&

(NOT JUST)

AI for CYBERSECURITY

ONLINE SHOWCASE & CONFERENCE

Early Access thru Feb 6

LIVE PROGRAM: Feb 9 thru May 29

Your definitive source for staying abreast of to rapidly evolving topics within the cybersecurity industry. Through broadcast quality video content featuring leading analysts and other top experts in panels, analyst roundtables, and other formats, we give you the latest word on all salient topics—at no cost.

Featuring live Tracks with leading analysts and expert panels

REGISTER TODAY - SAVE YOUR SPOT!

AI SECURITY TRACK

demo image
PANEL:

Strategies for Red Teaming Agentic AI Applications

This panel focuses on emerging strategies for red teaming agentic AI applications, emphasizing the unique vulnerabilities and security implications associated with these systems. The panel explores the distinctions between agentic AI and traditional LLMs, the necessity of early and scalable red teaming and the importance of processes and metrics for measuring success in identifying and mitigating risks---and the critical need for a collaborative approach in addressing AI security.

Ken Huang LinkedIn

Co-Chair AI Safety Working Groups

CSA

Walker Dimon LinkedIn

AI for Cybergroup Leader

MITRE

Alex Polyakov LinkedIn

Co-Founder & CEO

Adversa AI

Alex Polyakov LinkedIn

Co-Founder & CEO

Adversa AI

Related Solutions

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

Non-Human / Identities

demo image
PANEL:

The Rise Of Machines: Securing Non-Human Identities In A Connected World

This panel discussion explores the complexities of securing non-human identities (NHIs) in a rapidly evolving digital landscape. Experts delve into the rise of machine identities, the challenges of governance, and the need for robust security measures. They emphasize the importance of discovery, education, and collaboration across organizations to effectively manage NHIs and mitigate associated risks in a connected world.

Daniel Cohen LinkedIn

SVP, Enterprise
Security Architecture & Capabilities

Paramount

Paul Lanzi LinkedIn

Founder

IDEnovate

Steven Rennick LinkedIn

Member

The Identity Underground

Joshua Wilson LinkedIn

Lead Security Architect

PRA Group

Mathias Reinwarth LinkedIn

Director Practice IAM,
Lead Advisor and Senior Analyst

KuppingerCole Analysts AG

Related Solutions

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Unified Approach to Modern PAM & NHI Management

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

AI SECURITY TRACK

demo image
PANEL:

Threat Modeling for Agentic AI Applications

The panel discusses the complexities of threat modeling for agentic AI applications and the unique security challenges posed by these systems compared to traditional AI models. They dig into the need for new frameworks to address the dynamic and autonomous nature of agentic AI, exploring potential vulnerabilities, data security concerns, and the implications of agent-to-agent interactions in future AI ecosystems. The conversation highlights the importance of collaboration between security professionals and business units to effectively navigate the evolving landscape of AI security.

Ken Huang LinkedIn

Co-Chair AI Safety Working Groups

CSA

Walker Dimon LinkedIn

AI for Cybergroup Leader

MITRE

Sam Rehman LinkedIn

CISO and SVP/Head
of Cybersecurity Business

CyberDef Labs

Jason Haddix LinkedIn

CEO

Aracanum Information Security

Related Solutions

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

Non-Human / Identities

demo image
PANEL:

Non-Human / Machine Identities - Why Now – Why Should You Be Concerned

This panel discussion delves into the critical topic of non-human machine identities (NHIs), exploring their historical context, current challenges and the urgency of addressing security concerns in an increasingly automated landscape. Experts share insights on the risks associated with NHIs, including their appeal to attackers and the necessity for improved governance and situational awareness, ultimately advocating for collaborative solutions to mitigate technical debt and enhance security measures.

Anthony Viggiano LinkedIn

Identity and Access Management Leader

James Hauswirth LinkedIn

Global Managing Director - PAM

Cyderes

Anusha Iyer LinkedIn

CEO

Corsha

Joshua Wilson LinkedIn

Lead Security Architect

PRA Group

Sebastian Rohr LinkedIn

Managing Director

Umbrella Security

Related Solutions

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Unified Approach to Modern PAM & NHI Management

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

SOC Automation / The Modern SIEM

demo image
PANEL:

The Future of SOC Automation: Trends and Innovations Shaping Security Operations

This panel discussion examines the future of SOC automation, focusing on the role of AI in enhancing security operations. Experts highlight the importance of balancing automation with human oversight to tackle modern cyber threats effectively. The conversation provides insights into innovations that drive smarter decision-making and improve security posture.

Todd Wade LinkedIn

CISO Interim

CyberRisk Management

Jim Rutt LinkedIn

CISO

Dana Foundation

Ron Williams LinkedIn

Founder & CEO

Kindo

Greg Rogers LinkedIn

Executive Advisor & vCISO

GuidePoint Security

Tom Findling LinkedIn

CEO & Co-Founder

Conifers AI

Related Solutions

Enhancing Security Operations with Dropzone

Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.

Revolutionizing SOCs with AI-Driven Efficiency

Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.

AI SOC Xpert Analyst Briefing

Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.

AI SECURITY TRACK

demo image
PANEL:

Managing AI Security Risk

This blue chip panel reviews top line strategies for managing AI security risks including continuous assessment of potential vulnerabilities and threats to AI systems, monitoring various attack vectors and evaluating the security of data used to train AI models, the integrity of the models themselves, and the security of the systems where they are deployed.

Harold Booth LinkedIn

Computer Scientist

NIST

Moinul Khan LinkedIn

Co-Founder & CEO

Aurascape AI

Merlin Namuth LinkedIn

CISO

City and County of Denver

Walker Lee Dimon LinkedIn

AI for Cybergroup Leader

MITRE

Related Solutions

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Non-Human / Identities

demo image
PANEL:

Harnessing AI for Non-Human Identity Threat Detection

Harnessing AI for Non-Human Identity Threat Detection - This panel explores how AI can be harnessed to detect and mitigate threats targeting non-human identities such as bots, APIs, IoT devices, and machine accounts. Experts discuss the AI driven approaches for anomaly detection and behavioral analytics that can transform how to deal with identifying and detecting inappropropriate use of non-human identities.

Sanjeev Ojha LinkedIn

Practice Director - ZeroTrust, PAM, IAM & IGA

Cyderes

Jon Shende LinkedIn

VP Solutions, Engineering & Americas Field CTO

Sutherland

James Hauswirth LinkedIn

Global Managing Director - PAM

Cyderes

Timm Lotter LinkedIn

Head of Solution Engineering

Unosecur

Related Solutions

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Unified Approach to Modern PAM & NHI Management

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

AI SECURITY TRACK

demo image
PANEL:

Winning the AI Arms Race in Cybersecurity

The panel discussion explores the multifaceted role of AI in enhancing security operations, addressing challenges in compliance, data privacy and ethical AI usage. Experts discuss AI’s dual role in fortifying defenses and being leveraged by adversaries, emphasizing the need for strategic, high-level discourse to guide effective implementation and prioritize AI security initiatives in the evolving cybersecurity landscape.

Rob Sandler LinkedIn

Strategic FSI Partner Manager

Trend Micro

Patrick Angel LinkedIn

CISO

WGroup

Sam Rehman LinkedIn

CISO and SVP/Head of Cybersecurity Business

EPAM Systems

Eidan Siniver LinkedIn

Cyber, Data & AI CTO

Team8

Related Solutions

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

SOC Automation / The Modern SIEM

demo image
PANEL:

Automating Incident Response: Strategies for Efficient Threat Mitigation

Where does automation deliver the biggest payoff in incident response? This panel dives into triage, enrichment, and Tier‑1/2 playbooks—plus when to keep humans in the loop for high‑risk actions. Learn how to accelerate time‑to‑trust (~90 days), surface SOC bottlenecks, curb LLM hallucinations and strengthen governance, metrics, and skills, with pragmatic takeaways, MSSP-tested practices and defenses against AI‑enabled attacks like deepfakes.

Jim Rutt LinkedIn

CISO

Dana Foundation

Shahar Ben-Hador LinkedIn

CEO & Co-founder

Radiant Security

Dave Gold LinkedIn

VP Solutions Eng & Americas Field CTO

SentinelOne

Related Solutions

Enhancing Security Operations with Dropzone

Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.

Revolutionizing SOCs with AI-Driven Efficiency

Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.

AI SOC Xpert Analyst Briefing

Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.

AI SECURITY TRACK

demo image
PANEL:

Safeguarding Data Privacy in Agentic AI Systems

Agentic AI supercharges capability and risk. Our panel unpacks real threats (prompt injection, deepfakes, insecure dev tools) and proven privacy playbooks: zero-retention architectures, AI gateways, RBAC/MFA, continuous logging and privacy-enhancing tech (federated learning, homomorphic encryption, differential privacy, zero-knowledge proofs). Learn how to align security, privacy and compliance with ISO 42001/NIST AI RMF, manage deletion requests, govern multi-agent workflows and protect sensitive data at scale.

Patricia Thaine LinkedIn

Co-Founder & CEO

Private AI

Dean Sapp LinkedIn

CISO

Filevine

Patrick Angel LinkedIn

CISO

WGroup

Mark Butler LinkedIn

CISO

Trace3

Namrata Shah LinkedIn

Managig Director - Global Head of Engineering

Nuveen

Related Solutions

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

Non-Human / Identities

demo image
PANEL:

The OWASP Non-Human Identity Top 10

The OWASP Non-Human Identity Top-10 - This panel covers the OWASP Non-Human Identity Top-10, a comprehensive list of the most pressing security risks and vulnerabilities that non-human identities present to organizations. Experts share insights on these risks, many of which are related to weak lifecycle processes and controls from improper offboarding, secret leakage, overprivileged NHIs, sharing of NHIs, human use NHIs to long-lived secrets. The experts also share guidance on how to mitigate these risks.

Lalit (Mr NHI) Choda LinkedIn

Founder & CEO

Non-Human Identity Mgmt Group

Sameer Bhanushali LinkedIn

Identity & Collaboration Solutions

Paramount

Andrew McCormick LinkedIn

Principal Solutions Architect

Aembit

Anthony Viggiano LinkedIn

Identity and Access Management Leader

Related Solutions

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Unified Approach to Modern PAM & NHI Management

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

SOC Automation / The Modern SIEM

demo image
PANEL:

Integrating Automation into SOC Workflows: Best Practices for Success

This panel discussion delves into the integration of automation and AI into SOC workflows, emphasizing the necessity of these technologies in modern security operations. Experts share insights on best practices for implementing automation, addressing challenges such as alert fatigue and skill gaps, and highlight the potential for AI to enhance efficiency and accuracy. The conversation underscores the importance of adapting SOC strategies to leverage AI and automation effectively, paving the way for more proactive and resilient security postures.

Dave Gold LinkedIn

VP Solutions Eng & Americas Field CTO

SentinelOne

Ron Williams LinkedIn

Founder & CEO

Kindo

Shahar Ben-Hador LinkedIn

CEO & Co-founder

Radiant Security

Jamie Morrison LinkedIn

ONE SOURCE

Related Solutions

Enhancing Security Operations with Dropzone

Dropzone’s demo highlights its innovative approach to security by autonomously investigating Tier 1 alerts, reducing the operational burden on SOC teams and increasing investigative capacity. The platform emphasizes trust-building through transparent methodologies and adaptive learning, ensuring efficient alert triage and evidence gathering without reliance on pre-set playbooks, ultimately enhancing security and compliance for organizations.

Revolutionizing SOCs with AI-Driven Efficiency

Anton Chuvakin interviews Ambuj Kumar about the transformative role of AI in the SOC in addressing the challenges of staffing and tool manage. The discussion highlights the capabilities of Symbian's AI SOC technology, which automates triage and investigation processes, thereby enhancing efficiency and accuracy while allowing human analysts to focus on more complex tasks. Key insights include the importance of contextual knowledge in threat detection and the potential for AI to significantly improve the effectiveness of Managed Security Service Providers (MSSPs) and Managed Detection and Response (MDR) services.

AI SOC Xpert Analyst Briefing

Richard Stiennon and Eva Abergel discuss Radware’s EPIC-AI™ and how it integrates layers of AI-powered and generative AI capabilities across Radware’s application and network protection services to secure apps, reduce mean time to resolutions (MTTR) and save costs.

AI SECURITY TRACK

demo image
PANEL:

The Most Pressing Issues in AI Security: the Current Snapshot

Anton Chuvakin, Ian Swanson, Richard Stiennon and Ken Huang discuss the most pressing threats facing security pros on the AI front—at this moment.

Anton Chuvakin LinkedIn

Industry Analyst

Google

Richard Stiennon LinkedIn

Chief Research Analyst

IT-Harvest

Ian Swanson LinkedIn

CEO & Co-Founder

Protect AI

Ken Huang LinkedIn

Co-Chair AI Safety Working Groups

CSA

Related Solutions

AI-Native Protection for AI Applications and Agents

Straiker protects agentic AI applications in real time. This demo shows how we detect agentic threats like prompt injection, PII data leakage, and tool misuse to create ransomware while our autonomous red teaming simulates real-world attacks to keep your AI secure at every step.

Cloud Security Megatrends & Risk Management Perspectives

This tour of the Protect AI platform focuses on the Guardian component, the main capability of the most comprehensive platform for securing your AI. You’ll see show how to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats.

Adopt and Scale AI with Total Confidence

WitnessAI provides the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security. We bring network level visibility to your entire security stack, eliminating blind spots and enforcing policies without agents, browser extensions, or disruptions to your workflows.

Achieve AI Security and Compliance

The Enkrypt AI product demo showcases the platform's capabilities in delivering secure and compliant AI solutions, including agents, chatbots and multimodal systems. It emphasizes automated red teaming to identify vulnerabilities, real-time guardrails for risk mitigation and continuous compliance monitoring, ensuring that enterprises can deploy generative AI applications safely and efficiently. The demo highlights how Enkrypt AI helps organizations navigate complex regulatory landscapes while maintaining operational integrity.

AI Featured Tracks:

AI Security (AISec)

VIEW AGENDA

Application Security Posture Management (ASPM)

VIEW AGENDA

Breach & Attack Simulation, CTEM & PTaaS

VIEW AGENDA

Browser Security

VIEW AGENDA

Data Security Posture Management (DSPM)

VIEW AGENDA

Passwordless & Other Auth

VIEW AGENDA

Risk & Vulnerability Management

VIEW AGENDA

SaaS Security (SSPM)

VIEW AGENDA

SASE / SSE

VIEW AGENDA

Software Supply Chain Security

VIEW AGENDA

Third-Party Risk Management

VIEW AGENDA

A joint resource developed and maintained by CSA and the Cybersymposium Group

Bringing together the Cloud Security Alliance’s industry-leading expertise and the Cybersymposium Group’s cutting-edge research, this resource hub delivers authoritative insights on AI’s rapidly evolving role in cybersecurity. Our combined knowledge base ensures security professionals stay ahead of emerging threats and opportunities in the AI-driven security landscape.

LIVE EVENTS

Navigating Emerging Technological

Frontiers with AI in

Cloud security

Zero trust

SecOps

AISec

Data Security

Threat Intel

Fraud Prevention

Email Security

GRC

IoT / OT

Data Security

Landcape

Security Champions Panels:
panel image

Obtaining Leadership Buy-In through ROI of Security Champions

panel image

Unleashing the Power of Behavioral Science to Engage Your Security Champions

panel image

Resources / Guidance in Building Security Champion Programs

panel image

Is it Worth Being a Security Champion?

panel image

Security Champion Veterans Explain All

panel image

Contrarian Views On What Doesn’t Work

AI Transforms the Cybersecurity Landscape

AI is revolutionizing how we detect, prevent, and respond to cyber threats. From automated threat detection to predictive defense systems, artificial intelligence is becoming the cornerstone of modern cybersecurity strategy, enabling organizations to stay ahead of evolving digital risks.

PROGRAM INCLUDES:

Contributors and panelists

Jason Clinton

CISO

Anthropic

Jason Clinton

Ken Huang

Co-Chair AI Safety Working Groups

Cloud Security Alliance

Ken Huang

Steve Wilson

CPO

Exabeam

Steve Wilson

Bobi Gilburd

Chief Innovation Officer

Team8

Amit_Sharma

Anton Chuvakin

Security Advisor

Google Cloud

Amit_Sharma

David Gold

VP Solutions Engineering & Americas Field CTO

SentinelOne

davigold

Martin Stanley

AI and Cybersecurity Researcher

NIST

Martin Stanley

Christina Liaghati

Trustworthy & Secure AI Department Manager

MITRE

Christina Liaghati

Mark Kraynak

Founding Partner

Acrew Capital

Michelle Dennedy

Michelle Dennedy

Chief Data Strategy Officer

Abaxx Technologies

Michelle Dennedy

Michael Myint

CISO

AdaptHealth

Michael Myint

Alex Polyakov

Co-Founder & CEO

Adversa AI

Alex Polyakov

Zaheer Shaikh

CISO

Al Maryah Community Bank

Zaheer Shaikh

Willian Yang Wang

Founder & CEO

Alpha Design AI

Yang Wang

Kevin McDonald

CISO

Alvaka

Kevin McDonald

Seyi Feyisetan

Principal Scientist

Amazon

Seyi Feyisetan

Don Cox

CISO

American Public Education

Don Cox

Jason Haddix

CEO, CISO & Hacker

Arcanum Information Security

Jason Haddix

Moinul Khan

CEO

Aurascape.ai

Moinul Khan

Chloe Autio

CEO

Autio Strategies

Chloe Autio

Mateo Rojas

Founder and Chief Scientist

Lakera

Mateo Rojas

Andy Chun

Founder

B9AI

Andy Chun

Derek Melber

Identity Security Expert Worldwide Keynote Speaker

BrainCore.Net

Derek Melber

Timothy Amerson

Founder/CEO/CISO

CASMO

Timothy Amerson

Rick Doten

VP Information Security

Centene Corporation

Rick Doten

Jonathan Spring

Cybersecurity Specialist

CISA

Jonathan

Hyrum Anderson

CTO of a company acquired by Cisco

Cisco

Hyrum Anderson

Merlin Namuth

CISO

City and County of Denver

Merlin Namuth

Reva Schwartz

Co-Founder

Civitaas

Reva Schwartz

Dan Kent

Field CTO

Cloudflare

Dan Kent

Adam Desmond

Sales Director EMEA

IDVerse

Adam Desmond

Drew Bagley

VP & Counsel, Privacy & Cyber Policy

CrowdStrike

Drew Bagley

J. Michael Daniel

President & CEO

Cyber Threat Alliance

J. Michael Daniel

Curtis Blais

CISO

Cybera

Curtis Blais

Arun Pamulapati

Staff Security Field Engineer

Databricks

Arun Pamulapati

Omar Khawaja

CISO

Databricks

Omar Khawaja

Rony Ohayon

CEO

DeepKeep

Rony Ohayon

Christian Lau

Co-Founder

Dynamo AI

Christian Lau

Sam Rehman

CISO and SVP/Head of Cybersecurity Business

EPAM Systems

Sam Rehman

Dean Sapp

CISO

Filevine

Dean Sapp

Jyoti Ponnapalli

Vice President, Applied AI

Frontier Internet

Jyoti Ponnapalli

Alex Combessie

Co-Founder

Giskard

Alex Combessie

Charley Snyder

Global Head of Security Policy

Google

Charley Snyder

Vijay Bolina

CISO

Google DeepMind

Vijay Bolina

Greg Rogers

vCISO

GuidePoint Security

Greg Rogers

Satish Ramakrishnan

CTO

Holistic Ai

Satish Ramakrishnan

Ambrish Rawat

Senior Research Scientist

IBM

Ambrish Rawat

Pin-Yu Chen

Principal Research Scientist

IBM

Pin-Yu Chen

Almir Badnjevic

Director

IDDEEA

Almir Badnjevic

Ashish Atri

CISO

InvestCloud

Ashish Atri

Sounil Yu

Co-Founder/CTO

Knostic

Sounil Yu

David Haber

CEO

Lakera

David Haber

Omar Turner

General Manager - Security

Microsoft

Omar Turner

Walker Dimon

AI for Cybergroup Leader

MITRE

Walker Dimon

Rob Coons

MASE Lab Mgr / Autonomous Systems Engineer, Lead

MITRE

Rob Coons

Apostol Vassilev

Research Team Supervisor

NIST

Apostol Vassilev

Vicky Pillitteri

Manager, Security Engineering & Risk Management Group

NIST

Vicky Pillitteri

Harold Booth

Computer Scientist

NIST

Harold Booth

Namrata Shah

Managing Director - Global Head of Engineering

Nuveen

Namrata Shah

Christopher Parisien

Research Manager

NVIDIA

Christopher Parisien

Nick Hamilton

Head of Governance, Risk, & Compliance

OpenAI

Nick Hamilton

Matt Knight

CISO

OpenAI

Matt Knight

Sourabh Satish

Co-founder & CTO

Pangea

Sourabh Satish

Ziv Karliner

Co-Founder & CTO

Pillar Security

Ziv Karliner

Patricia Thaine

Co-Founder and CEO

Private AI

Patricia Thaine

Tyson Kopczynski

CISO in Residence

Professional Association of CISO's

Tyson Kopczynski

Diana Kelly

CISO

Protect AI

Diana Kelly

Jeff Greene

Founder

Salty Coffee Consulting

Jeff Greene

Rob van der Veer

Chief AI Officer

SIG

Rob van der Veer

Ben Goertzel

CEO

SingularityNET

Ben Goertzel

Johann Dettweiler

CISO

stackArmor

Johann Dettweiler

Steve Giguere

AI Cybersecurity Consultant

Steve Giguere

Chris Herrlein

Sales Director

Synack

Chris Herrlein

Josh Mason

Solutions Architect

Synack

Josh Mason

Jim Rutt

CISO

The Dana Foundation

Jim Rutt

Kathrin Gardhouse

Visiting Research Fellow

The Future Society

Kathrin Gardhouse

Jonathan Litchman

Co-Founder & CEO

The Providence Group

Jonathan Litchman

Mark Butler

CISO

Trace3

Mark Butler

Rob Sandler

Strategic FSI Partner Manager

Trend Micro

Rob Sandler

Fernando Cardoso

VP Product Management

Trend Micro

Fernando Cardoso

Jon Clay

VP, Threat Intel

Trend Micro

Jon Clay

Justin Woody

Co-Founder

Twine Security

Justin Woody

Vinay Goel

CEO

Wald AI

Vinay Goel

Patrick Angel

CISO

WGroup

Patrick Angel

Alina Oprea

Northwestern University

Alina Oprea

Michael Nouguier

CISO

Richey May

Michael Nouguier

Ankush Chowdhary

VP CISO

Hewlett Packard Enterprise

Ankush Chowdhary

Sean McGregor

AI & Media Integrity Steering Committee

Responsible AI Collaborative

Sean McGregor

Eidan Siniver

Cyber, Data & AI CTO

Team8

Eidan Siniver

Michael Morgenstern

Partner

Day Blink Consulting

Michael Morgenstern

Karina Klever

CEO / CISO

Klever Compliance

Karina Klever

Ron Williams

CEO

Kindo

Ron Williams

Tim Dzierzek

CISO

Aya Healthcare

Tim Dzierzek

Sabrina Palm

CEO

Palqee

Sabrina Palm

Dan Caprio

Senior Policy Advisor

DLA Piper

Dan Caprio

Vaikkunth Mugunthan

CEO & Co-Founder

Dynamo AI

Vaikkunth Mugunthan

Hadar Yakir

Head of Marketing

Pillar Security

Hadar Yakir

Ambuj Kumar

Co-Founder & CEO

Simbian

Ambuj Kumar

Kristian Kamber

CEO & Co-Founder

SPLX

Kristian Kamber

Benjamin Dulieu

CIO & CISO

Duck Creek Technologies

Benjamin Dulieu

Shankar Krishnan

Managing Director

PromptArmor

Shankar Krishnan

Casey Bleeker

Co-Founder & CEO

SurePath AI

Casey Bleeker

Lee Weiner

Chief Executive Officer

TrojAI

Lee Weiner

Omer Katz

VP Engineering, AI

Tenable

Omer Katz

Andrew Gamino-Cheong

CTO & Co-Founder

Trustible

Andrew Gamino-Cheong

Prashanth Harshangi

Co-Founder & CTO

Enkrypt AI

Prashanth Harshangi

Michelle Dennedy

Chief Data Strategy Officer

Abaxx Technologies

Michelle Dennedy

Katie Paxton-Fear

Staff Security Advocate

Semgrep

Katie Paxton-Fear

David Lee

Field CTO

Saviynt

David Lee

Jeremy McHugh

CEO & Co-Founder

Preamble

Jeremy McHugh

Gilad Ivry

Co-Founder & CPO

Qualifire

Gilad Ivry

Richard Bird

Chief Security Officer

Singulr AI

Richard Bird

Casey Bleeker

Co-Founder & CEO

SurePath AI

Casey Bleeker

Michael Bargury

Co-Founder & CTO

Zenity

Michael Bargury

Terence Runge

Cyber Security Executive

Terence Runge

Lorenzo Pupillo

Associate Senior Research Fellow

CEPS

Lorenzo Pupillo

Keith O'Brien

Distinguished Security Architect - Field CSO

Cisco

Keith O'Brien

Andy Vaca

vCISO

GRYHAT CYBERSECURITY LLC

Andy Vaca

Tyrone Watson-Ferguson

Department Manager of Cybersecurity Infrastructure & Design

Burns & McDonnell

Tyrone Watson-Ferguson

Chester Leung

Co-Founder, Head of AI Platform

Opaque Security

Chester Leung

Jacob Ideji

Cybersecurity Architect & Security Solutions Engineering

Cisco

Jacob Ideji

Joe Sullivan

CEO of Joe Sullivan Security

Joe Sullivan Security

Joe Sullivan

Rodrigo Fernández Baón

Head of Growth and PR

NeuralTrust

Rodrigo Fernández Baón

Suchit Mishra

Global Technology & Security Executive

Matillion

Suchit Mishra