Cybersecurity's Most Promising New and Emerging Technologies

March 20, 2025
11:00am – 5:00pm ET | Doors Open at 10:30am ET

The rapid-fire emergence of generative AI, along with widespread cloud adoption, has reshaped the network landscape for security operations teams. Cyber threat actors have shifted their attacks accordingly, leaving security teams scrambling to ensure their existing defenses can hold up against new waves of threats powered by AI and attacks targeting cloud assets.

This full-day virtual event is designed to update cybersecurity teams on some of the most promising emerging cybersecurity technologies and provide advice on adopting them in their organization. Attendees will hear about state-of-the-art techniques and technologies for securing their cloud-based assets and accounts, and hybrid network infrastructure. They’ll learn how to secure critical data and systems from persistent cybercriminals and nation-states. Additionally, they will gain insights into next-gen tools that can help augment and integrate with existing tools and processes. These tools can also automate many manual tasks that burden SecOps teams.

Topics Include:
The latest threats to the cloud environment as well as best practices, tools, and technologies that can help you!
Streamlining security tools with new technologies to better shore up your defenses.
Harnessing AI for good as a security tool, for both your secure application development (DevSecOps) and SecOps teams.
And much more!
Agenda
Keynote
11:00am – 11:45am ET

Cutting-Edge Cybersecurity Technologies

Sponsored by: Google
Speaker(s): Chenxi Wang, Founder & General Partner, Rain Capital | Payal Chakravarty, Director of Product Management, Google
Moderated by: Fahmida Y Rashid, Managing Editor, Features - Dark Reading

Thousands of cybersecurity vendors and service providers are regularly launching new products and products and services. In this keynote address, a top cyber technology expert goes beyond the hype and sheds light on some of the newest technologies and trends and offers tips and recommendations on how to determine which security technologies can best help you secure your enterprise in 2025.

Fireside Chat
11:45am – 12:00pm ET

Keynote
12:05pm – 12:50pm ET

A CISO’s Guide to Next-Gen Cyber Defenses

Sponsored by: Wiz
Speaker(s): Melina Scotto, CISO Advisor, Mastin Associates and former CISO | Yotam Meitar, Director, Cloud Response, Wiz
Moderated by: Kelly Jackson Higgins, Editor-in-Chief, Dark Reading

Fresh cybersecurity technologies can be exciting and promising, but organizations still face challenges in blending these new tools and approaches with their existing security technologies.

In this keynote address, an experienced security practitioner offers insights for chief information security officers (CISOs) on integrating some of the hottest emerging technologies and disciplines into an existing IT security environment to ensure a smooth shift to a stronger defense.

Fireside Chat
12:50pm – 1:05pm ET

Spotlight Webinar
1:10pm – 1:40pm ET

The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response

Sponsored by: Google
Speaker(s): Luke McNamara, Deputi Chieg Analyst, Mandiant

A new wave of machine learning, deep learning, and artificial intelligence technology promises to help IT security operations teams detect cyber threats sooner and respond to them more quickly. But machine learning is used in a wide variety of ways, and not all machine learning-based products work in the same fashion. In this webinar, experts will discuss the ways that machine learning can help in security operations, how it can speed threat analysis, and how to evaluate and choose technologies that will work in your organization.

During this webinar you will:

  • Get a detailed overview of machine learning and what each can do for IT SecOps
  • Hear advice from experts about how to determine the right machine learning tools for your environment
  • Identify specific areas where machine learning can currently directly benefit enterprise security operations
Spotlight Webinar
1:10pm – 1:40pm ET

Cloud Detection & Response: A Living off the Cloud Attack

Sponsored by: Wiz
Speaker(s): Yotam Meitar, Director, Cloud Response, Wiz

Living off the cloud attacks are on the rise. Executing rapid, cloud-native techniques to escalate privileges, move laterally between environments, and access critical assets, attackers are targeting the cloud more effectively than ever. This session will focus on a real-world living off the cloud attack case study, analyzing a step-by-step account of the attack as it unfolded from attackers’ perspective.

We will then switch gears and rewind the attack, explaining how effective detection and response methodologies could — and should — have prevented every step of the attack. Defeating these threats requires powerful centralized visibility and control of all cloud environments and resources. Our key takeaways will therefore be tailored to leveraging the best methodologies and tools to take back the initiative and stop even the most sophisticated cloud attacks.

Spotlight Session
1:45pm – 2:30pm ET

SecOps Transformation – Cybersecurity at Scale

Sponsored by: Palo Alto Networks
Speaker(s): Justin Edgar, Principal Architect, Palo Alto Networks

Today’s security operations centers are facing a barrage of “more”. More attacks. More threat vectors. More devices and data. More security tools. More regulations. More specialized focus areas. More silos. With the modern security landscape changing fast, the SOC must evolve to meet current threats, demands and pressures.

Join this Special Section discussion to learn:

  • Balancing business demands and a stable security architecture at scale
  • Gaining clarity with AI-driven intelligence
  • Integrating incident responses for faster reaction
Panel Session
2:35pm – 3:20pm ET

The Promise and Perils of AI

Sponsored by: KnowBe4 | Snyk
Panelists: Stephen Thoemmes, Senior Developer Advocate, Snyk | Erich Kron, Security Awareness Advocate, KnowBe4 | Caleb Sima, Chair, CSA’s AI Safety Initiative | Rob Ragan, Principal Technology Strategist, Bishop Fox
Moderated by: Jai Vijayan, Contributing Writer, Dark Reading

Generative AI has placed powerful artificial intelligence tools in the hands of everyone, including the bad guys. In this panel discussion, experts will explain how to protect your organization from a new generation of cyberattacks that leverage AI. You will learn how to harness AI for good as a security tool, for both your secure application development (DevSecOps) and SecOps teams.

Panel Session
3:25pm – 4:10pm ET

Securing Your Cloud(s)

Sponsored by: Sysdig
Panelists: Sergej Epp, CISO, Sysdig | Matt Girdharry, Global Lead - Security, Observability, DevOps, Amazon Web Services | Crystal Morin, Cybersecurity Strategist, Sysdig | Frank Kim, SANS, CISO, Advisor, Educator | Matthew McFadden, VP of Cyber, General Dynamics Information Technology
Moderated by: Becky Bracken, Sr. Editor, Dark Reading

Much of the challenge for protecting cloud assets is obtaining a clear and comprehensive picture of those assets and their dependencies. That includes devices, accounts, and human, machine, vendor, and service provider identities in cloud infrastructure and platform services. In this panel discussion, experts will discuss the latest threats to the cloud environment as well as best practices, tools, and technologies that can help enterprises manage and secure their cloud infrastructure — and understand how their cloud and SaaS providers protect their data (or not).

Panel Session
4:15pm – 5:00pm ET

Next-Gen SecOps

Sponsored by: Darktrace | runZero
Panelists: HD Moore, CEO and Founder, runZero | Sam Wolfshohl, Lead Cloud Solutions Architect, Darktrace | Andrew Braunberg, Principle Analyst, Omdia | Ben Radcliff, Senior Director, Security Operations, Optiv
Moderated by: Tara Seals, Managing Editor, Dark Reading

The security operations center (SOC) as we know it is evolving, with cloud-based managed services and tools that automate — and decentralize — security teams tasked with defending a far-flung enterprise infrastructure. How do you build out a modern SecOps team and which technologies should you adopt to drive it? How do ensure you have sufficient visibility into your cloud and other assets? In this panel discussion, experts explain how the latest tools and technologies are changing the way security teams gather and analyze threat data. You will learn how to streamline security tools with new technologies to better shore up your defenses and what that means for how you build out your team in this new world.

On Demand Demo
All Day

HID PKI-as-a-Service

Sponsored by: HID Global
Speaker(s): Marcus Silwer, Director of Product Marketing, HID Global | John Muirhead-Gould, Solution Architect, HID Global
On Demand Demo
All Day

The art of zero trust Identity: a Unified Approach Towards Secure Access Management

Sponsored by: Okta
Speaker(s): Yazan Albikawi, Solutions Engineer, Okta

The art of zero trust Identity: a Unified Approach Towards Secure Access Management: In this session, you’ll hear Yazan Albikawi, Solutions Engineer at Okta, share how organizations can solve for complex business requirements, while navigating the threat landscape, using a unified platform for Identity.

Tune in to hear:

  • Identity challenges we see organizations face today
  • Overview of unified identity access management
  • The role Identity plays in zero trust architecture
  • How to achieve Identity defense in-depth using Okta solutions
On Demand Demo
All Day

How to Think Like an Attacker

Sponsored by: Censys
Speaker(s): Tabatha Von Koelichen, Regional Sales Director, DACH and Central Europe, Censys | Harald Röder, Senior Solution Engineer, Censys

Cybersecurity's Most Promising New and Emerging Technologies

March 20, 2025
11:00am – 5:00pm ET | Doors Open at 10:30am ET

Speakers
Ben Radcliff
Senior Director, Security Operations, Optiv
Ben Radcliff is a security practitioner with over 15 years of experience in security and IT operations. Ben supports hundreds of clients across a wide array of sub disciplines including identity and access management, vulnerability analysis, public key infrastructure, and perimeter security. Ben joined Optiv in 2019.
Matthew McFadden
Matthew McFadden, VP of Cyber, General Dynamics Information Technology
Dr. Matthew McFadden is Vice President of Cyber, Distinguished Technologist, and leads the Cyber Center of Excellence for General Dynamics Information Technology (GDIT). GDIT offers a comprehensive portfolio of advanced cyber solutions and professional services to solve complex cyber mission challenges.
Frank Kim
SANS, CISO, Advisor, Educator
Frank Kim is a SANS Fellow where he leads the Cloud Security and Cybersecurity Leadership curricula to help shape and develop the next generation of security leaders. Previously, he served as the organization's CISO where he led the information risk function for the most trusted source of cybersecurity training and certification in the world.
Rob Ragan
Principal Technology Strategist, Bishop Fox
Rob Ragan is a Principal Technology Strategist at Bishop Fox. Rob focuses on pragmatic solutions for clients and technology. He oversees strategy for continuous security automation. Rob has presented at Black Hat, DEF CON, and RSA. He is also a contributing author to Hacking Exposed Web Applications 3rd Edition.
Caleb Sima
Chair, CSA’s AI Safety Initiative
Caleb Sima is regarded as one of the pioneers of application security, holding multiple patents in the space. He is the Chair of CSA’s AI Safety Initiative and recently started a new position as a Builder at White Rabbit. He has served as the Chief Security Officer at Robinhood Markets, Vice President/Information Security at Databricks, and more.
Harald Röder
Senior Solution Engineer, Censys
Harald Röder is a Senior Solution Engineer at Censys. Harald began his IT career at Cisco Systems and has spent over 25 years in various technical roles for many well-known network manufacturers and value-added distributors, including Meru and Fortinet.
Tabatha Von Koelichen
Regional Sales Director, DACH and Central Europe, Censys
Tabatha von Kölichen is Regional Sales Director for DACH and Central Europe at Censys. She has extensive international sales and channel experience with various IT manufacturers in France, Germany and Eastern Europe. Over the last 30 years, she has specialized in building up two-tier distribution for companies such as Newbridge, Mitel, and more.
Crystal Morin
Cybersecurity Strategist, Sysdig
Crystal is a cybersecurity strategist at Sysdig, a company founded by the creators of Wireshark, Stratoshark, and Falco. She is tasked with bridging the gap between business and security through cloud and container-focused webinars and papers for everyone from executives to technical practitioners.
Matt Girdharry
Global Lead – Security, Observability, DevOps, Amazon Web Services
Matt leads a business development team covering leading ISVs in security, observability, DevOps inclusive of how AI, ML, and genAI can be used to improve security, compliance and performance in these domains. He has been at AWS for 7 years, and resides in Portland, OR, where he loves the music scene and IPAs.
Sergej Epp
CISO, Sysdig
Sergej Epp (he/him) is the Chief Information Security Officer (CISO) at Sysdig, where he leads the company’s cybersecurity strategy, operations, and risk management. With over 15 years of experience in cyber defense, threat intelligence, and incident response, he has protected global organizations in the financial services and technology sectors.
Justin Edgar
Principal Architect, Palo Alto Networks
Justin Edgar is a Principal Architect at Palo Alto Networks and a seasoned cybersecurity leader with extensive experience in security consulting, sales architecture, and customer success. He has a strong track record of growing sales pipelines, increasing ARR, and partnering with Fortune 100 executives to develop effective security strategies.
Erich Kron
Security Awareness Advocate, KnowBe4
Erich Kron, Security Awareness Advocate at KnowBe4 is an author and regular contributor to cybersecurity industry publications. He is a veteran information security professional with over 25 years of experience in the medical, aerospace, manufacturing, and defense fields.
John Muirhead-Gould
Solution Architect, HID Global
As a Solution Architect at HID, John Muirhead-Gould translates complex technical concepts into clear, value-driven insights that resonate with diverse audiences. With a passion for inclusive collaboration, John's expertise in understanding business challenges and simplifying technical solution details fosters deeper understanding and engagement . .
Marcus Silwer
Director of Product Marketing, HID Global
Marcus Silwer is a Product Marketing Director with extensive experience in SaaS, managed services, and cybersecurity. He has a strong background in product marketing, product management, B2B sales, and channel management and has held key roles at NTT and IBM.
Stephen Thoemmes
Senior Developer Advocate, Snyk
A Developer Advocate at Snyk, specializing in AI, computer vision, and large language models. Previously worked on financial forecasting tools at Microsoft Research, led computer vision research at Venvee, and contributed to bioinformatics and additive manufacturing research at the Colorado School of Mines.
HD Moore
CEO and Founder, runZero
HD Moore is a pioneer of the cybersecurity industry who has dedicated his career to vulnerability research, network discovery, and software development since the 1990s. He is most recognized for creating Metasploit and is a passionate advocate for open-source software and vulnerability disclosure. . . .
Payal Chakravarty
Director of Product Management, Google
Payal Chakravarty is an accomplished product management professional with extensive experience in leading product teams at prominent technology companies. Currently serving as Director of Product Management at Google, Payal previously held key positions such as Head of Product at Coalition, Inc. . . .
Melina Scotto
CISO Advisor, Mastin Associates and former CISO
Melina Scotto is a seasoned CISO and Cyber Advisor to Fortune 500 corporations and Federal Civilian agencies. Her journey to CISO began over 25 years ago. As a network security engineer for healthcare, she focused on operations in dynamic virtual server and cloud environments. In 2012, Melina joined the National Institute of Health (NIH) . . .
Chenxi Wang
Founder & General Partner, Rain Capital
Dr. Chenxi Wang is the founder and General Partner of Rain Capital, a Cyber focused venture fund. A well-known strategist, speaker, and technologist in the Cybersecurity industry, Dr. Wang also serves on the Board of Directors for MDU Resources (NYSE:MDU) and on various advisory boards to startups.
Sam Wolfshohl
Lead Cloud Solutions Architect, Darktrace
Sam Wolfshohl leads the Cloud Solutions Architects at Darktrace. Over his 10+ years of security focus, he has worked with many of the largest companies in the world, led development of Cloud, Email and Malware focused security products and has brought multiple security products to market.
Yazan Albikawi
Solutions Engineer, Okta
Yazan Albikawi is a Solutions Engineer at Okta, specializing in network access and Identity management. With extensive experience, he helps customers across different sectors enhance their Identity security posture.
Becky Bracken
Senior Editor, Dark Reading
Becky Bracken is a veteran journalist covering cybersecurity for Dark Reading.
Tara Seals
Managing Editor for News, Dark Reading
Tara Seals has 25+ years of experience as a journalist, analyst and editor in the cybersecurity, communications and technology space. Prior to Dark Reading, Tara was Editor in Chief at Threatpost, and prior to that, the North American news lead for Infosecurity Magazine.
Yotam Meitar
Director, Cloud Response, Wiz
Yotam has spent over a decade managing and responding to some of the most sophisticated global cyber operations. He’s worked with technical teams and executives to defeat attacks and leverage cyber as a competitive advantage across incident response, purple teaming, posture enhancements, and executive wargames.
Fahmida Y Rashid headshot
Fahmida Y. Rashid
Managing Editor of Features, Dark Reading
Fahmida Y Rashid is Dark Reading’s managing editor, focusing on stories that provide security professionals with the information they need to do their jobs. She has spent over a decade analyzing news events and demystifying security technology for IT professionals and business managers.
Luke McNamara
Deputy Chief Analyst, Mandiant
Luke McNamara is a Deputy Chief Analyst of Mandiant Intelligence at Google Cloud, with over a decade of experience in cyber threat intelligence focusing on emerging threats and trends.
Jai Vijayan
Contributing Writer, Dark Reading
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism covering information security and data privacy. Over the course of his career, Jai has also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics.
Andrew Braunberg
Principal Analyst, SecOps, Omdia
Andrew supports Omdia's Cybersecurity Operations (SecOps) Intelligence Service research practice, guiding vendor, service provider, and enterprise clients. He provides thought-leading analysis on technologies, trends, and innovations in enterprise security operations centers (SOCs), and specifically on the proactive technologies.
Kelly Jackson Higgins
Editor-in-Chief, Dark Reading
Kelly Jackson Higgins is the Editor-in-Chief of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, Virginia Business magazine, and other major media properties.
Sponsors
Diamond
Platinum x2
Platinum
Gold
© 2025 Informa USA, Inc., All Rights Reserved | Privacy Policy | Terms of Service