EVERY TRACK · FOUR HUBS · LIVE DEMO ROOMS
Every participating technologist, every vendor, every discipline — indexed. Pick a track to jump into panels, presenter bios, and on-demand sessions.
Where most practitioners start.
01 · Flagship Sessions
AI Tech Forum Hub
AI security vendors — threat defense, model security, guardrails and more
02 · Autonomy Sessions
SOC Automation Hub
Modern SIEM, SOAR, alert triage and autonomous response
03 · Identity Panels
NHI Showcase
Machine identity management, secrets, and non-human identity
04 · Curated Vendors
Featured Vendors
Highlighted vendor deep-dives with demo rooms and expert interviews
The index. Every discipline. Every track.
AI Security & Trust
Defense · Integrity · Governance
- AIS-01 AI Security Core AI security technologies and threat defense
- AIS-02 AI Agents Agent authorization, sandboxing, orchestration security
- AIS-03 Model Security Model integrity, watermarking, tamper detection, supply chain
- AIS-04 Deepfake Defense Real-time deepfake detection for video, audio and identity
- AIS-05 AI Compliance GDPR, HIPAA, PCI and regulatory compliance for AI
- AIS-06 AI Governance Model lifecycle governance, policy-as-code, risk registers
- AIS-07 AI Guardrails Runtime guardrails, content safety, prompt sanitization
Security Operations
Detection · Response · Autonomy
- SOC-01 SOC Automation Modern SIEM, SOAR and SOC automation platforms
- SOC-02 Threat Intelligence Threat feeds, intelligence platforms and analysis
- SOC-03 Vulnerability Management Vulnerability scanning, prioritization and remediation
- SOC-04 Penetration Testing AI-driven PTaaS, red-teaming and adversary simulation
- SOC-05 Fraud Prevention AI-powered fraud detection and prevention systems
Application & Code Security
Supply chain · Shift-left
Risk, Identity & Data
Posture · People · Perimeter
- RID-01 Cyber Risk Management Risk quantification, exposure management and third-party risk
- RID-02 Identity Security ITDR, PAM, non-human identity and zero-trust access
- RID-03 Data Security Data discovery, DLP, DSPM and privacy-enhancing technologies
- RID-04 Human Risk Management Behavioral analytics, security awareness and insider threat
- RID-05 Email Security AI phishing detection, BEC prevention and email threat response
· Not sure where to start? ·
Browse by vendor instead.
Every participating company runs a live demo room — every discipline covered. Jump directly to the vendors.