Thursday, March 5, 2026
7:30 AM - 8:30 AM
 
 
8:30 AM - 9:15 AM

Explore real-world breach incidents across diverse industries, understanding root causes, response effectiveness, and best practices to fortify your defenses.

Al Lindseth John Barrow Tim Brown Chris Wolski
9:15 AM - 10:00 AM

Delve into securing operational technology, IoT devices, and edge computing environments, with emphasis on protecting and empowering frontline workers.

Al Lindseth Blake Gilson Bemi Shola Anjous Anthony Souza
10:00 AM - 10:20 AM

As cyber threats become faster, more automated, and operationally disruptive, industrial and energy organizations are often first to feel the impact. This session examines what changes in 2026 and how security leaders can adapt their operating models to stay resilient.

Bharat Mistry
10:20 AM - 10:40 AM
 
 
10:40 AM - 11:00 AM

- Adversaries are leveraging AI-enabled attacks to be stealthier and more efficient than ever.
- Constant changes to infrastructure and system configurations leads to detection drift and a decaying security posture.
- With talent still being scarce, security teams need force multipliers like AI and automation to keep pace.
- Real world case study: Learn how a leading global energy company eliminated detection gaps and elevated their SOC. 

Michael Mumcuoglu
11:00 AM - 11:45 AM

Learn how to translate complex cyber risks into impactful business language that engages boards and secures executive support.

Will Daugherty Marty Christensen Nikki N Jackson Al Lindseth Gordon Groschl
11:45 AM - 12:30 PM

As AI accelerates the speed and precision of attacks, modern CISOs have to use exposure management, validation, AI-enabled defenses and other techniques to keep pace and maintain control of risk.

Al Lindseth Sherry Hunyadi Brent Railey Randy Potts
12:30 PM