CybercastWhat you’ll learn:
Why AI risk is fundamentally a data-access problem, not just a model or identity problem
How to discover and classify sensitive data before it’s exposed to AI systems and agents
How to govern access consistently across human users and AI agents interacting with that data
How to establish ownership and accountability across security, data, and AI teams
More info CybercastLearning Objectives:
Understand how MSSPs are delivering IAM capabilities to enterprise clients.
Evaluate deployment challenges and best practices for IAM-as-a-Service.
Identify partnership opportunities between enterprises, MSSPs, and solution providers.
More info CybercastAttendees will learn:
How attackers are leveraging AI to automate, accelerate, and customize ransomware campaigns.
What resilience frameworks look like in the AI era.
Practical steps to strengthen detection, containment, and recovery.
More info CybercastWe’ll discuss how:
The pace of security operations is becoming unsustainable as overextended individuals manage complex threat environments
The human cost of cybersecurity directly contributes to persistent security gaps
Effective security means shifting from reactive, human-driven operations to risk-directed models supported by AI and external expertise
More info CybercastYou’ll learn:
How to detect and mitigate supply-chain weaknesses
How AI analysis helps secure code development
How to use SBOMs to verify third-party and open-source code
More info CybercastYou’ll learn how to:
Discover AI agents and supporting machine identities across all environments
Detect shadow AI and orphaned and over-permissioned service accounts
Assign accountable human ownership to every AI agent and machine identity
Implement lifecycle controls for creation, certification, and decommissioning of AI agents
More info CybercastLearning Objectives:
Understand how AI is changing cloud security operations.
Identify new risks and policy considerations introduced by AI-driven workloads.
Explore strategies for integrating AI tools without compromising compliance or control.
More info CybercastYou’ll learn how to:
Find leaks and vulnerabilities deep in binaries and their SBOMs
Visualize risk in data collection, handling, and sharing
Integrate risk management with AI development
Manage risks posed by thousands of third-party mobile apps
More info CybercastYou’ll learn:
How to maintain identity controls during rapid staffing changes
How to modernize the identity lifecycle without hampering efficiency
How IGA improvements boost compliance
More info CybercastYou’ll learn how to:
Eliminate identity-security silos and close the gaps attackers exploit for lateral movement and privilege abuse
Detect and contain identity-based threats in real time — even after initial access — using unified visibility and intelligent enforcement
Secure all identities, including privileged users, non-human identities, and AI agents, consistently and at scale without adding operational complexity
More info CybercastIn this discussion, you’ll learn:
How to determine which elements of your code are AI-generated
How to analyze and secure AI-written code without holding up development
How to use AIBOM tools and markers to gain visibility into AI coding agents
More info CybercastAttendees will learn:
How PhaaS platforms defeat traditional MFA and help create skyrocketing rates of account compromise
How to use AI-powered ITDR to catch and expose intrusion attempts
How to implement 24/7 MDR with SOC-as-a-Service, CTEM, and least-privilege principles to protect systems from identity-related threats
More info CybercastAttendees will learn:
How AI accelerates code scanning and secure development workflows.
Where AI-generated code introduces new attack vectors.
Strategies to balance developer speed with application security.
More info Cybercast
Attendees will learn:
How to manage and safeguard services and applications that require traditional passwords
How enterprise password managers centralize account management
How to enforce security policies, strengthen compliance and integrate with IdPs
More info CybercastAttendees will learn:
Identify models that improve cross-sector threat intelligence collaboration.
Understand the legal, regulatory, and operational challenges of sharing intelligence.
Learn how to operationalize shared intelligence for faster threat detection and response.
More info CybercastYou will learn:
How monday.com secured more than 200 applications outside traditional identity coverage
How the company secured consistent access and credential policies across every application, increasing coverage from 20 percent to 78 percent
How monday.com reduced the cost and effort of identity lifecycle management, saving 3,300 IT hours annually
More info CybercastAttendees will learn:
Top exposure management trends and vendor innovations.
How exposure management shifts the mindset from vulnerability triage to proactive risk reduction.
The key questions security leaders should ask vendors before investing in exposure management.
More info Cybercast
Why traditional data security models fail in an AI-driven enterprise, and how the collapse of the data perimeter has changed risk assumptions across cloud, SaaS, endpoints, and AI workflows
What distinguishes next-generation Data Security Posture Management (DSPM) from first-generation tools — including continuous visibility, contextual data understanding, and real-time protection across all data states
How DSPM serves as the foundation for a modern, unified data security platform, enabling safer AI adoption, reduced attack surface, and more actionable risk prioritization
More info Cybercast
How evolving regulations like NYDFS and DORA are reshaping expectations for mainframe security and access controls.
The unique risk factors of mainframe environments that make comprehensive security essential beyond standard enterprise measures.
Practical approaches for evaluating mainframe compliance, addressing security gaps, and staying ahead of regulatory developments.
More info CybercastPalo Alto Networks experts will discuss:
Current threat actors and TTPs, and how an attacker views your organization as a target
How XDR can mitigate threats and provide a holistic overview, and which companies would benefit from it
How MDR delivers all the benefits of XDR, plus expertise, manpower, and 24/7 coverage
More info CybercastAttendees will learn:
Recognize the evolving privacy and compliance requirements impacting application security.
Explore best practices for embedding data protection within application architecture.
Learn how to align governance frameworks with user data protection initiatives.
More info CybercastKey Takeaways
Understand how AI-Accelerated DevSecOps transforms traditional security practices for the AI era
Learn how to embed AI-powered security into developer workflows and CI/CD pipelines
Discover how to balance speed, visibility, and trust while maintaining secure, collaborative development environments
More info CybercastAttendees will learn about:
The trust deficit in AI and how to bridge it through transparency, accountability, and confidence in the underlying data
Strategies to build resilient AI systems that can withstand manipulation, misfires, and data-driven vulnerabilities
How robust data integration and replication strategies support trusted, real-time AI decisions—especially in complex, hybrid environments
The ideal blueprint for embedding policy-driven workflows, data observability, and system health monitoring into your AI stack from day one
More info CybercastAttendees will learn:
How generative AI is enabling synthetic identities at scale—fake employees, executives, and even companies—and the specific tactics showing impersonation, fraud, and access abuse.
Where AI helps defenders most in the identity fight—using anomaly detection, behavioral signals, and AI-assisted verification to spot deepfakes and suspicious access in real time.
How to harden identity verification for the next wave—layered proofing, phishing-resistant authentication, continuous validation, and response playbooks that assume “real vs. synthetic” will be contested.
More info CybercastThis discussion is designed to be a direct, practical check-in on:
The Actual Agenda: What is genuinely Top of Mind for security leaders? What are the key strategic projects and budget items that will get funded next year?
Hype vs. Reality: Identifying the technologies and ‘shiny objects’ that are generating noise but providing little operational value. The distractions that are a waste of your team’s time.
Hot Takes: An honest conversation about the current threat climate, including the foundational problems that are still unsolved, and what is really keeping them up at night.
The Mental Model for Focus: How to separate the industry noise from actionable priorities.
More info CybercastAttendees will learn:
Where AI strengthens network defense — and where it creates new blind spots.
How adversaries weaponize AI against network infrastructure.
Practical frameworks for implementing AI in network defense with measurable ROI.
More info CybercastAttendees will learn:
How to design automation with guardrails: confidence scores, rings, pause points, validation, and rollback/backout patterns that work in real environments.
How to use a crawl-walk-run approach to build confidence—starting with decision support, then controlled execution, then broader autonomy, and where AI plays a beneficial role
How to connect real-time endpoint intelligence to IT and security operations workflows to reduce toil, speed response, and improve outcomes without sacrificing oversight
More info CybercastLearning Objectives:
Understand the scope, growth, and risk of unmanaged non-human identities and AI agents.
Evaluate modern governance frameworks for securing NHIs and AI agents.
Identify technologies and approaches that enhance visibility, ownership, and lifecycle control for NHIs and AI agents at scale.
More info CybercastAttendees will learn:
Why attackers increasingly exploit traditional identity access management and help desk processes—and how to close those gaps.
How to build a multi-layered identity threat detection and mitigation strategy that combines MFA, biometrics, document validation, and behavioral analytics.
Practical steps for evolving your identity program to counter modern tactics like MFA bypass, SIM swapping, and social engineering.
More info CybercastIn this session, attendees will learn:
How shadow AIT is reshaping today’s threat landscape
Why real-time visibility and observability are essential for securing AI-driven environments
How to use modern analytics and automation to convert overwhelming data into actionable insight
If you can’t see it, you can’t secure it. In the age of shadow AIT, visibility is your strongest defense.
More info CybercastAttendees will learn:
Why legacy SEGs increasingly fail against modern social engineering, BEC, and AI-crafted attacks—and what detection gaps matter most.
How behavioral data science and identity-focused analysis strengthen detection accuracy while reducing false positives and alert fatigue.
Which capabilities define next-generation email security and how to build a more adaptive, efficient, and resilient defense strategy for today’s enterprise.
More info CybercastAttendees will learn:
The evolving threat landscape driven by AI adoption
How SASE can help enterprises meet the rising challenges of AI adoption
What to look for when choosing the right solution for your AI future
More info CybercastAttendees will learn
How to gain real-time visibility into AI agent access, using non-human identities (NHIs) as the control point, across hybrid cloud and on-prem systems
Strategies to enforce least privilege, automate remediation, and mitigate identity risk across AI agent lifecycles
Operational tactics for integrating AI agent discovery, identity threat detection, context-aware governance, and scalable response into your security stack
More info CybercastAttendees will learn:
How AI is transforming secure development workflows, from code scanning to education, and where it truly drives ROI.
What it takes to align developer enablement, security training, and AI adoption into a cohesive strategy.
Ways to measure the impact of AI-assisted security programs and communicate value across technical and executive teams.
More info CybercastAttendees will learn:
Learn how AI can be applied to strengthen IAM processes, accelerate Zero Trust adoption, and improve identity security outcomes.
Understand how adversaries are using AI to launch more sophisticated identity-based attacks and how to defend against them.
Discover strategies to secure AI agents and non-human identities by extending IAM and Zero Trust principles.
More info CybercastAttendees will learn:
Why continuous discovery is essential to managing modern attack surfaces.
How attackers exploit overlooked external pathways.
Tools and techniques to operationalize attack surface management.
More info CybercastAttendees will learn
Why shared responsibility for Salesforce security is commonly misunderstood, leading tosilent exposure risks from misconfigurations, low-code acceleration, and permission sprawl
How to apply continuous monitoring, DevSecOps enforcement, and governance automation to prevent configuration drift across sandboxes and production
How to institutionalize secure-by-default practices through leadership alignment, least privilege access, and policy-as-code operations
More info CybercastAttendees will learn:
How Colgate-Palmolive centralized and secured social media access — implementing MFA, reducing credential sprawl, and balancing marketing agility with enterprise-grade protection.
A practical, repeatable model for managing shared business accounts without exposing passwords or relying on insecure workarounds.
Strategies to extend this model beyond social platforms — protecting disconnected and legacy applications that fall outside traditional identity systems.
More info CybercastAttendees will learn:
How to evaluate their organization’s identity security maturity and identify high-risk blind spots
The hidden connections between identity sprawl, misconfigurations, and privilege abuse
Practical ways AI and automation can streamline identity governance without adding noise, and why “protecting the identity fabric” is now central to modern cyber resilience
More info CybercastAttendees will learn:
Why citizen developers now outpace security teams, and how their apps introduce familiar vulnerabilities in unfamiliar places
How to secure no-code and low-code platforms without expecting business users to become security experts
Real-world strategies to monitor, govern, and guide citizen development at scale from AI agents to form-based data flows
More info CybercastAttendees will learn:
Why unmanaged machine identities and SSH keys present a growing blind spot for attackers to exploit.
How new regulatory pressures and zero trust strategies demand stronger controls over privileged machine-to-machine access.
Practical approaches to gaining visibility, automating key management, and reducing operational risk.
More info CybercastAttendees will learn:
How AI can transform GRC from static compliance to dynamic, intelligence-driven risk management.
Practical steps for securely integrating AI into GRC programs without compromising trust or auditability.
How to measure success and governance outcomes when adopting AI in GRC workflows.
More info