Cybersecurity Outlook 2025

December 5, 2024
11:00am -5:00pm ET | Doors Open at 10:30am ET

Cybersecurity Outlook 2025

In December 2024, Cybersecurity Outlook 2025 will look at some of the newest threats posed by cybercriminals and nation-states, as well as evolving products and technologies that may help mitigate those threats. You’ll hear from some of the cybersecurity industry’s leading analysts and experts, as well as researchers who have been examining the next wave of cyber threats and attacks.

Topics Include:
New cyber threats and attack trends to watch for in the new year and how to defend against them
Evolving products and technologies that may help mitigate cyber-threats
Security risks with cloud adoption
How to harness AI to secure your organization
The Newest threats posed by cybercriminals
Much more!
Agenda
Keynote
11:00 AM – 11:45 PM

2025 Outlook: Trends Ahead in Cybersecurity

Sponsored by: Darktrace
Moderated by: Maxine Holt, VP Research Enterprise, Omdia

Cybersecurity is a complex battlefield, with threats intensifying while resilience remains critical. In this keynote, Omdia will unveil the cybersecurity trends set to define 2025 and offer actionable strategies to help your organization stay ahead.

Fireside Chat
11:45 AM - 12:00 PM

Speaker(s): Nicole Carignan, VP of Strategic Cyber AI, Darktrace
Networking Break
12:00 PM - 12:10 PM

Keynote
12:10 PM - 12:55 PM

Cybersecurity Platforms: Triangulating Hype, Reality, and Opportunity

Sponsored by: Palo Alto Networks
Moderated by: Eric Parizo, Managing Principal Analyst, Omdia Cybersecurity

Many cybersecurity vendors have sought to position their solutions as platforms – multifaceted integrated solution sets that purport to deliver more than the sum of their parts. Vendors believe that platforms represent the future of the cybersecurity technology industry, and while platforms do offer several important benefits for enterprises, the reality of what platforms can do today, and enterprises’ interest in them, paints a different picture. In this presentation, Omdia will share exclusive primary research data from its 2024 Omdia Cybersecurity Decision Maker survey to explain what security leaders think about platforms today, to illustrate why platforms offer potential for enterprises in areas like solution consolidation and improved outcomes, and to identify how vendors can improve their platform offerings to take of untapped market opportunities.

Fireside
12:55 PM - 1:10 PM

Speaker(s): Steven Riley, Principal Solutions Architect, Cortex, Palo Alto Networks
Networking Break
1:10 PM - 1:20 PM

Keynote
1:20 PM - 2:05 PM

Dark Reading The Pragmatic CISO’s New Year’s Resolutions for 2025

Sponsored by: Wiz
Speaker(s): Wendy Nather, cyber industry veteran and former CISO
Moderated by: Fahmida Rashid, Managing Editor, Features, Dark Reading

Security leaders have finite time, people, and money, but it sometimes feels like everything in security important and needs to be top priority. They have to decide what parts of the security program need their focus. What security fundamentals should teams focus on? Do they shore up legacy technology or go cloud-native? What new initiatives and projects should they pursue? All of this is important — as well as the hardest question of all: what should be de-prioritized? In this keynote, a security practitioner steps through key promises and goals security leaders need to think about for their teams as they head into 2025.

Fireside Chat
2:05 PM - 2:20 PM

Speaker(s): Swaroop Sham, Product Marketing, Wiz
Break
2:20 PM - 2:25 PM

Keynote
2:25 PM - 3:10 PM

5 Ways to Fortify Your Cyber Defenses in 2025

Sponsored by: Automox
Speaker(s): Trevin Edgeworth, Red Team Practice Director, Bishop Fox
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

The days of avoiding a cyberattack are long gone. Cyber threats today are pervasive, persistent, and increasingly the handiwork of professionals. No one is immune, no matter how small or large the organization. With that certainty in mind, what types of cyber threats should you worry most about and how can you bolster your defenses against them? In this keynote, an industry expert will reveal five key things you can do to enhance your security posture for the latest cyber threats you’ll face in the coming year.

Fireside Chat
3:10 PM - 3:25 PM

Speaker(s): Michael Bollman, Senior Product Marketing Manager, Automox
Spotlight Webinars
3:25 PM - 3:55 PM

Securing Multi-Cloud Environments

Sponsored by: Darktrace
Speaker(s): Kellie Regan, Director, Product Marketing – Cloud Security, Darktrace; Sam Wolfshohl, Senior Cloud Technical Specialist

As organizations increasingly adopt multi-cloud architectures, the need for advanced, real-time threat detection and response is critical to keep pace with evolving cloud threats. In this webinar, join our Cloud Security and AI experts to explore the rapidly evolving field of Cloud Detection and Response (CDR), which focuses on identifying, analyzing, and mitigating sophisticated threats within dynamic multi-cloud environments.

Watch on demand to learn how to:‍

  • Leverage Self-Learning AI for real-time detection and response across multi-cloud environments. ‍
  • Improve operational efficiency with high-fidelity, agentless deployment and seamless integration with Microsoft Azure and AWS.‍
  • Streamline SOC operations through unified multi-cloud visibility, automated threat investigation, and Autonomous Response for faster, more efficient threat mitigation.
  • See Darktrace / CLOUD in action with a a product demonstration.

Learn more about how different uses of AI can help make protecting data in the cloud easier for security teams in the white paper “The CISO’s Guide to Cloud Security.

Spotlight Webinars
3:25 PM - 3:55 PM

Spotlight Webinar - Fight Tech with Tech: Success at the frontlines of the AI-powered SOC

Sponsored by: PAN
Speaker(s): Carlo Tarantini, Sr. Product Marketing Manager, EMEA, Palo Alto Networks

Modern applications, workloads and microservices are generating vast amounts of data faster than most security operations centers (SOCs) can adapt. And security teams operating on a legacy SOC model can spend hours — even days — triaging a single threat event. How can SOC teams outpace modern threats? By fighting technology with technology and leaning into AI to augment analysts, SOC teams can amp up their defenses and focus on more critical issues. Join us to hear how real teams improved their security outcomes with a machine-led, human-empowered SecOps platform.

At the event, you will hear detailed Cortex® XSIAM™ case studies. Gain insights on:

  • Unleashing machine learning and automation in your SOC
  • Streamlining your existing security stack, including SIEM and endpoint.
  • Outperforming benchmarks for detection and response times.
Spotlight Webinars
3:25 PM - 3:55 PM

Spotlight Webinar - Cloud Threat Landscape: 2024 & Beyond

Sponsored by: Wiz
Speaker(s): Amitai Cohen, Attack Vector Intel Lead, Wiz

As of May 2024, the Wiz Research team has analyzed over 200 cloud security incidents, identified 65 threat actors, and tracked 155 attack techniques alone. With cloud adoption on the rise, security teams now need to understand the threat landscape to stay ahead of evolving risks.

Join Amitai Cohen from the Wiz Research team for a deep dive into today’s current cloud landscape to discover the latest industry trends and most notable threats, including:

  • Who’s targeting the cloud
  • The top 5 most common cloud threats
  • What your organization should prioritize today
Spotlight Webinars
3:25 PM - 3:55 PM

Spotlight Webinar - The IT Admin's Guide to Safe Automation

Sponsored by: Automox
Speaker(s): Katherine Chipdey - Director, Solutions Engineering, Automox

With the ever changing nature of IT and the rising number of cyber threats these days, IT teams are struggling to keep up without the help of automation. Despite that, many organizations cite security concerns as a significant barrier to using automation in endpoint management. In this on-demand webinar, we’ll walk you through a 3 step guide on how to adopt safe automation that keeps your environment safe and up-to-date with a healthy balance of tech and human talent.

Join us to learn:

  • A step by step guide to safe automation adoption
  • Why automation is key to personal and organizational maturity
  • What security certifications to look for in endpoint management tools
Panel
3:55 - 4:25PM

What Every Enterprise Should Know About Cloud Security

Sponsored by: CardinalOps & Delinea
Speaker(s): Sri Chandrasekaran, senior director, IEEE; Pascal Menezes, CTO, MEF; Tony Goulding, Senior Director, Technical Product Marketing, Delinea; Kish Galappatti, Senior Sales Engineer, CardinalOps
Moderated by: Tara Seals, Managing Editor for News, Dark Reading

Cloud adoption may be hopping, but many enterprises still struggle to identify and manage their security risks with these applications and services. Many don’t even yet have a full accounting of cloud adoption in their organization, and that challenge will only intensify as more services and identities come online in the cloud. In this panel discussion, cloud security experts will discuss the latest tools, technologies, and strategies for managing and securing cloud assets to build a solid cloud security posture in the coming year.

Break
4:25 PM - 4:30 PM

Panel
4:30 PM - 5:00 PM

How to Use AI for Security Good

Sponsored by: Google, Cisco
Speaker(s): Mr. Tejas Patel, DARPA program manager; Dr. Seth Dobrin, CEO, Qantm AI; Anton Chuvakin, Senior Staff Security Consultant, Office of the CISO, Google Cloud; Papi Menon CPO / VP of Product Management, Outshift by Cisco
Moderated by: Becky Bracken, Senior Editor, Dark Reading

Generative AI tools have placed powerful artificial intelligence in the hands of everyone – threat actors, defenders, and everyday users. This and other AI capabilities will become even more entrenched in the coming year. How do you harness AI to secure your organization while battling threat actors using it as well? In this panel discussion, experts will explain how to protect your organization with emerging AI tools and features both as a security tool and for writing more secure code.

On Demand Demo

The Art of Zero Trust Identity: A Unified Approach Towards Secure Access Management

Sponsored by: Okta
Speaker(s): Yazan Albikawi, Solutions Engineer, Okta

Secure access begins with people, and shaping security structures and access measures to defend against identity-based attacks is essential.
In this demo, Yazan Albikawi (Solutions Engineer, Okta) explains the zero trust landscape, covering protection from initial touchpoints to applications, and securing infrastructure access by extending the architecture to systems. Security starts with identity, tune in to learn more about Okta Zero Trust Access & Unified Identity.

On Demand Demo

An inside look at RevealX NDR

Sponsored by: ExtraHop
Speaker(s): Sonal Shetkar, Sales Engineering Director, ExtraHop

See how RevealX delivers the visibility organizations need to reveal cyber risk and build resilience.
You’ll learn how to:

  • Investigate smarter: RevealX analyzes the network traffic running through your environments, giving you real-time insights into threats and eliminating visibility blind spots.
  • Stop threats faster: Our platform uses over 1 million predictive models to assess thousands of unique signatures, spotting anomalous and suspicious behaviors that other tools miss completely.
  • Move at the speed of risk: After investigating, users can quickly pivot to response with a broad set of native integrations across other security tools.
On Demand Demo

Minimizing the Attack Surface with Axonius

Sponsored by: ExtraHop
Speaker(s): James Flores, Technical Evangelist, Axonius

In today’s digital-first world, every asset, device, application, and user represents both an essential connection and a potential vulnerability. As organizations expand across a vast and complex web of interconnected systems, security teams are faced with a nearly impossible challenge: how to track every asset, identify risks, and confidently secure their entire digital ecosystem.

Join us for an insightful session where we break down how to manage and secure the ever-expanding attack surface. Discover how Axonius can help make actionable sense of your asset data—giving you a single source of truth to find, understand, and resolve exposure from every angle.

Key Takeaways:

  • Understand what constitutes your full attack surface and why each element matters
  • Learn strategies to track and evaluate assets in real-time across your organization
  • Gain insights on how to centralize threat detection and prioritize risk remediation

See how Axonius empowers your security team to stay ahead of threats with a comprehensive, unified approach.

Cybersecurity Outlook 2025

December 5, 2024
11:00am -5:00pm ET | Doors Open at 10:30am ET

Speakers
Coming Soon
Sponsors
DIAMOND
PLATINUM
GOLD
© 2025 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service