Main Conference Presentation Links

Please note not all presentations were permitted for distribution. 

Session Title

Presentation Link

Session Presented by CATO Networks: Humans Are Not the Weakest Link. Guess Who fAIls? 

Presentation

Session Presented by Aviatrix: First Principles for Cloud & AI Security: Defending Against the Next Wave of Threats

Presentation

Session Presented by StrongDM: From Risk to Resilience: Eliminating Standing Access in Zero Trust Programs

Presentation

Strengthening Vendor Risk Management: Ensuring Security and Compliance in an Evolving Threat Landscape

Presentation

Session Presented by Cytactic: Delivering an Effective Cyber TTX – Live Ransomware Simulation

N/A

Secure by Design, Not by Chance: The Rise of Security Control Management

Presentation

Risk Whisperers: Cyber Insurance Coverage, Liability, and Claims Trends

Presentation

Banking Industry Counterparty Risk: Managing Wire Fraud in Mortgage Transactions

N/A

CMMC: Navigating Compliance & Security in the Federal Landscape

Presentation

Session Presented by AirMDR: What It Really Takes to Build an AI Enabled SOC

N/A

Behind Enemy Lines: How Hackers Weaponize Your Security Vulnerabilities

Presentation

Hacking into a Cyber Career - Burn Out to Breakthrough

Presentation

From Risk to Resilience: Emotional Intelligence as Your Superpower

Presentation

Session Presented by Cribl: Modernizing Security with Telemetry Data

Presentation

Building Secure Satellites and Managing Risk in Space

Presentation

Session Presented by Akamai: It's Not The Breach. It's the Spread: Improving Cyber Resilience in Your Organization

Presentation

A Case of a Taken Identity: What Damage Can Be Done?

Presentation

Prove It: Preparing for Your CMMC Assessment

Presentation

SANS Workshop

N/A

Securing the Skies: The Cybersecurity Challenges of Advanced Air Mobility

Presentation

Session Presented by ThreatLocker: Simplifying Cybersecurity

Presentation

Cybersecurity Mentorship for a Successful Career Journey

N/A

Dynamic Analysis of an Executable’s System Impact

Presentation

Ransomware Negotiations – Field Guide

Presentation

eLxr Has Entered the Chat: Reinventing Linux for the Next Decade of Cyber Resilience

Presentation

The Four Key Trends of Ransomware in 2025

Presentation

Session Presented by: Huntress - Don't Be Scared. Be Prepared.

Presentation

Session Presented by PlainID: Anatomy of an AI Breach: A Real-life Look at Agentic Access Control Failure (and a Playbook to Avoid It)

Presentation

Session Presented by Superna: Data Centric CTEM Thought Leadership Paper

Presentation

Choose Your Own Adventure: An Interactive Journey in Building and Running Tabletop Exercises

Presentation

The Boardroom Meets the SOC: A CISO’s Playbook for Aligning Cybersecurity with Business Priorities

Presentation

Cyber Resilience - A Holistic Approach and Proven Methodology

Presentation

The 10 Most Important Information Security Books You Should Read

Presentation

Fake = Fail? Impostor Syndrome in the Workplace

Presentation

LOTL – The Link Between (Nearly) Every Major Breach

Presentation

Session Presented by Druva: AI-Powered Cyber Resilience - Using Backup Intel to Detect, Respond, and Recover

Presentation

On the Table:  Business Resilience

Presentation

Insights to Impact: Skills-based Strategies for the Future Cyber Workforce

Presentation

The A.I. 'Big Shift' and Cybersec Careers: What’s Coming, How To Navigate It

Presentation

Security Awareness Training: You CAN "Win Friends and Influence People!!"

Presentation

Third Party Risk Management: Can We Ditch the Questionnaires?

Presentation

How Not to Manage a Cyber Crisis: Learning from the Mistakes of Others

Presentation

Empowering Resilience: A Five-Step Framework to Unlock Cybersecurity Potential and Mitigate Human Risks

Presentation

AI Privacy and Security

N/A

Cybersecurity Challenges Facing Organizations Working Towards Compliance and Regulations

Presentation

AI, Zero Trust, and the Future of Cybersecurity for Critical Infrastructure

Presentation

AI in Cybersecurity: The Future of Intelligent Threat Defense

Presentation

Incident Response 2.0 - Strategy, Automation & Resilience

Presentation

Understanding the Real Message

N/A

 The Cyber Challenge: Game Theory for Better Real-World Cyber Strategy

Presentation

Dark Alliances: The Incestuous World of Ransomware

Presentation

Session Title

Presentation Link

From Mundane To Novel; Examining Volt Typhoon's New Behaviors

N/A

Session Presented by Horizon3: Without Offense, How Do You Know Defense is Working?

Presentation

Session Presented by RidgeIT Cyber: Adopting AI Securely -  Governance is Key

Presentation

There Aren’t a Million Open Roles – Here’s How to Actually Get Your First Job in Cyber

Presentation

Hiring Insider Threat

Presentation

Session Presented by Abnormal AI: The AI Threat: Protecting Your Email from AI-Generated Attacks

Presentation

Session Presented by SecurEnds: Smart Identity Governance. Adaptive API Security. Powering Trusted Access Across the Enterprise.

Presentation

Decrypting the Art of Public Speaking for Cybersecurity Professionals

Presentation

CyberTheft of Trade Secrets, and Legal Considerations during Breaches

Presentation

Building AI SecOps

Presentation

Session Presented by Veracode: Is AI-Generated Code Secure?

N/A

Enchanted Entanglements in Cyber Insurance Coverage: Protecting the Magic in a Digital Kingdom

Presentation

A Journey in Software Bill of Materials (SBOM) and Why it Should Matter to You

Presentation

Getting Ready for AI Bills of Materials (AIBOMs): Some Legal Perspectives

Presentation

Using Artificial Intelligence for Identity and Access Management

Presentation

Session Presented by Illumio: ​Re-Thinking Cybersecurity

Presentation

The Impact of Cybersecurity on Global Security and Economic Stability

Presentation

Decoding Cybersecurity: How to Speak the Language of Engineers, Management, and Executives

Presentation

Why I Didn’t Become the Baby-Faced CISO – Building a Personal Brand Through Authenticity, Opinion and Finding What Unites

Presentation

K.I.S.S. 2.0 - How Security Frameworks Can Help Simplify Your Information Security Program

N/A

The Human Factor: Quantifying Human Risk

Presentation

We've Failed...And How to Fix It!

Presentation

Technology-Driven Changes to the Insider Risk Landscape

Presentation

Session Presented by Thales: Protecting Modern Applications: Agents, APIs, and Attacks

N/A

Ask the CISO: Does It Matter?

Presentation

Securing the Convergence: Collaborative Strategies for OT & Cybersecurity Professionals

N/A

Baby Steps to Resilience - Not Quite 0 to Not Quite 60 in Not Quite 60 Seconds

Presentation

Patch or Perish: Winning the Vulnerability Management Game

Presentation

Session Presented by NetSPI: Audit-Ready AI: How to Ace GenAI Integrations for Regulatory Compliance 

Presentation

Forensic, Content-Based Analyses of Audio and Video Evidence

N/A

Navigating Third-Party Risk in OT Environments

N/A

Session Presented by Feedly: The Leadership Playbook for OSINT: Turning Noise into Actionable Strategy

N/A

Social Engineering with the help of Artificial Intelligence: From Planning to Execution

N/A

Unmasking AI-Powered Fraud Tools on the Dark Web: Threats and Countermeasures

Presentation

Session Presented by Atlantic Data Security & Check Point: When Intelligence Meets Enforcement: Turning Early Signals Into Pre-emptive Actions

Presentation

We've been Hit with Ransomware: Best Practices for the first 24 hours after a Cyber Attack

Presentation

Session Presented by Anvilogic: The State of SIEM: Deployment Models, Detection Trends, and the New Decision Matrix

N/A

Session Presented by Teramind: Shadow Workers: Why AI Agents Are Your Biggest Blind Spot

Presentation

What's in the Soup?: Navigating Insider Threat in the Supply Chain

Presentation

Women in Cyber: Women in Cyber Voices: What's Your Hot Take?

Presentation

The 21st Century CISO (Version 2.0)

N/A

Royal Flush in DevSecOps – Unlocking the Secrets of a Winning Strategy

Presentation

The Importance of Comprehensive Information Security at the Molecular Level

Presentation

Open Source Software (OSS) Transparency is Key to Trustworthiness

Presentation

From Good to Great: Simple Shifts That Make Security Teams Unstoppable

Presentation

Session Title

Presentation Link

Implementing a Secure Software Development Life Cycle

Presentation

Lessons from Using Evaluating LLMs to Check Software Security

Presentation

From Overload to Oversight: How AI Can Lighten the Cognitive Load in High-Stakes Work

N/A

Information Security Compliance for Federal Contractors & Critical Infrastructure

Presentation

Threat Hunting and Incident Response: Evolving Offense Requires an Evolving Defense

Presentation

Embracing My Inner Cyber Wizard to Defeat Impostor Syndrome

N/A

Hacking the Patent System - When and Why to Protect Cybersecurity Innovations

N/A

Back to The Future - The New Rat Race

Presentation

Lessons in Leadership from Kylo Ren

Presentation

What Do Rubber Ducks Have to Do With Cybersecurity?

Presentation

The OWASP GenAI Security Project: Securing AI at Scale

Presentation

Forensic First Aid: Investigating on a Budget

N/A

Cyber Kills

Presentation

Identity 3.0

Presentation

Modern Threats Demand Modern Leadership: Strategic Threat Hunting for Executives

Presentation

Leading with Influence, The Lasso Way

N/A

Identifying Security Gaps through Tabletop Exercises

 

The Future of Cybersecurity – Data-Centric Continuous Threat Exposure Management (CTEM)

Presentation

Banging on the Doors and Tapping at the Windows

Presentation

Navigating the Evolving AI Regulatory Landscape

Presentation