Welcome and Opening Remarks
Tuesday, May 12, 2026
9:00 am - 9:10 am
Planning for the Next Wave of Risk
Tuesday, May 12, 2026
9:55 am - 10:30 am
AI innovation is accelerating so quickly that each new release has the potential to reshape the enterprise overnight. And now, with AI systems increasingly contributing to their own next iterations, the pace—and the uncertainty—are only intensifying. This session explores how CISOs can plan for risks that evolve faster than traditional…
How AI Will Reshape Cyber Attacks, Cyber Defense & Enterprise Risk
Tuesday, May 12, 2026
1:45 pm - 2:15 pm
Artificial intelligence is redefining the cyber battlefield—accelerating attacker speed, expanding scale, and raising the bar for sophistication—while challenging defenders to keep up. Join us to unpack where AI delivers meaningful defensive advantage and automation, and where it introduces new systemic, operational, and governance risks. The discussion will look at how…
How Identity Is Replacing the Perimeter
Tuesday, May 12, 2026
3:40 pm - 4:15 pm
As networks dissolve and users, machines, and workloads operate everywhere, identity has become the primary control plane. Join us to explore what it actually means to operate in an identity-first security model and where most organizations are falling short. We will debate governance, non-human identities, and whether identity programs are…
The Security Workforce Challenge: Talent Shortages & Simpler Security Architectures
Tuesday, May 12, 2026
4:30 pm - 5:00 pm
Persistent talent shortages are forcing security leaders to rethink how programs are designed, staffed, and sustained. This session explores how ongoing skills gaps are reshaping security architecture decisions, particularly the tradeoffs between best-of-breed tool sprawl and more simplified, integrated platforms. We’ll discuss how to build security programs that remain resilient,…
Welcome & Opening Remarks
Wednesday, May 13, 2026
9:00 am - 9:10 am
Private Industry on the Front Lines: Cyberwarfare, Accountability, and the CISO
Wednesday, May 13, 2026
9:10 am - 9:45 am
As cyber conflict intensifies, the boundaries between government action and private-sector responsibility are rapidly evolving. Drawing on recent reporting about the U.S. government’s growing reliance on private companies in cyber operations, we will examine what it means for enterprises to operate in an era where cyber activity is increasingly intertwined…
The New Budget Math: Security Debt Matters More Than Security Spend
Wednesday, May 13, 2026
10:20 am - 10:50 am
Accumulated technical and security debt – not the broader issue of IT debt – now represents a larger risk than underfunding security tools. We will discuss how complexity, legacy architectures, and poor integration quietly undermine security outcomes despite rising budgets. The session will focus on how leaders identify, quantify, and…
Judges Panel & Technical Roundtables
Wednesday, May 13, 2026
2:10 pm - 3:40 pm
2:10 – 2:15pm Welcome 2:15 – 2:35pm How do cybersecurity professionals intentionally grow from strong technologists into effective leaders? In this session, Keith Turpin, CISO at the Friedkin Group and a member of the CSO Hall of Fame, shares the career lessons he wishes he’d known earlier—from understanding how skill…