PRELIMINARY AGENDA (test)

as of May 2026

 

DAY 1: Tuesday, September 8, 2026

SESSION TITLE SESSION DESCRIPTION
Exhibitor Load in and Set up  
Registration + Info Desk Opens  
Day 1 Introduction, National Anthem and Welcome Remarks  
Fireside: Cyber Command 2.0: Proactive Operations and the Future of Conflict in Cyberspace In this high-impact fireside, U.S. Cyber Command will outline how ongoing global conflicts are informing doctrine, partnerships, and the future trajectory of U.S. cyber power. The discussion will explore how the command is advancing proactive cyber operations to impose cost on adversaries and shape the threat environment before adversary impact. Attendees will gain insight into the strategic vision behind “Cyber Command 2.0,” including force evolution, operational integration, and mission prioritization in an era of persistent engagement.
General Session: Understanding the Modern Nation-State Threat Landscape This session brings together top intelligence and industry analysts to unpack evolving state-sponsored cyber operations. The panel explores adversary motivations, strategic trends, supply-chain compromise strategies, and multi-year espionage campaigns targeting critical infrastructure and defense industries. Participants will break down attribution challenges, hybrid warfare escalation risks, and what the private sector must do to keep pace with increasingly stealthy campaigns. 
General Session: Balancing Innovation and Risk: How AI is Shifting the Cybersecurity Landscape AI is rewriting the rules for both cyber offense and defense. This panel dissects the emerging policy questions around automated vulnerability discovery, synthetic malware, scalable deception, and AI-powered SOC augmentation. Experts will debate regulatory guardrails, ethical limits, and pathways to innovation that don’t compromise safety.
Transition to A Breakouts  
Breakout A1: Weaponization of AI by Cyber Adversaries AI is enabling automated reconnaissance, exploit generation, and phishing at scale. This panel explores AI risks, ethics, and how defenders must respond.
Breakout A2: Building Best of Class Cloud-Native Security Cloud-native architectures demand a shift in defensive strategy—embracing serverless models, containers, ephemeral resources, and immutable infrastructure. This panel examines best practices along with emerging trends shaping this space.
Breakout A3: Burnout & Resilience in Cyber Operations Cyber teams face constant pressure. This discussion covers burnout prevention, mental health programs, shift design, rest cycles, and leadership approaches.
Breakout A4: Predicting the Next Cyber “Black Swan”

Experts examine systemic risks—AI collapse scenarios, catastrophic supply-chain compromise, cloud provider outage, widespread identity infrastructure failure—and how organizations can prepare. 

Breakout A5: Advanced Detection Engineering: Building High-Fidelity Detections That Actually Work Detection engineers from cloud providers and large SOCs break down how they build robust detections for identity misuse, suspicious PowerShell activity, cloud abuse, and persistence techniques—complete with example rule frameworks.
Breakout A6: Supply Chain Security: A SBOM/HBOM Reality Check SBOM mandates are rising, but adoption is inconsistent. This discussion covers real-world supply chain attacks, third-party risk scoring, SBOM tooling, and how regulators and vendors can meet in the middle.
Transition to B Breakouts  
Breakout B1: Deepfakes and Digital Deception: Protecting Federal Agencies in the Age of Synthetic Media As generative AI accelerates the production of hyper-realistic synthetic media, federal agencies face an escalating challenge: deepfakes capable of impersonation, disinformation, social engineering, and operational disruption. This panel brings together experts from government, intelligence, and cybersecurity to examine the tactics adversaries are using, the vulnerabilities unique to federal missions, and the emerging tools for detection, authentication, and attribution. Panelists will explore policy gaps, workforce awareness needs, and practical steps agencies can take today to defend against AI-enabled deception campaigns targeting both individuals and institutions.
Breakout B2: Building Resilience for the Quantum-Enabled Era Quantum computing threatens current cryptography. This panel explains the timeline, PQC migrations, NIST standards, crypto-agility, and what enterprises should do now to prepare.
Breakout B3: Beyond the Network Perimeter: Securing Systems Against Close-In Multi-Frequency Adversarial Tactics Cyber threats are no longer confined to the digital domain: advanced actors now combine electromagnetic emissions, multifrequency interference, side-channel exploitation, and close-proximity access to compromise critical systems. This panel examines the intersection of RF-enabled attacks, hardware vulnerabilities, and cyber operations, focusing on how multifrequency probes, emanation analysis, and power-modulation techniques are reshaping the modern threat landscape. Panelists will discuss detection and shielding strategies, architectural hardening, and the operational challenges of defending air-gapped, high-assurance, and mission-critical environments. Participants will come away with a deeper understanding of how multifrequency and close-in vectors both complement and circumvent traditional cybersecurity defenses.
Breakout B4: Detecting and Countering Living-Off-the-Land (LOTL) Campaigns LOTL attacks bypass traditional detections by using native OS tools and cloud services. This advanced technical panel explores behavioral analytics, telemetry fusion, identity-centric detection, and MITRE ATT&CK-informed hunt strategies. Experts walk through recent LOTL case studies and defense-in-depth approaches that work in modern hybrid environments.
Breakout B5: Governance of Large-Scale Data Practices Both private and public sector entities generate and collect unprecedented volumes of data. This panel discusses ethical design, algorithmic transparency, consumer trust, and governance frameworks that can build trust in effective stewardship.
Breakout B6: The Gray Space: Navigating Third-Party Service, Cloud, and MSP Risks Organizations now depend on managed service providers, SaaS platforms, and cloud operators for critical functions. These third-party services expand capability but also inherit risk—often becoming the attacker's easiest entry point. This panel focuses on evaluating and securing service providers, enforcing contractual safeguards, implementing shared responsibility frameworks, and monitoring for compromise in outsourced environments. Speakers will highlight lessons from major breaches involving MSPs and cloud supply chain exploitation. 
Lunch + Exhibit Hall Opens  
Leadership Luncheon (Invitation-only) Leadership is an essential ingredient to ensure that cybersecurity programs get to success as well as continue to build upon these successes to keep up with the cyber threat. This luncheon will feature several prominent leaders in the cyber field who will talk about their journeys to their current positions, highlight skill sets to focus on when considering future cyber leadership roles, and provide case studies to showcase the kinds of questions that leaders face daily to effectively do their job.
Fireside Earlier this year, the Office of the National Cyber Director (ONCD) unveiled the new National Cybersecurity Strategy. In this fireside conversation with the federal government, discussion will focus on how the government is moving forward in implementing the strategy, plans for working with the private sector, and key future cybersecurity focus areas that need to be addressed.
General Session: Harmonizing Cyber Regulations Across Sectors

Compliance complexity is rapidly increasing as overlapping cyber requirements emerge from the Cybersecurity and Infrastructure Security Agency (CISA), Environmental Protection Agency (EPA), Securities and Exchange Commission (SEC), Federal Trade Commission (FTC),  and different state-level legislation. This panel explores how organizations can navigate these intersecting mandates, while regulators weigh whether harmonization is achievable—and what it would take to ease the burden on operators while strengthening national security.

General Session: Building Resilient Zero Trust Architectures in the Federal Space Zero Trust is the new normal—but implementation is challenging. This panel discusses identity-first security, segmentation, continuous verification, and lessons learned in federal and enterprise deployments.
Exhibit Hall Break  
General Session: Cybersecurity in Healthcare & Medical Devices Hospitals are high-value targets with life-or-death consequences. This panel explores ransomware prevention, medical device patching challenges, FDA requirements, and strengthening clinical cyber resilience.
Fireside  
Closing Remarks  
All-Attendee Reception  
VIP Reception: Embassy of Australia  

 

DAY 2: Wednesday, September 9, 2026

SESSION TITLE SESSION DESCRIPTION
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description

 

DAY 3: Thursday, September 10, 2026

SESSION TITLE SESSION DESCRIPTION
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description
Title Description