Join Steven Smiley and Jessica Stinson for a deep dive into how early-stage architectural reviews can transform the effectiveness of your testing. Whether you're navigating IAM setups or preparing to tackle GenAI risks in cloud environments, this session has the clarity and direction you need to test smarter—not just harder.
The Human Element: Building Trust and Influence in Security Leadership
Veteran security leader Nate Lee reveals how effective cybersecurity depends as much on relationship-building as technical expertise. Learn practical strategies for gaining organizational trust, communicating effectively, and driving security initiatives through persuasion rather than mandate.
Beyond Whack-a-Mole: Modern AppSec Strategies for High-Growth Companies
Intelligence That Matters: Building Cyber Threat Programs That Drive Business Value
Beyond Technical Exploits: The Strategic Value of Red Team Engagements
Managing SaaS Sprawl: Building Security Into Your Multi-Vendor Ecosystem
Marketing executive Charrah Hardamon shares insights on tackling the security challenges of modern SaaS ecosystems. Learn practical approaches to managing vendor relationships, implementing appropriate controls, and addressing AI integration without compromising data security.
The Human Side of Security Leadership: Building Teams That Thrive
Veteran security leader Dave Lewis shares his philosophy on transforming struggling teams into high-performers through trust, communication, and empathy. Learn practical approaches to leadership that enable both individual growth and organizational security.
AI's Dark Potential: Robert Hansen, RSnake and Author of AI's Best Friend, Warns of Superintelligence Risks
Security pioneer Robert "RSnake" Hansen shares insights from his book "AI's Best Friend," revealing why artificial intelligence without moral frameworks poses unprecedented dangers that regulation alone cannot address.
Testing LLM Algorithms While AI Tests Us
The presentation delves into securing AI & LLMs, covering threat modeling, API testing, red teaming, emphasizing robustness & reliability, sparking conversation on our interactions with GenAi.
Cyber Resilience: Tactics for Post-Attack Recovery
Join Christie Terrill and Tom Eston as they share practical advice on the proactive security measures you can take today and provide a space to ask our security experts your most pressing questions.
Mitigate Third-Party Risks by Strengthening Security Foundations
Hear from Anirban Banerjee, CEO and Co-founder of Riscosity, and Matt Twells, Sr. Solution Architect at Bishop Fox, as they explore critical considerations for developing a security program that prioritizes third-party risk reduction.
Women in Cybersecurity: Breaking Codes, Breaking Barriers
Tune into our special livestream event where we highlight the remarkable achievements of women in the field of cybersecurity, celebrating their contributions during Women's History Month.
Beyond Checkbox Compliance: Maximizing Security Value from PCI DSS Penetration Testing
Security Consultant Derek Rush shares how organizations can transform mandatory PCI penetration tests from compliance exercises into meaningful security assessments by following industry guidance and adopting attacker-focused methodologies.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.