presented by Steven Gautier, Principal Solutions Architect • Thales

Welcome to our session on modern data threats and protection strategies. As cyber risks evolve, securing sensitive information is more critical than ever. We’ll explore how encryption and key management can help protect your most valuable assets, especially in cloud environments.

We’ll highlight the benefits of external key management, offering greater control and compliance. Additionally, we’ll touch on the growing impact of quantum computing—and why it’s vital to start preparing now.

Join us to discover the latest advancements in data security and learn how to stay ahead of emerging threats.

[1 CPE] Proving Cyber Resilience: Measuring Outcomes, Not Effort

  Presented by Jake Mickley, Sr Solutions Architect • Horizon3.ai

Most security programs measure effort — not outcomes. Organizations patch thousands of vulnerabilities, deploy dozens of tools, and run annual tabletop exercises… but when an attacker shows up, none of that matters.

What matters is whether they can prove their defenses actually work.

In this talk, Horizon3.ai shares how leading organizations are using autonomous pentesting to see their environment through the attacker’s eyes — continuously, safely, and at scale. By shifting from assumptions to proof, they’ve learned to:

  • Prioritize what’s exploitable. Focus limited resources on the weaknesses that truly put the business at risk that are known to be abused by threat actors.
  • Quickly fix what matters. Close the loop from find → fix → verify and reduce your exploitable attack surface.
  • Reduce attacker dwell time. Use pentest results to precisely deploy honeyTokens to detect compromise early, and to continuously prove your EDR and SIEM are tuned and working as intended.

Cyber resilience isn’t about being perfect — it’s about getting better over time. And the only perspective that truly matters is the attacker’s.

[1 CPE] Data Resilience in the Age of Attack: Protect What Matters

  Presented by Landra Pierce, Product Strategy Technologist • Veeam

Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.

This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.

Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.