Just in time for the new year, Cybersecurity Outlook 2026 will look at some of the newest threats posed by cybercriminals and nation-states, as well as evolving technologies that may help mitigate those threats. You’ll hear from some of the cybersecurity industry’s leading analysts and experts, as well as researchers who have been examining the next wave of cyber threats, AI-driven technologies and other cybersecurity tools to help organizations defend their networks.
2026 Outlook: Trends Ahead in Cybersecurity
As cybersecurity evolves into an increasingly complex battlefield with sophisticated threat vectors and the emergence of agentic AI, organizational resilience has never been more critical. Join this Omdia keynote to discover the key cybersecurity trends that will define 2026 and gain valuable insights into how forward-thinking organizations are preparing for these challenges.
Cybersecurity AI Agents: From Intent to Scale
Enterprise deployment of AI applications is accelerating, including the use of agentic AI, which is a combination of technologies and techniques that create an architecture for building AI agents that are highly autonomous, with potential for transformative results. Within the cybersecurity software stack, AI agents enable proactive and immediate security solutions. In this session, Omdia will explore enterprise readiness to deploy cybersecurity agents, which areas will be prioritized, and what business models will win out.
AI for DevSecOps
Secure software development continues to pose challenges for many organizations, but AI tools could help revitalize stalled DevSecOps programs at the same time agentic AI is helping speed up code development. In this keynote, an application security expert will outline how AI technology can be used to automate code repository-monitoring, expose vulnerabilities and analyze risk of exploitation, and automatically remediate issues – as well as provide recommendations for deploying it securely.
CISO’s Guide to a Happy New Year
There are no shortage of cyber threats facing today’s enterprise, and CISOs face the daunting challenges of architecting a security strategy, building a solid security team with a tight budget, and prioritizing security projects to meet the moment. In this keynote, a security practitioner shares their perspective and insights on how security leaders can prioritize and set their key goals as they head into the New Year.
The Secure AI Blueprint for Enterprises
Navigating the future of AI requires a new kind of blueprint. Join Aaron Isaksen, VP, AI Research & Engineering at Palo Alto Networks, for a discussion that goes beyond the hype to explore the core principles of building and trusting AI. We’ll discuss why a secure-by-design approach is critical, how AI is transforming the cybersecurity talent landscape, and the urgent need to secure the entire AI ecosystem as it rapidly evolves. This live event offers a practical blueprint for the future of AI in cybersecurity.
Embedding Security Directly Into AI Coding Assistants and Workflows
AI is rapidly shifting the way enterprise code is constructed, leaving legacy security tools
unequal to the challenges of ‘vibe coding’, where AI agents interact with external tools, data
and models – dramatically expanding the risk surface in the software generated.
Snyk argues that, as a result, the underlying security model must change to meet the
increases in vulnerabilities. Its response is Secure At Inception – the principle of embedding
security directly into the AI-driven development process from the outset.
Secure At Inception consists of innovations focused on Snyk’s MCP Server technology, and
implements new safeguards to shift security to the very first prompt, enabling developers to
build trustworthy software that’s secured all along the line.
Join this solutions-led webinar in which Snyk’s Randall Degges (Senior Director, Developer Relations) explains, using live demos,
how security can now be natively embedded into coding workflows with Snyk’s MCP Server.
In this webinar you will:
– Gain an inside perspective on the current state of AI-driven software development and its
potential pitfalls.
– Learn how to gain visibility into generative AI, agentic and Model Context Protocol (MCP)
components in enterprise software.
– Find out how Snyk’s MCP Server allows AI agents to securely invoke Snyk’s full suite of
scanning engines directly within agentic workflows.
Cloud Security Maturity Framework: Best Practices to Operationalize Cloud Security
Cloud complexity continues to grow in organizations as cloud and AI development accelerate. In response, many organizations have transformed their cloud security operating model, with over 50% of Wiz customers achieving zero critical issues across their cloud environment. This session will cover best practices and insights from those journeys, including how to democratize security, prioritize risks, and consolidate siloed tooling while bringing developers, DevOps, SOC, and now AI teams along on the cloud security journey.
Voices of Trust: What 300 Security Leaders Revealed
Join HID PKI-as-a-Service Expert Marcus Silwer for a first look at HID’s upcoming market study on PKI, CLM, and the future of digital trust. These exclusive insights will help organizations understand how to approach upcoming certificate lifespans in 2026, while setting them up for future-readiness as certificate lifespans continue to shrink down to 47-days by 2029.
Cloud Security Forecast
Cloud services and applications are becoming the norm in enterprises, but many organizations still struggle to identify and address security risks with the cloud, such as a full accounting of all devices, accounts, and identities. In this panel discussion, cloud security experts will discuss the cloud cyber risks and the latest tools, technologies, and strategies for managing and securing cloud assets to build a solid cloud security posture in the coming year.
New Year’s Resolutions for the Security Operations Team
With today’s evolving threat landscape, new threat actors, and the emergence of AI, enterprise security posture also must constantly evolve and adapt. What are the main priorities security teams should implement in 2026 to best keep their infrastructure secure? In this panel discussion, experts will share the most important security issues that SecOps teams should address in the coming year, key technologies that can help, and the best practices for executing these New Year’s resolutions.
Integrating Cloud Breaking the silos between Cloud Security - and everything else...
Cloud security can’t operate in a silo. When CNAPP findings live in one console, vulnerability management in another, and identity security somewhere else, the result is blind spots and an incomplete picture of organizational risk.
In this breakout session, Tenable demonstrates how to integrate CNAPP capabilities into a unified exposure management strategy. See how consolidating cloud misconfigurations, vulnerabilities, and identity risks alongside traditional infrastructure findings enables teams to answer: Where are we most exposed, and what should we fix first?
Learn how exposure management transforms cloud security from an isolated function into a force multiplier for your entire security operation.
Huntress: AI-Assisted, Human-Led Defense for 2026 Threats
Anton Arutski of the Huntress SOC outlines the 2026 landscape where AI fuels sophisticated ransomware attacks. Huntress provides enterprise-grade security for all businesses by pairing cutting-edge AI tools with a 24/7 human-led defense.
A critical case study demonstrated this necessity: an exposed RDP server was breached, and ransomware was deployed in just 15 minutes. The Huntress SOC instantly detected the malicious activity, isolated the network, and prevented encryption, proving that skilled people are essential to defeat human adversaries. The future of security relies on resilient defense and the right partner.
Key Takeaways
Redefining Cloud Security in the Era of AI and Automation
Cloud Investigations are broken – evidence disappears and when you do have evidence, reviewing it is manual and slow. Additionally, most teams lack the expertise to perform cloud investigations thoroughly. In this session, we’ll dive into these challenges, and how Darktrace’s new product – the industry’s only truly automated cloud forensics solutions – Forensic Acquisition and Investigation, solves them.

































