Cybersecurity Outlook 2025

December 5, 2024
11:00am -5:00pm ET | Doors Open at 10:30am ET

Cybersecurity Outlook 2025

In December 2024, Cybersecurity Outlook 2025 will look at some of the newest threats posed by cybercriminals and nation-states, as well as evolving products and technologies that may help mitigate those threats. You’ll hear from some of the cybersecurity industry’s leading analysts and experts, as well as researchers who have been examining the next wave of cyber threats and attacks.

Topics Include:
New cyber threats and attack trends to watch for in the new year and how to defend against them
Evolving products and technologies that may help mitigate cyber-threats
Security risks with cloud adoption
How to harness AI to secure your organization
The Newest threats posed by cybercriminals
Much more!
Agenda
Keynote
11:00 AM – 11:45 PM

2025 Outlook: Trends Ahead in Cybersecurity

Sponsored by: Darktrace
Moderated by: Maxine Holt, VP Research Enterprise, Omdia

Cybersecurity is a complex battlefield, with threats intensifying while resilience remains critical. In this keynote, Omdia will unveil the cybersecurity trends set to define 2025 and offer actionable strategies to help your organization stay ahead.

Fireside Chat
11:45 AM - 12:00 PM

Speaker(s): Nicole Carignan, VP of Strategic Cyber AI, Darktrace
Networking Break
12:00 PM - 12:10 PM

Keynote
12:10 PM - 12:55 PM

Cybersecurity Platforms: Triangulating Hype, Reality, and Opportunity

Sponsored by: Palo Alto Networks
Moderated by: Eric Parizo, Managing Principal Analyst, Omdia Cybersecurity

Many cybersecurity vendors have sought to position their solutions as platforms – multifaceted integrated solution sets that purport to deliver more than the sum of their parts. Vendors believe that platforms represent the future of the cybersecurity technology industry, and while platforms do offer several important benefits for enterprises, the reality of what platforms can do today, and enterprises’ interest in them, paints a different picture. In this presentation, Omdia will share exclusive primary research data from its 2024 Omdia Cybersecurity Decision Maker survey to explain what security leaders think about platforms today, to illustrate why platforms offer potential for enterprises in areas like solution consolidation and improved outcomes, and to identify how vendors can improve their platform offerings to take of untapped market opportunities.

Fireside
12:55 PM - 1:10 PM

Speaker(s): Steven Riley, Principal Solutions Architect, Cortex, Palo Alto Networks
Networking Break
1:10 PM - 1:20 PM

Keynote
1:20 PM - 2:05 PM

Dark Reading The Pragmatic CISO’s New Year’s Resolutions for 2025

Sponsored by: Wiz
Speaker(s): Wendy Nather, cyber industry veteran and former CISO
Moderated by: Fahmida Rashid, Managing Editor, Features, Dark Reading

Security leaders have finite time, people, and money, but it sometimes feels like everything in security important and needs to be top priority. They have to decide what parts of the security program need their focus. What security fundamentals should teams focus on? Do they shore up legacy technology or go cloud-native? What new initiatives and projects should they pursue? All of this is important — as well as the hardest question of all: what should be de-prioritized? In this keynote, a security practitioner steps through key promises and goals security leaders need to think about for their teams as they head into 2025.

Fireside Chat
2:05 PM - 2:20 PM

Speaker(s): Swaroop Sham, Product Marketing, Wiz
Break
2:20 PM - 2:25 PM

Keynote
2:25 PM - 3:10 PM

5 Ways to Fortify Your Cyber Defenses in 2025

Sponsored by: Automox
Speaker(s): Trevin Edgeworth, Red Team Practice Director, Bishop Fox
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

The days of avoiding a cyberattack are long gone. Cyber threats today are pervasive, persistent, and increasingly the handiwork of professionals. No one is immune, no matter how small or large the organization. With that certainty in mind, what types of cyber threats should you worry most about and how can you bolster your defenses against them? In this keynote, an industry expert will reveal five key things you can do to enhance your security posture for the latest cyber threats you’ll face in the coming year.

Fireside Chat
3:10 PM - 3:25 PM

Speaker(s): Michael Bollman, Senior Product Marketing Manager, Automox
Spotlight Webinars
3:25 PM - 3:55 PM

Securing Multi-Cloud Environments

Sponsored by: Darktrace
Speaker(s): Kellie Regan, Director, Product Marketing – Cloud Security, Darktrace; Sam Wolfshohl, Senior Cloud Technical Specialist

As organizations increasingly adopt multi-cloud architectures, the need for advanced, real-time threat detection and response is critical to keep pace with evolving cloud threats. In this webinar, join our Cloud Security and AI experts to explore the rapidly evolving field of Cloud Detection and Response (CDR), which focuses on identifying, analyzing, and mitigating sophisticated threats within dynamic multi-cloud environments.

Watch on demand to learn how to:‍

  • Leverage Self-Learning AI for real-time detection and response across multi-cloud environments. ‍
  • Improve operational efficiency with high-fidelity, agentless deployment and seamless integration with Microsoft Azure and AWS.‍
  • Streamline SOC operations through unified multi-cloud visibility, automated threat investigation, and Autonomous Response for faster, more efficient threat mitigation.
  • See Darktrace / CLOUD in action with a a product demonstration.

Learn more about how different uses of AI can help make protecting data in the cloud easier for security teams in the white paper “The CISO’s Guide to Cloud Security.

Spotlight Webinars
3:25 PM - 3:55 PM

Spotlight Webinar - Fight Tech with Tech: Success at the frontlines of the AI-powered SOC

Sponsored by: PAN
Speaker(s): Carlo Tarantini, Sr. Product Marketing Manager, EMEA, Palo Alto Networks

Modern applications, workloads and microservices are generating vast amounts of data faster than most security operations centers (SOCs) can adapt. And security teams operating on a legacy SOC model can spend hours — even days — triaging a single threat event. How can SOC teams outpace modern threats? By fighting technology with technology and leaning into AI to augment analysts, SOC teams can amp up their defenses and focus on more critical issues. Join us to hear how real teams improved their security outcomes with a machine-led, human-empowered SecOps platform.

At the event, you will hear detailed Cortex® XSIAM™ case studies. Gain insights on:

  • Unleashing machine learning and automation in your SOC
  • Streamlining your existing security stack, including SIEM and endpoint.
  • Outperforming benchmarks for detection and response times.
Spotlight Webinars
3:25 PM - 3:55 PM

Spotlight Webinar - Cloud Threat Landscape: 2024 & Beyond

Sponsored by: Wiz
Speaker(s): Amitai Cohen, Attack Vector Intel Lead, Wiz

As of May 2024, the Wiz Research team has analyzed over 200 cloud security incidents, identified 65 threat actors, and tracked 155 attack techniques alone. With cloud adoption on the rise, security teams now need to understand the threat landscape to stay ahead of evolving risks.

Join Amitai Cohen from the Wiz Research team for a deep dive into today’s current cloud landscape to discover the latest industry trends and most notable threats, including:

  • Who’s targeting the cloud
  • The top 5 most common cloud threats
  • What your organization should prioritize today
Spotlight Webinars
3:25 PM - 3:55 PM

Spotlight Webinar - The IT Admin's Guide to Safe Automation

Sponsored by: Automox
Speaker(s): Katherine Chipdey - Director, Solutions Engineering, Automox

With the ever changing nature of IT and the rising number of cyber threats these days, IT teams are struggling to keep up without the help of automation. Despite that, many organizations cite security concerns as a significant barrier to using automation in endpoint management. In this on-demand webinar, we’ll walk you through a 3 step guide on how to adopt safe automation that keeps your environment safe and up-to-date with a healthy balance of tech and human talent.

Join us to learn:

  • A step by step guide to safe automation adoption
  • Why automation is key to personal and organizational maturity
  • What security certifications to look for in endpoint management tools
Panel
3:55 - 4:25PM

What Every Enterprise Should Know About Cloud Security

Sponsored by: CardinalOps & Delinea
Speaker(s): Sri Chandrasekaran, senior director, IEEE; Pascal Menezes, CTO, MEF; Tony Goulding, Senior Director, Technical Product Marketing, Delinea; Kish Galappatti, Senior Sales Engineer, CardinalOps
Moderated by: Tara Seals, Managing Editor for News, Dark Reading

Cloud adoption may be hopping, but many enterprises still struggle to identify and manage their security risks with these applications and services. Many don’t even yet have a full accounting of cloud adoption in their organization, and that challenge will only intensify as more services and identities come online in the cloud. In this panel discussion, cloud security experts will discuss the latest tools, technologies, and strategies for managing and securing cloud assets to build a solid cloud security posture in the coming year.

Break
4:25 PM - 4:30 PM

Panel
4:30 PM - 5:00 PM

How to Use AI for Security Good

Sponsored by: Google, Cisco
Speaker(s): Mr. Tejas Patel, DARPA program manager; Dr. Seth Dobrin, CEO, Qantm AI; Anton Chuvakin, Senior Staff Security Consultant, Office of the CISO, Google Cloud; Papi Menon CPO / VP of Product Management, Outshift by Cisco
Moderated by: Becky Bracken, Senior Editor, Dark Reading

Generative AI tools have placed powerful artificial intelligence in the hands of everyone – threat actors, defenders, and everyday users. This and other AI capabilities will become even more entrenched in the coming year. How do you harness AI to secure your organization while battling threat actors using it as well? In this panel discussion, experts will explain how to protect your organization with emerging AI tools and features both as a security tool and for writing more secure code.

On Demand Demo

The Art of Zero Trust Identity: A Unified Approach Towards Secure Access Management

Sponsored by: Okta
Speaker(s): Yazan Albikawi, Solutions Engineer, Okta

Secure access begins with people, and shaping security structures and access measures to defend against identity-based attacks is essential.
In this demo, Yazan Albikawi (Solutions Engineer, Okta) explains the zero trust landscape, covering protection from initial touchpoints to applications, and securing infrastructure access by extending the architecture to systems. Security starts with identity, tune in to learn more about Okta Zero Trust Access & Unified Identity.

On Demand Demo

An inside look at RevealX NDR

Sponsored by: ExtraHop
Speaker(s): Sonal Shetkar, Sales Engineering Director, ExtraHop

See how RevealX delivers the visibility organizations need to reveal cyber risk and build resilience.
You’ll learn how to:

  • Investigate smarter: RevealX analyzes the network traffic running through your environments, giving you real-time insights into threats and eliminating visibility blind spots.
  • Stop threats faster: Our platform uses over 1 million predictive models to assess thousands of unique signatures, spotting anomalous and suspicious behaviors that other tools miss completely.
  • Move at the speed of risk: After investigating, users can quickly pivot to response with a broad set of native integrations across other security tools.
On Demand Demo

Minimizing the Attack Surface with Axonius

Sponsored by: ExtraHop
Speaker(s): James Flores, Technical Evangelist, Axonius

In today’s digital-first world, every asset, device, application, and user represents both an essential connection and a potential vulnerability. As organizations expand across a vast and complex web of interconnected systems, security teams are faced with a nearly impossible challenge: how to track every asset, identify risks, and confidently secure their entire digital ecosystem.

Join us for an insightful session where we break down how to manage and secure the ever-expanding attack surface. Discover how Axonius can help make actionable sense of your asset data—giving you a single source of truth to find, understand, and resolve exposure from every angle.

Key Takeaways:

  • Understand what constitutes your full attack surface and why each element matters
  • Learn strategies to track and evaluate assets in real-time across your organization
  • Gain insights on how to centralize threat detection and prioritize risk remediation

See how Axonius empowers your security team to stay ahead of threats with a comprehensive, unified approach.

Cybersecurity Outlook 2025

December 5, 2024
11:00am -5:00pm ET | Doors Open at 10:30am ET

Speakers
Sam Wolfshohl
Senior Cloud Technical Specialist
Sam Wolfshohl leads the Cloud Solutions Architects at Darktrace. Over his 10+ years of security focus, he has worked with many of the largest companies in the world, led development of Cloud, Email and Malware focused security products and has brought multiple security products to market.
Kellie Regan
Director, Product Marketing – Cloud Security, Darktrace
Kellie Regan is a passionate cybersecurity product marketing professional and a lifelong learner with over a decade of experience in high-tech SaaS marketing.
James Flores
Technical Evangelist, Axonius
James Flores is a seasoned product marketing professional with extensive experience in cybersecurity and technology.
Sonal Shetkar
Sales Engineering Director, ExtraHop
Sonal Shetkar is a Sales Engineering Director and Strategic Advisor for ExtraHop supporting large, highly-regulated customers in the financial services, healthcare, and telecommunications sectors including several Fortune 100 companies.
Dr. Seth Dobrin
CEO, Qantm AI,
Dr. Seth Dobrin is a pioneering artificial intelligence (AI) and data science leader renowned for his transformative work across industries. At Monsanto, he revolutionized agriculture by integrating AI to enhance farming through precision techniques.
Yazan Albikawi
Solutions Engineer, Okta
Yazan Albikawi is a Solutions Engineer at Okta, specializing in network access and Identity management. With extensive experience, he helps customers across different sectors enhance their Identity security posture.
Papi Menon
CPO / VP of Product Management, Outshift by Cisco
Papi leads the Outshift team as CPO / VP of Product, developing what's next and new in tech at Cisco.
Mr. Tejas Patel
DARPA program manager
Mr. Tejas Patel joined DARPA as a program manager in August 2019 to develop, execute, and transition programs in cyberspace operations and other defense mission areas.
Becky Bracken
Senior Editor, Dark Reading
Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.
Pascal Menezes
CTO, MEF
Pascal Menezes, co-founder and CTO of the MEF.
Sri Chandrasekaran
Senior director, IEEE
Srikanth Chandrasekaran has been associated with the IEEE since 2012, focusing on developing key standardisation programs in emerging areas focusing on building end-to-end trustworthy devices and systems with emphasis on cybersecurity, identity and privacy through his practice.
Tara Seals
Managing Editor for News, Dark Reading
Tara Seals has 25+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine.
Carlo Tarantini
Sr. Product Marketing Manager, EMEA, Palo Alto Networks
Carlo Tarantini is the Senior Product Marketing Manager for Cortex at Palo Alto Networks.
Michael Bollman
Senior Product Marketing Manager, Automox
Mike Bollman is a Senior Product Marketing Manager at Automox and has spent 20 years in high-tech marketing specializing in data storage, networking, server, virtualization, cloud, SaaS and cybersecurity solutions.
Trevin Edgeworth
Red Team Practice Director, Bishop Fox
Trevin Edgeworth is the Red Team Practice Director at Bishop Fox, where he focuses on building and leading best-in-class adversary emulation services to help customers of all sizes and industries strengthen their defenses against current and emerging threats.
Wendy Nather
Cyber Industry Veteran and Former CISO
Wendy Nather has been working in cybersecurity for over 25 years.  She was previously Director of Advisory CISOs at Duo Security, and Research Director at the Retail ISAC, where she was responsible for advancing the state of resources and knowledge to help organizations defend their infrastructure from attackers.
Steven Riley
Principal Solutions Architect, Cortex, Palo Alto Networks
Steven Riley is the Principal Solutions Architect on the Cortex team at Palo Alto Networks. In this role, he focuses on advancing security solutions within the Security Operations space and guides enterprise customers in leveraging the latest Platform offerings.
Nicole Carignan
VP of Strategic Cyber AI, Darktrace
Nicole Carignan is the VP of Strategic Cyber AI for Darktrace, and she has 25 years of experience in cybersecurity, networks, computer science, data science/artificial intelligence and IT supporting numerous private and public institutions in cybersecurity solutions and data science.
Fahmida Y Rashid headshot
Fahmida Y. Rashid
Managing Editor of Features, Dark Reading
Fahmida Y Rashid is Dark Reading’s managing editor, focusing on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers.
Anton Chuvakin
Senior Staff Security Consultant, Office of the CISO
Dr. Anton Chuvakin works for the Office of the CISO of Google Cloud, where he arrived via Chronicle Security (an Alphabet company) acquisition in July 2019. Before that, Anton was a Research Vice President and Distinguished Analyst at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies team.
Kish Galappatti
Senior Sales Engineer, CardinalOps
Kish Galappatti, Senior Sales Engineer at CardinalOps is a data security professional with over 20 years experience implementing cybersecurity and data privacy solutions for enterprise clients. Kish has a background in the financial services industry where he built large scale distributed systems.
Eric Parizo
Managing Principal Analyst, Omdia Cybersecurity
Eric Parizo supports Omdia's Cybersecurity Accelerator, its research practice supporting vendor, service provider, and enterprise clients in the area of enterprise cybersecurity. Eric covers global cybersecurity trends and top-tier vendors in North America.
Swaroop Sham headshot
Swaroop Sham
Product Marketer, Wiz.io
Swaroop Sham is a Product Marketer at Wiz. His current focus areas include CNAPP, Container and Kubernetes Security, and more. In previous roles, Swaroop has dabbled in Authentication, Threat Detection, Email security, and application software development.
Amitai Cohen
Threat Researcher, Wiz
Amitai leads the Attack Vector Intelligence team at Wiz, where he manages investigations of threats to cloud environments and works to advance research and detection methodology. Amitai is also a maintainer of the cloudvulndb.org open-source project, and co-hosts the "Crying out Cloud" podcast.
Tony Goulding
Senior Director, Technical Product Marketing, Delinea
Tony is a cyber security evangelist at Delinea helping deliver cloud identity security solutions to secure modern enterprises and stop the leading cause of breaches — privileged access abuse. Internally he’s a Senior Director in Technical Product Marketing, involved with product positioning and messaging, analyst relations, and more.
Becky Bracken
Senior Editor, Dark Reading
Becky Bracken has built a decades-long journalism career with a focus on cybersecurity issues and serves as an editor for Dark Reading.
Tara Seals
Managing Editor, News, Dark Reading
Tara Seals has 25+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties.
Katherine Chipdey
Katherine Chipdey
Manager, Solutions Engineering, Automox
Katherine Chipdey manages the Enterprise Solutions Engineer Team at Automox, where she works to simplify IT operations, increase security, and bridge that gap between those teams for prospects and customers alike. In this role, Katherine enjoys using her background and experiences in the the field to enable companies to be as successful as possible
Maxine Holt
Maxine Holt
VP Research Enterprise, Omdia
Maxine Holt leads the Enterprise research group incorporating Omdia digital infrastructure and enterprise business applications, and the Canalys Channels research. Having spent a decade in cybersecurity, she is the lead architect of the Omdia Cybersecurity Ecosystem.
Sponsors
DIAMOND
PLATINUM
GOLD
© 2024 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service