Presented by Dan Frechette, Sales Engineer • Keystrike
Security in Industrial Control Systems and other critical environments comes with unique challenges and desired outcomes when compared to traditional cybersecurity.
Presented by Dan Frechette, Sales Engineer • Keystrike
Security in Industrial Control Systems and other critical environments comes with unique challenges and desired outcomes when compared to traditional cybersecurity.
Presented by Fernando Barcelo, Sr Sales Engineer • Ping Identity
Organized attacker groups aren’t just hammering your perimeter anymore—they’re impersonating your employees, contractors, and partners across hiring, access, and the helpdesk. AI-powered deepfakes, credential-stuffing, MFA fatigue, and social engineering are turning the extended workforce into the easiest path into critical systems. In this session, we will show how to move from implicit trust to Verified Trust: a continuous, identity-centric security model that binds every digital interaction back to a real, verified human—without slowing them down. You’ll see practical patterns for adding high-assurance verification and adaptive controls on top of your existing IdPs and infrastructure to stop organized attackers before they can establish a foothold.
Key Takeaways:
Presented by Structured
This session examines how organizations can align cybersecurity, privacy, and compliance programs with the realities of 2026. The presentation reviews current threat trends, executive accountability requirements, and the expanding impact of artificial intelligence on risk management. It then connects federal, state, and industry obligations, including NIST CSF 2.0, HIPAA, CJIS, PCI DSS 4.0, CMMC, and emerging privacy laws to practical security program design. Attendees will leave with a clear framework for building a complete security program that integrates governance, segmentation, risk management, Zero Trust principles, and penetration testing to reduce risk and support regulatory readiness.
Presented by George Tang, Solution Engineer • Zafran Security
First introduced by Gartner in 2022, Continuous Threat Exposure Management (CTEM) has quickly moved beyond buzzword status to become a cornerstone of modern cybersecurity programs. Beyond traditional vulnerability management programs, CTEM focuses on continuously identifying, validating, and prioritizing exposures so security teams can act with precision.
But the stakes are rising. Adversaries are weaponizing AI to discover and exploit vulnerabilities faster than ever, leaving organizations little margin for error. For CISOs, the challenge isn’t just finding exposures—it’s keeping pace with an accelerating threat landscape while making smarter use of existing resources.
Presented by Fortinet
This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.
Key Takeaways:
Moderator: Michael Lippman, Regional Channel Systems Engineer, Fortinet
Panelists:
Presented by Tim Medin, Chief Executive Officer • Red Siege
A comprehensive overview of modern cybersecurity threats and how breaches occur. We will highlight the various methods used by cybercriminals, including phishing, social engineering, and ransomware attacks, and emphasize the importance of identifying and addressing vulnerabilities before they can be exploited. There are a lot of vulnerabilities in the wild, and IT administrators and security professionals often focus on the wrong issues because they are easier to monitor or measure. By the end of the presentation, you will have gained valuable insights into the latest cybersecurity threats and how to protect against them.
Presented by Landra Pierce, Product Strategy Technologist • Veeam
Cyberattacks are no longer a distant threat; they are a reality every IT team must be prepared for. When an attack occurs, your data becomes both the primary target and the key to recovery. Many organizations still rely on backup strategies that are designed for hardware failures or accidental deletions, rather than today’s threats, like ransomware, insider risk, and automated attacks. This disconnect creates vulnerabilities, especially when backups become an overlooked entry point in your security strategy. In this session, we will address these challenges to help you better protect your organization.
This session is ideal for IT professionals who want greater confidence in safeguarding their data and peace of mind. We will examine the most common oversights that leave organizations, including those in government, education, healthcare, and other sectors, exposed to cyberthreats. You’ll discover how teams are advancing beyond basic backup to adopt a cyber-ready approach, including topics like immutability, threat awareness, rapid recovery, and intelligent automation.
Our focus will be practical and grounded in real-world scenarios, and what truly works when pressure is high and time is limited. Because when every minute counts and trust is at stake, data resilience means more than surviving an attack. It’s about protecting what matters most and emerging even stronger.
Presented by Red Canary
Join us for a deep dive into our 2026 Threat Detection Report. We’ll reveal how identity threats have skyrocketed to account for more than half of all detected threats. We will discuss how adversaries are weaponizing the “human element” through “paste-and-run” tactics and discover why the browser has become the ultimate frontline for both defenders and attackers alike. You’ll leave with better knowledge of the top threats and techniques, along with our recommendations on how to handle them.
Presented by Jake Gillen, Solutions Engineer • Pentera
As organizations face expanding attack surfaces, Red Teaming remains vital for uncovering true security gaps—but traditional methods can be difficult to scale. This session introduces Automated Security Validation and its role in strengthening and accelerating Red Team activities. We’ll define what Red Teaming is, outline how to plan an exercise, and walk through real examples that illustrate improved efficiency and coverage. Attendees will learn to complement manual Red Teaming by automating repetitive tasks, enabling teams to focus on high-value adversarial techniques and maximize overall impact.
Presented by Collin Covington, Sales Engineer • Axonius
Tired of the gap between security compliance and applicability? This session explores how to turn CIS Controls 1& 2, Asset Inventory and Secure Configuration, into actionable steps that strengthen your organization’s security foundation. We’ll discuss why these controls are essential for measuring and reducing risk, and how to apply them in ways that drive real outcomes rather than just checking compliance boxes. You will gain practical guidance to improve efficiency, reduce risk, and translate security requirements into meaningful results.