Thursday, March 5, 2026
7:30 AM - 8:30 AM
 
 
8:30 AM - 9:15 AM

Explore real-world breach incidents across diverse industries, understanding root causes, response effectiveness, and best practices to fortify your defenses.

Al Lindseth John Barrow Tim Brown Chris Wolski
9:15 AM - 10:00 AM

Delve into securing operational technology, IoT devices, and edge computing environments, with emphasis on protecting and empowering frontline workers.

Al Lindseth Blake Gilson Bemi Shola Anjous Sean Barnes Jay McMickle
10:00 AM - 10:20 AM

As cyber threats become faster, more automated, and operationally disruptive, industrial and energy organizations are often first to feel the impact. This session examines what changes in 2026 and how security leaders can adapt their operating models to stay resilient.

Bharat Mistry
10:20 AM - 10:40 AM
 
 
10:40 AM - 11:00 AM

- Adversaries are leveraging AI-enabled attacks to be stealthier and more efficient than ever.
- Constant changes to infrastructure and system configurations leads to detection drift and a decaying security posture.
- With talent still being scarce, security teams need force multipliers like AI and automation to keep pace.
- Real world case study: Learn how a leading global energy company eliminated detection gaps and elevated their SOC. 

Michael Mumcuoglu
11:00 AM - 11:45 AM

Learn how to translate complex cyber risks into impactful business language that engages boards and secures executive support.

Will Daugherty Nikki N Jackson Al Lindseth Sean Barnes
11:45 AM - 12:30 PM

Defending in the Age of Intelligent Threats: As AI accelerates the speed and sophistication of cyber threats, we have three great perspectives on how modern CISOs must rely on exposure management, validation, and AI-enabled defenses to identify real exposure and maintain control of risk.

Al Lindseth Sherry Hunyadi Brent Railey Randy Potts
12:30 PM