
Main Conference Presentation Links
Please note not all presentations were permitted for distribution.
Session Title |
Presentation Link |
|---|---|
Session Presented by CATO Networks: Humans Are Not the Weakest Link. Guess Who fAIls? |
|
Session Presented by Aviatrix: First Principles for Cloud & AI Security: Defending Against the Next Wave of Threats |
|
Session Presented by StrongDM: From Risk to Resilience: Eliminating Standing Access in Zero Trust Programs |
|
Strengthening Vendor Risk Management: Ensuring Security and Compliance in an Evolving Threat Landscape |
|
Session Presented by Cytactic: Delivering an Effective Cyber TTX – Live Ransomware Simulation |
N/A |
Secure by Design, Not by Chance: The Rise of Security Control Management |
|
Risk Whisperers: Cyber Insurance Coverage, Liability, and Claims Trends |
|
Banking Industry Counterparty Risk: Managing Wire Fraud in Mortgage Transactions |
N/A |
CMMC: Navigating Compliance & Security in the Federal Landscape |
|
Session Presented by AirMDR: What It Really Takes to Build an AI Enabled SOC |
N/A |
Behind Enemy Lines: How Hackers Weaponize Your Security Vulnerabilities |
|
Hacking into a Cyber Career - Burn Out to Breakthrough |
|
From Risk to Resilience: Emotional Intelligence as Your Superpower |
|
Session Presented by Cribl: Modernizing Security with Telemetry Data |
|
Building Secure Satellites and Managing Risk in Space |
|
Session Presented by Akamai: It's Not The Breach. It's the Spread: Improving Cyber Resilience in Your Organization |
|
A Case of a Taken Identity: What Damage Can Be Done? |
|
Prove It: Preparing for Your CMMC Assessment |
|
SANS Workshop |
N/A |
Securing the Skies: The Cybersecurity Challenges of Advanced Air Mobility |
|
Session Presented by ThreatLocker: Simplifying Cybersecurity |
|
Cybersecurity Mentorship for a Successful Career Journey |
N/A |
Dynamic Analysis of an Executable’s System Impact |
|
Ransomware Negotiations – Field Guide |
|
eLxr Has Entered the Chat: Reinventing Linux for the Next Decade of Cyber Resilience |
|
The Four Key Trends of Ransomware in 2025 |
|
Session Presented by: Huntress - Don't Be Scared. Be Prepared. |
|
Session Presented by PlainID: Anatomy of an AI Breach: A Real-life Look at Agentic Access Control Failure (and a Playbook to Avoid It) |
|
Session Presented by Superna: Data Centric CTEM Thought Leadership Paper |
|
Choose Your Own Adventure: An Interactive Journey in Building and Running Tabletop Exercises |
|
The Boardroom Meets the SOC: A CISO’s Playbook for Aligning Cybersecurity with Business Priorities |
|
Cyber Resilience - A Holistic Approach and Proven Methodology |
|
The 10 Most Important Information Security Books You Should Read |
|
Fake = Fail? Impostor Syndrome in the Workplace |
|
LOTL – The Link Between (Nearly) Every Major Breach |
|
Session Presented by Druva: AI-Powered Cyber Resilience - Using Backup Intel to Detect, Respond, and Recover |
|
On the Table: Business Resilience |
|
Insights to Impact: Skills-based Strategies for the Future Cyber Workforce |
|
The A.I. 'Big Shift' and Cybersec Careers: What’s Coming, How To Navigate It |
|
Security Awareness Training: You CAN "Win Friends and Influence People!!" |
|
Third Party Risk Management: Can We Ditch the Questionnaires? |
|
How Not to Manage a Cyber Crisis: Learning from the Mistakes of Others |
|
Empowering Resilience: A Five-Step Framework to Unlock Cybersecurity Potential and Mitigate Human Risks |
|
AI Privacy and Security |
N/A |
Cybersecurity Challenges Facing Organizations Working Towards Compliance and Regulations |
|
AI, Zero Trust, and the Future of Cybersecurity for Critical Infrastructure |
|
AI in Cybersecurity: The Future of Intelligent Threat Defense |
|
Incident Response 2.0 - Strategy, Automation & Resilience |
|
Understanding the Real Message |
N/A |
The Cyber Challenge: Game Theory for Better Real-World Cyber Strategy |
|
Dark Alliances: The Incestuous World of Ransomware |
Session Title |
Presentation Link |
|---|---|
From Mundane To Novel; Examining Volt Typhoon's New Behaviors |
N/A |
Session Presented by Horizon3: Without Offense, How Do You Know Defense is Working? |
|
Session Presented by RidgeIT Cyber: Adopting AI Securely - Governance is Key |
|
There Aren’t a Million Open Roles – Here’s How to Actually Get Your First Job in Cyber |
|
Hiring Insider Threat |
|
Session Presented by Abnormal AI: The AI Threat: Protecting Your Email from AI-Generated Attacks |
|
Session Presented by SecurEnds: Smart Identity Governance. Adaptive API Security. Powering Trusted Access Across the Enterprise. |
|
Decrypting the Art of Public Speaking for Cybersecurity Professionals |
|
CyberTheft of Trade Secrets, and Legal Considerations during Breaches |
|
Building AI SecOps |
|
Session Presented by Veracode: Is AI-Generated Code Secure? |
N/A |
Enchanted Entanglements in Cyber Insurance Coverage: Protecting the Magic in a Digital Kingdom |
|
A Journey in Software Bill of Materials (SBOM) and Why it Should Matter to You |
|
Getting Ready for AI Bills of Materials (AIBOMs): Some Legal Perspectives |
|
Using Artificial Intelligence for Identity and Access Management |
|
Session Presented by Illumio: Re-Thinking Cybersecurity |
|
The Impact of Cybersecurity on Global Security and Economic Stability |
|
Decoding Cybersecurity: How to Speak the Language of Engineers, Management, and Executives |
|
Why I Didn’t Become the Baby-Faced CISO – Building a Personal Brand Through Authenticity, Opinion and Finding What Unites |
|
K.I.S.S. 2.0 - How Security Frameworks Can Help Simplify Your Information Security Program |
N/A |
The Human Factor: Quantifying Human Risk |
|
We've Failed...And How to Fix It! |
|
Technology-Driven Changes to the Insider Risk Landscape |
|
Session Presented by Thales: Protecting Modern Applications: Agents, APIs, and Attacks |
N/A |
Ask the CISO: Does It Matter? |
|
Securing the Convergence: Collaborative Strategies for OT & Cybersecurity Professionals |
N/A |
Baby Steps to Resilience - Not Quite 0 to Not Quite 60 in Not Quite 60 Seconds |
|
Patch or Perish: Winning the Vulnerability Management Game |
|
Session Presented by NetSPI: Audit-Ready AI: How to Ace GenAI Integrations for Regulatory Compliance |
|
Forensic, Content-Based Analyses of Audio and Video Evidence |
N/A |
Navigating Third-Party Risk in OT Environments |
N/A |
Session Presented by Feedly: The Leadership Playbook for OSINT: Turning Noise into Actionable Strategy |
N/A |
Social Engineering with the help of Artificial Intelligence: From Planning to Execution |
N/A |
Unmasking AI-Powered Fraud Tools on the Dark Web: Threats and Countermeasures |
|
Session Presented by Atlantic Data Security & Check Point: When Intelligence Meets Enforcement: Turning Early Signals Into Pre-emptive Actions |
|
We've been Hit with Ransomware: Best Practices for the first 24 hours after a Cyber Attack |
|
Session Presented by Anvilogic: The State of SIEM: Deployment Models, Detection Trends, and the New Decision Matrix |
N/A |
Session Presented by Teramind: Shadow Workers: Why AI Agents Are Your Biggest Blind Spot |
|
What's in the Soup?: Navigating Insider Threat in the Supply Chain |
|
Women in Cyber: Women in Cyber Voices: What's Your Hot Take? |
|
The 21st Century CISO (Version 2.0) |
N/A |
Royal Flush in DevSecOps – Unlocking the Secrets of a Winning Strategy |
|
The Importance of Comprehensive Information Security at the Molecular Level |
|
Open Source Software (OSS) Transparency is Key to Trustworthiness |
|
From Good to Great: Simple Shifts That Make Security Teams Unstoppable |
Session Title |
Presentation Link |
|---|---|
Implementing a Secure Software Development Life Cycle |
|
Lessons from Using Evaluating LLMs to Check Software Security |
|
From Overload to Oversight: How AI Can Lighten the Cognitive Load in High-Stakes Work |
N/A |
Information Security Compliance for Federal Contractors & Critical Infrastructure |
|
Threat Hunting and Incident Response: Evolving Offense Requires an Evolving Defense |
|
Embracing My Inner Cyber Wizard to Defeat Impostor Syndrome |
N/A |
Hacking the Patent System - When and Why to Protect Cybersecurity Innovations |
N/A |
Back to The Future - The New Rat Race |
|
Lessons in Leadership from Kylo Ren |
|
What Do Rubber Ducks Have to Do With Cybersecurity? |
|
The OWASP GenAI Security Project: Securing AI at Scale |
|
Forensic First Aid: Investigating on a Budget |
N/A |
Cyber Kills |
|
Identity 3.0 |
|
Modern Threats Demand Modern Leadership: Strategic Threat Hunting for Executives |
|
Leading with Influence, The Lasso Way |
N/A |
Identifying Security Gaps through Tabletop Exercises |
|
The Future of Cybersecurity – Data-Centric Continuous Threat Exposure Management (CTEM) |
|
Banging on the Doors and Tapping at the Windows |
|
Navigating the Evolving AI Regulatory Landscape |