
Richard Stiennon
Chief Research Analyst
IT-Harvest
Online Showcase & Conference
Early Access thruMay 8
LIVE PROGRAM:May 11 thru August 31
Your definitive source for staying abreast of rapidly evolving topics within the cybersecurity industry. Through broadcast-quality video content featuring leading analysts and top experts in panels, analyst roundtables, and other formats — we give you the latest word on all salient topics, at no cost.
Featuring Live Tracks with leading analysts and expert panels.
Core AI security — model integrity, agent authorization, guardrails, runtime defense.
Modern SIEM, SOAR and autonomous response — the platforms rewriting day-to-day SecOps.
Every Cybersymposiums agenda — every category, panel, and demo room in one index.
Every discipline tracked — from AppSec and Code Scanning to NHI, Identity and Deepfake Defense.
VulnerabilitiesFeaturedA critical authentication-bypass in cPanel and WHM was weaponized within a day of public disclosure, with multiple operators using AdaptixC2, Mirai variants, and Sorry ransomware against government targets in Southeast Asia and managed service providers across five countries.
Threat IntelA 24-year-old Scottish national admitted to wire-fraud conspiracy and aggravated identity theft tied to the 2022 phishing campaign that put Scattered Spider on the map, the second senior member to plead guilty in US federal court and a useful read on how durable the loose-knit crew remains a year after its first conviction.
PolicyFederal civilian agencies have less than two weeks to remediate eight newly weaponized CVEs added to CISA's Known Exploited Vulnerabilities catalog — three of them in Cisco Catalyst SD-WAN Manager, plus reactivated bugs in PaperCut, Zimbra, Quest KACE, JetBrains, and Kentico that are now tied to nation-state and ransomware operators.
AI AgentsFeaturedA maximum-severity code-injection flaw in Flowise's CustomMCP node, CVE-2025-59528, is being exploited from a single Starlink IP across more than 12,000 internet-facing instances — the third in-the-wild Flowise vulnerability in seven months.
IdentityRecorded Future's 2025 identity-threat data, surfaced this week by Dark Reading, indexed 276 million stolen credentials carrying active session cookies — about 31% of all malware-sourced creds, each one effectively pre-authenticated. Identity is the perimeter, and the multi-factor prompt is no longer the chokepoint defenders thought it was.
AI SecurityFeaturedTwelve hours and thirty-one minutes after public disclosure, attackers were already pivoting through CVE-2026-33626, a server-side request forgery flaw in LMDeploy's vision-language module — probing AWS metadata, Redis, and MySQL from a tool most ML teams run with little operational telemetry.
01 · The Shift
AI is revolutionizing how we detect, prevent, and respond to cyber threats. From automated threat detection to predictive defense systems, artificial intelligence is becoming the cornerstone of modern cybersecurity strategy — enabling organizations to stay ahead of evolving digital risks.
Read the manifestoCore AI security — model integrity, agent authorization, guardrails, runtime defense, and the adversarial edge.
“At the core of each vendor sits at least one brilliant technologist — we put their perspective on the record.”
Modern SIEM, SOAR, autonomous response — the platforms rewriting day-to-day SecOps.
Non-human identity, machine credentials, secrets governance, service-account security.
Every participating vendor runs a live, interactive demo room on cybersymposiums.com — covering SOC Automation, App Security, NHI, Cloud, Identity and more. Every one curated, every one verified.
From ROI to behavioural science to the contrarian views — the full panel set that launched the Security Champions track.
CISOs, analysts, AI researchers, policy leaders and the founders of the tools you'll see demoed. Every contributor on the program.

Chief Research Analyst
IT-Harvest

Security Advisor
Google Cloud

Co-Founder & CEO
Cloud Security Alliance

Creator of Zero Trust
On2IT Cybersecurity

Chief Strategy Officer
Ericom Software

CISO
Anthropic

Co-Chair AI Safety Working Groups
Cloud Security Alliance

CPO
Exabeam

Chief Innovation Officer
Team8

VP Solutions Engineering & Americas Field CTO
SentinelOne

AI and Cybersecurity Researcher
NIST

Trustworthy & Secure AI Department Manager
MITRE

Founding Partner
Acrew Capital

Chief Data Strategy Officer
Abaxx Technologies

CISO
AdaptHealth

Co-Founder & CEO
Adversa AI

CISO
Al Maryah Community Bank

Founder & CEO
Alpha Design AI

CISO
Alvaka

Principal Scientist
Amazon

CISO
American Public Education

CEO, CISO & Hacker
Arcanum Information Security

CEO
Aurascape.ai

CEO
Autio Strategies

Founder and Chief Scientist
Lakera

Founder
B9AI

Identity Security Expert · Worldwide Keynote Speaker
BrainCore.Net

Founder / CEO / CISO
CASMO

VP Information Security
Centene Corporation

Cybersecurity Specialist
CISA

CTO (acquired by Cisco)
Cisco

CISO
City & County of Denver
Live, interactive demo rooms on cybersymposiums.com — SOC, identity, data, AI, cloud. Hover to pause the reel.
Editorial briefings, new panel drops, and demo-room spotlights — one email, every Tuesday. No fluff, no recruiters.
· One-click unsubscribe. We never share your address.
· Ready to join? ·
Registration is free for qualified security practitioners — analysts, CISOs, SOC leads, application-security engineers, identity architects. Get instant access to every agenda, every demo room, every replay.