[1 CPE] New Era of Deception: AI, Deep Fakes, and the Dark Web

  Presented by Morgan Trust, Associate Penetration Tester • FRSecure

Explore how artificial intelligence is fueling a new wave of cyber deception through deep fakes, social engineering, and dark web activity. In this session, Morgan Trust, Associate Penetration Tester at FRSecure, will uncover real-world examples and emerging threats while offering strategies to spot and defend against them. Gain the knowledge you need to navigate this evolving landscape with confidence.

As an Associate Penetration Tester at FRSecure, Morgan brings five years of experience and holds both the eLearnSecurity Junior Penetration Tester and CompTIA Security+ SY0-601 certifications to the table. Morgan is an extremely valuable asset to the team who works directly on the front lines with FRSecure’s clients. In his free time, Morgan enjoys Capture the Flag competitions, weightlifting, cooking/baking, dancing, listening to music at max volume, hiking, thrifting, and spending time with family.

[1 CPE] Go Hack Yourself: War Stories from over 170,000 Pentests

  Presented by Tony Taylor, Sr Solutions Architect • Horizon3.ai

Join Tony Taylor, Senior Solutions Architect, for an engaging session on “Offense-Driven Defense.” Tony will challenge conventional risk assessment practices and unveil how focusing on real-world exploitability and impact can revolutionize your security approach. Drawing from insights gathered across more than 170,000 autonomous pentests, he’ll share compelling stories and actionable lessons that show how viewing your cyber terrain through an attacker’s lens can uncover hidden vulnerabilities, optimize resource allocation, and strengthen your defenses against advanced threats. Don’t miss this opportunity to learn from a leading industry practitioner on why it’s time to “go hack yourself” and build resilience in today’s borderless threat environment.

[1 CPE] Securing AI Without Slowing Innovation: A Blueprint for the Future of Cybersecurity

  Presented by Alex Ruff, Principal Solutions Engineer • Trend Micro

AI is transforming the enterprise—bringing new opportunities for efficiency, but also introducing unprecedented risks. From prompt injection and model poisoning to shadow AI and deepfakes, the attack surface is evolving faster than most IT teams can keep up. In this session, we’ll explore Trend Micro’s Security for AI Blueprint, a step-by-step framework for protecting data, models, infrastructure, and users in an AI-driven world. You’ll also see how Trend Micro leverages AI across its own cybersecurity platform, combining decades of research with modern generative AI to deliver proactive protection. Walk away with practical strategies you can apply to safeguard your organization’s AI initiatives—without putting innovation on hold.

[1 CPE] From Chaos to Control: How Zero-Trust Networks Run Themselves

  Presented by Sukesh Garg, Vice President of Products • Nile

Many organizations still manage and secure their campus and branch networks based on a trust model designed for days past — a fragile web of switches, controllers, and security tools stitched together, never designed to secure IoT, sophisticated malware, and evolving AI threats.

The result is operational chaos, well-known vulnerabilities, and the constant feeling that something is missing. In this session, we’ll outline how leading enterprises are shifting to a Network-as-a-Service (NaaS) with completely re-designed architecture that’s built on top of modern Zero Trust Fabric — where Zero Trust security is delivered on day one. No complexity, add-ons, or legacy vulnerabilities.

With Nile, every user and device is isolated by design, micro-segmentation and granular policies provide enhanced identity-based enforcement — without the cost, complexity, and traditional risk.

Key Takeaways:

  • Traditional network security no longer meets today’s evolving security and compliance demands.
  • Zero-Trust compliance is within reach, without years of integration projects and missed timelines.
  • Reducing incidents and regaining operational control starts with a modern approach that aligns network and security requirements.

[1 CPE] Real-Time Threat Mitigation with AI-Driven SASE: A Practical Approach

  Presented by Joe Fontes, Sales Engineer, PNW • Cato Networks

This discussion highlights the current threat landscape associated with current AI tools and how those same foundational technologies can be used to automate threat responses. We will delve into an understanding of current adversaries, an overview of existing defenses, and strategies on extending current defense postures.

[1 CPE] Bridging Zero Trust and SASE: A Unified Approach to Modern Cybersecurity

  Presented by Fortinet

This will be a panel discussion on how organizations can effectively bridge Zero Trust and SASE to create a unified, adaptive cybersecurity architecture that meets the demands of today’s hybrid workforce and threat landscape.

Key Takeaways:

  • Understand the core principles of Zero Trust and SASE, and how they complement each other.
  • Learn practical strategies for implementing a unified approach without adding complexity or disrupting operations.
  • Gain insights into real-world use cases and lessons learned from organizations successfully integrating these frameworks.

Speakers:

  • Joel Robnett, Director of Sales, Tech Heads, Inc.
  • Steve Sims, Owner, Cruxial Technology Group
  • Michael Lippman, Regional Channel SE US, Fortinet
  • Eric Foster, Systems Engineer, Fortinet

[1 CPE] Modernizing the SOC: Transforming your Security Operations

  Presented by JR Silverthorne, Partner Solutions Consultant, West • Palo Alto Networks

So many industry players want to speak to and about tool consolidation and a platformization play in the cybersecurity space. We want to examine the classical SOC model and turn it on its head and reveal how a suite of capabilities enable root cause analysis, risk context, correlation, and automation across an open platform that accepts the widest and largest variety of data sources from the endpoint to the data center to the cloud. Our approach –– Xtended Security Intelligence Automation Management.

If your interest is in achieving the lowest MTTR and MTTD, if you want to detect security incidents and remediate faster, then your path forward has to unify workflows, utilize embedded intelligence, and provide automated responses. Let us show you how Palo Alto with 20,000 employees operates their SOC with just 15 people.

[1 CPE] From Frameworks to Firewalls: A Practical Guide to AI Security

  Presented by Collin Miller • Director, Cloud Security, Structured

As organizations accelerate AI adoption, the security landscape is evolving just as quickly. This presentation explores the foundations of AI security, starting with an overview of emerging AI-specific threats and the importance of structured defense approaches. We will examine leading frameworks—MITRE ATLAS and the NIST AI Risk Management Framework—and how they guide organizations in identifying, assessing, and mitigating AI risks.

We will then focus on Microsoft 365 Copilot, outlining its security architecture and built-in protections, followed by a technical case study on the Echo Leak vulnerability, demonstrating real-world exploitation risks. s a bonus, we will also take a look at the recent SalesDrift vulnerability, and the growing attack surface around LLM chatbot integration and supply chain risks.

Finally, we will provide an overview of Structured’s AI security service offerings. Attendees will gain both strategic insights and practical approaches to securing AI systems, preparing them to meet the challenges of an AI-powered future.

Collin Miller has over two decades of experience in networking and IT security — installing and supporting various types of security software and hardware. He has demonstrated skills in project management, evaluating new security technologies, testing, troubleshooting, and developing procedures and policies for new systems and technology. His past areas of focus include Mobile Device Management and Security, Data Loss Prevention, Zero Trust Network Access, Next-Generation Firewall, and Security Event and Information Management. His current area of focus is Cloud Security

[1 CPE] Threat Detection: Intelligence Insights from the Front Lines

  Presented by David Pier, Sr Sales Engineer • Zscaler

In 2024, Red Canary detected nearly 93,000 threats—an increase of more than a third from the previous year—driven by expanded visibility into cloud and identity infrastructure. For the seventh year, our Threat Detection Report analyzes the most prevalent cyber threats, evolving attack techniques, and the incidents we help customers resolve.

This session will highlight key trends, including email threats, infostealers, and LLM hijacking in the cloud, while breaking down the top 10 MITRE ATT&CK® techniques and most prevalent threats in customer environments. Attendees will gain actionable insights into detection, testing, and prevention strategies to enhance their security posture against today’s evolving threats.

[1 CPE] AI in the Eyes of the Threat Actors vs. the Cyber Defense Line

  Presented by Kelly Brazil, Sr Director, Security Architects • Juniper Networks

In today’s cybersecurity world, AI is making fast moves to improve the defense line, but adversaries are also using AI to build attacks faster and be more precise in entering the victim. Social Engineering, targeted phishing attacks where the text is generated by GenAI engines – make it even simpler to get in.

To overcome what is offered as Attacks as a Service, the Security barrier needs fully meshed security policies, in-line Malware detection powered by AI, and effective ways to identify and mitigate Zero Day Attacks. The goal is to defend an Enterprise faster than the adversaries are moving and mitigate potential breaches by real-time/in-line defense.

Kelly Brazil runs the global Security Specialist Architects team at HPE Juniper Networks. Kelly has 25+ years of experience in cybersecurity and has previously held technical leadership roles at Palo Alto Networks, Fortinet, and various successful security startups. He has traveled the globe as a public speaker evangelizing the latest trends in cybersecurity. Kelly is also active in the Open-Source Software (OSS) community and has developed DevOps automation tools in use by developers, systems administrators, and security practitioners around the world.