Thursday, March 5, 2026
7:30 AM - 8:30 AM
 
 
8:30 AM - 9:15 AM

Explore real-world breach incidents across diverse industries, understanding root causes, response effectiveness, and best practices to fortify your defenses.

Al Lindseth John Barrow Tim Brown Chris Wolski
9:15 AM - 10:00 AM

Delve into securing operational technology, IoT devices, and edge computing environments, with emphasis on protecting and empowering frontline workers.

Al Lindseth Blake Gilson Bemi Shola Anjous Anthony Souza
10:00 AM - 10:20 AM
 
 
10:20 AM - 10:40 AM
 
 
10:40 AM - 11:00 AM
 
 
11:00 AM - 11:45 AM

Learn how to translate complex cyber risks into impactful business language that engages boards and secures executive support.

Will Daugherty Marty Christensen Nikki N Jackson Al Lindseth Gordon Groschl
11:45 AM - 12:30 PM

As AI accelerates the speed and precision of attacks, modern CISOs have to use exposure management, validation, AI-enabled defenses and other techniques to keep pace and maintain control of risk.

Al Lindseth Sherry Hunyadi Brent Railey Randy Potts
12:30 PM