
Richard Stiennon
Chief Research Analyst
IT-Harvest
Online Showcase & Conference
Early Access thruMay 8
LIVE PROGRAM:May 11 thru August 31
Your definitive source for staying abreast of rapidly evolving topics within the cybersecurity industry. Through broadcast-quality video content featuring leading analysts and top experts in panels, analyst roundtables, and other formats — we give you the latest word on all salient topics, at no cost.
Featuring Live Tracks with leading analysts and expert panels.
Core AI security — model integrity, agent authorization, guardrails, runtime defense.
Modern SIEM, SOAR and autonomous response — the platforms rewriting day-to-day SecOps.
Every Cybersymposiums agenda — every category, panel, and demo room in one index.
Every discipline tracked — from AppSec and Code Scanning to NHI, Identity and Deepfake Defense.
AI SecurityA new evaluation from the UK's AI Security Institute concludes that OpenAI's generally-available GPT-5.5 performs on par with Anthropic's restricted Claude Mythos at finding software vulnerabilities — and that a smaller model with the right prompting scaffolding gets close enough to matter.
Code SecurityFeaturedA heap buffer overflow in NGINX's rewrite module, undisclosed since 2008, can be triggered by a single crafted HTTP request and reaches unauthenticated RCE on hosts running with ASLR disabled. F5 has shipped patches for Open Source, Plus, and every derivative.
VendorA maximum-severity authentication bypass in Cisco Catalyst SD-WAN Controller (CVE-2026-20182, CVSS 10.0) lets unauthenticated attackers gain administrative control over the SD-WAN fabric via UDP 12346. Cisco has confirmed limited in-the-wild exploitation; the vulnerable component has now produced two 10.0-rated bypasses in three years.
AI SecurityFeaturedOpenAI launched Daybreak, a defensive cyber initiative pairing three GPT-5.5 variants with Codex Security to give vendors access to AI vulnerability discovery, threat modeling, and patch validation. The release confirms that frontier labs now treat vuln-finding capability as gated infrastructure rather than a public product.
AI SecurityFeaturedAnthropic held back its Claude Mythos Preview from public release because it finds software vulnerabilities at a rate defenders cannot match in their patch cycles. Bruce Schneier argues the deeper concern isn't software at all — it's every other rule-based system AI can now mine for exploits.
Threat IntelA high-severity flaw in Ivanti's on-prem mobile device management platform, CVE-2026-6973, hit CISA's Known Exploited Vulnerabilities list with one of the tightest deadlines of the year. The exploitation requires admin authentication — which means previously compromised credentials are the live attack path.
01 · The Shift
AI is revolutionizing how we detect, prevent, and respond to cyber threats. From automated threat detection to predictive defense systems, artificial intelligence is becoming the cornerstone of modern cybersecurity strategy — enabling organizations to stay ahead of evolving digital risks.
Read the manifestoCore AI security — model integrity, agent authorization, guardrails, runtime defense, and the adversarial edge.
“At the core of each vendor sits at least one brilliant technologist — we put their perspective on the record.”
Modern SIEM, SOAR, autonomous response — the platforms rewriting day-to-day SecOps.
Non-human identity, machine credentials, secrets governance, service-account security.
Every participating vendor runs a live, interactive demo room on cybersymposiums.com — covering SOC Automation, App Security, NHI, Cloud, Identity and more. Every one curated, every one verified.
From ROI to behavioural science to the contrarian views — the full panel set that launched the Security Champions track.
CISOs, analysts, AI researchers, policy leaders and the founders of the tools you'll see demoed. Every contributor on the program.

Chief Research Analyst
IT-Harvest

Security Advisor
Google Cloud

Co-Founder & CEO
Cloud Security Alliance

Creator of Zero Trust
On2IT Cybersecurity

Chief Strategy Officer
Ericom Software

CISO
Anthropic

Co-Chair AI Safety Working Groups
Cloud Security Alliance

CPO
Exabeam

Chief Innovation Officer
Team8

VP Solutions Engineering & Americas Field CTO
SentinelOne

AI and Cybersecurity Researcher
NIST

Trustworthy & Secure AI Department Manager
MITRE

Founding Partner
Acrew Capital

Chief Data Strategy Officer
Abaxx Technologies

CISO
AdaptHealth

Co-Founder & CEO
Adversa AI

CISO
Al Maryah Community Bank

Founder & CEO
Alpha Design AI

CISO
Alvaka

Principal Scientist
Amazon

CISO
American Public Education

CEO, CISO & Hacker
Arcanum Information Security

CEO
Aurascape.ai

CEO
Autio Strategies

Founder and Chief Scientist
Lakera

Founder
B9AI

Identity Security Expert · Worldwide Keynote Speaker
BrainCore.Net

Founder / CEO / CISO
CASMO

VP Information Security
Centene Corporation

Cybersecurity Specialist
CISA

CTO (acquired by Cisco)
Cisco

CISO
City & County of Denver
Live, interactive demo rooms on cybersymposiums.com — SOC, identity, data, AI, cloud. Hover to pause the reel.
Editorial briefings, new panel drops, and demo-room spotlights — one email, every Tuesday. No fluff, no recruiters.
· One-click unsubscribe. We never share your address.
· Ready to join? ·
Registration is free for qualified security practitioners — analysts, CISOs, SOC leads, application-security engineers, identity architects. Get instant access to every agenda, every demo room, every replay.