Key Technologies Reshaping Cybersecurity Defenses
Meanwhile, cyber threat actors continue waging ransomware, supply chain, and other malicious attacks that penetrate enterprise cyber defenses in increasingly nefarious ways, leaving security teams wondering if their current technology defenses will hold up against a new wave of threats powered by AI and targeted at their cloud assets and their increasingly blurred network perimeter.
Shields Up: Key Technologies Reshaping Cybersecurity Defenses is a free, one-day online conference produced by the editors of Dark Reading that takes an in-depth look at the latest cybersecurity technologies, tools and services for thwarting today’s attacks, and provides deep insights and practical advice for security teams tasked with weaving them into their security infrastructure.
Cyber Tech Rundown
Keeping up with the latest products and offerings from the thousands of cybersecurity vendors and service providers is a major undertaking. In this keynote address, a top cyber technology expert goes beyond the hype surrounding the newest security technologies and cyber defense trends and offers tips and recommendations on how to determine which of the latest security technologies can best help you secure your enterprise in 2026.
CISO’s Guide to the Latest Cyber Defense Tools
New cybersecurity technologies bring both promise and peril, as organizations face both budget and technical challenges when selecting and deploying new tools and disciplines. In this keynote, a senior security practitioner will give an insider’s view on how to best to determine which of the newest technologies and approaches fit your budget and your environment – and best practices for deploying them.
Threat Landscape: AI in the Cloud
New threat patterns are emerging alongside familiar security failures as AI adoption accelerates across cloud environments. This session provides a view of how AI is changing attacker behavior and where risk is concentrating in cloud environments.
Transitioning from Legacy to Modern Security Operations
The age of the simple virus is over. Today’s security teams are battling AI-empowered adversaries and nation-state actors who operate with the speed and sophistication of a Fortune 500 company. Yet, many organizations remain trapped in a “Legacy Liability,” relying on an alphabet soup of siloed defenses that generate a firehose of noise while leaving critical blind spots across Identity and Cloud. This session argues that the endpoint is no longer the sole battleground, but just one link in a complex attack chain.
In this presentation, we will dismantle the “Legacy Liability” and present the roadmap to the High-Autonomy SOC (Level 4). We will move beyond the hype around AI to discuss the operational reality of Hyperautomation and the elimination of the “Administrative Tax” that drains analyst talent. Attendees will leave with a clear maturity model for transitioning their teams from reactive “alert factories” to proactive, self-healing ecosystems where the AI handles the data and humans handle the strategy.
Protecting the Modern Network “Perimeter”
Six years after the rush to cloud during the global pandemic, the enterprise network boundary has morphed into a distributed mesh of multiple cloud services and applications, on-site systems, Internet of Things devices, and BYOD. In this panel discussion, experts will explore the challenges of the far-flung network of today and discuss strategies and technologies for ensuring proper asset visibility, identity security and management, and how a zero trust architecture can help protect organizations.
Cloud Security Clarity
Moving to the cloud poses another level of security challenges as organizations adopt multiple cloud services and applications. In this panel discussion, experts will discuss the latest threats specific to the cloud environment as well as best practices, tools, and technologies that can help enterprises manage and secure their cloud assets, including cloud-native application protection platforms (CNAPP), cloud security posture management (CSPM), and other tools.
AI Transforms SecOps
Automation long has been a goal for security operations teams struggling to find that needle in the haystack of alerts amid a rapidly increasing and evolving cyber threat landscape. Generative and agentic AI show groundbreaking promise for streamlining and automating many of the manual and resource-intensive tasks of today’s security operations team. In this panel, experts will provide insights and real-world examples of how and where AI-fortified tools and services can enhance and improve security posture.
Key Technologies Reshaping Cybersecurity Defenses

























