
Richard Stiennon
Chief Research Analyst
IT-Harvest
Online Showcase & Conference
Early Access thruApril 03
LIVE PROGRAM:April 06 thru July 31
Your definitive source for staying abreast of rapidly evolving topics within the cybersecurity industry. Through broadcast-quality video content featuring leading analysts and top experts in panels, analyst roundtables, and other formats — we give you the latest word on all salient topics, at no cost.
Featuring Live Tracks with leading analysts and expert panels.
Core AI security — model integrity, agent authorization, guardrails, runtime defense.
Modern SIEM, SOAR and autonomous response — the platforms rewriting day-to-day SecOps.
Every Cybersymposiums agenda — every category, panel, and demo room in one index.
Every discipline tracked — from AppSec and Code Scanning to NHI, Identity and Deepfake Defense.
VulnerabilitiesFeaturedApril 2026 is the second-largest Patch Tuesday on record. One of the 169 CVEs is already under active exploitation in Microsoft SharePoint Server, and a publicly-disclosed Defender bug nicknamed BlueHammer rounds out an unusually dense release.
PolicyNIST will stop enriching every CVE submitted to the National Vulnerability Database. A new prioritisation policy — live as of April 15 — covers KEV entries, EO 14028 critical software, and anything with systemic-risk potential. Everything else goes to a 'Not Scheduled' queue.
AI SecurityFeaturedAnthropic held back its Mythos Preview model from public release and shipped it instead to roughly 50 organisations under 'Project Glasswing'. Bruce Schneier argues the defensive edge is real but temporary — and that smaller models are already closing the gap.
AI AgentsA new controlled experiment finds people play more cooperatively against LLMs than against other humans in a strategic game. Schneier flags the finding for every team designing systems where agents and humans operate side-by-side.
Supply ChainFeaturedPyongyang-linked operators have crossed a scale threshold. A campaign Socket tracks as Contagious Interview has placed 1,700+ malicious packages across npm, PyPI, Go and Rust since January 2025 — and the payloads no longer trigger at install time.
PolicyOne sentence in the Cyber Strategy for America document — 'unleash the private sector by creating incentives to identify and disrupt adversary networks' — is, per Bruce Schneier, an invitation to private offensive cyber operations. He compares it to the letters of marque a prior century eventually abandoned.
01 · The Shift
AI is revolutionizing how we detect, prevent, and respond to cyber threats. From automated threat detection to predictive defense systems, artificial intelligence is becoming the cornerstone of modern cybersecurity strategy — enabling organizations to stay ahead of evolving digital risks.
Read the manifestoCore AI security — model integrity, agent authorization, guardrails, runtime defense, and the adversarial edge.
“At the core of each vendor sits at least one brilliant technologist — we put their perspective on the record.”
Modern SIEM, SOAR, autonomous response — the platforms rewriting day-to-day SecOps.
Non-human identity, machine credentials, secrets governance, service-account security.
Every participating vendor runs a live, interactive demo room on cybersymposiums.com — covering SOC Automation, App Security, NHI, Cloud, Identity and more. Every one curated, every one verified.
From ROI to behavioural science to the contrarian views — the full panel set that launched the Security Champions track.
CISOs, analysts, AI researchers, policy leaders and the founders of the tools you'll see demoed. Every contributor on the program.

Chief Research Analyst
IT-Harvest

Security Advisor
Google Cloud

Co-Founder & CEO
Cloud Security Alliance

Creator of Zero Trust
On2IT Cybersecurity

Chief Strategy Officer
Ericom Software

CISO
Anthropic

Co-Chair AI Safety Working Groups
Cloud Security Alliance

CPO
Exabeam

Chief Innovation Officer
Team8

VP Solutions Engineering & Americas Field CTO
SentinelOne

AI and Cybersecurity Researcher
NIST

Trustworthy & Secure AI Department Manager
MITRE

Founding Partner
Acrew Capital

Chief Data Strategy Officer
Abaxx Technologies

CISO
AdaptHealth

Co-Founder & CEO
Adversa AI

CISO
Al Maryah Community Bank

Founder & CEO
Alpha Design AI

CISO
Alvaka

Principal Scientist
Amazon

CISO
American Public Education

CEO, CISO & Hacker
Arcanum Information Security

CEO
Aurascape.ai

CEO
Autio Strategies

Founder and Chief Scientist
Lakera

Founder
B9AI

Identity Security Expert · Worldwide Keynote Speaker
BrainCore.Net

Founder / CEO / CISO
CASMO

VP Information Security
Centene Corporation

Cybersecurity Specialist
CISA

CTO (acquired by Cisco)
Cisco

CISO
City & County of Denver
Live, interactive demo rooms on cybersymposiums.com — SOC, identity, data, AI, cloud. Hover to pause the reel.
Editorial briefings, new panel drops, and demo-room spotlights — one email, every Tuesday. No fluff, no recruiters.
· One-click unsubscribe. We never share your address.
· Ready to join? ·
Registration is free for qualified security practitioners — analysts, CISOs, SOC leads, application-security engineers, identity architects. Get instant access to every agenda, every demo room, every replay.