Program Hosts
Walker Dimon
AI for Cyber Group Leader
MITRE

Christina Liaghati
AI Department Manager
MITRE

Martin Stanley
AI and Cybersecurity Researcher
NIST

James Rutt
CISO
The Dana Foundation

Jonathan Litchman
Co-Founder & CEO
The Providence Group

Sam Rehman
CEO
Hitachi Cyber

Andy Chun
Founder
B9AI

Derek Melber
Technology Strategist
Guidepoint Security

Dean Sapp
CISO
Filevine

Mark Kraynak
Founding Partner
Acrew Capital

Michelle Dennedy
Chief Data Strategy Officer
Abaxx Technologies

Michael Myint
CISO
AdaptHealth

Zaheer Shaikh
CISO
Al Maryah Community Bank

Kevin McDonald
CISO
Alvaka

Chloe Autio
Founder and CEO
Autio Strategies

Rick Doten
CISO
Centene Corporation

Merlin Namuth
CISO
City and County of Denver

J. Michael Daniel
President & CEO
Cyber Threat Alliance

Apostol Vassilev
Research Team Supervisor
NIST

Tyson Kopczynski
CISO
WhiteRabbit

Rob van der Veer
Chief AI Officer
Software Improvement Group

Mark Butler
VP Security Solutions
Trace3

Patrick Angel
CISO
WGroup

Michael Nouguier
Partner & CISO
Richey May

Eidan Siniver
Cyber, Data & AI CTO
Team8

Michael Morgenstern
Partner
DayBlink Consulting

Karina Klever
CEO / CISO
Klever Compliance

Tim Dzierzek
Director, Security and Compliance
Atomic

Benjamin Dulieu
CISO
Duck Creek Technologies

Michelle Dennedy
Chief Data Strategy Officer
Abaxx Technologies

Continuous AI Risk Detection with Red Teaming, real time vulnerability removal with LLM Guardrails
Powered by the world’s most advanced AI threat database, Enkrypt’s capabilities are based on proprietary databases that combine insights from GenAI applications, open source data, and our dedicated ML research. Detects threats, removes vulnerabilities, and monitors performance for continuous insights.


Executive Overview

Platform Demo
AI Native Terminal for Technical Ops: full security, full compliance
How to bring Agentic execution to security, DevOps, and IT via one platform where AI analyzes context, takes action across systems, and verifies outcomes in production.


Platform Demo
Always on” AI security requires model selection and import to red teaming and testing, as well as deployment and runtime monitoring.
Each product in the Protect AI suite is backed by 17k+ security researchers from the huntr community, and in partnership with Hugging Face, our first- and third-party threat research feeds our products so teams can stay ahead of attackers.


Executive Overview

Platform Demo
Agentic Security for Agentic AI applications
Agentic-native models for detection and minimal false positives, sub-second guardrail and detection performance designed for real production workloads and enterprise-grade privacy, isolated data paths, and adaptive guardrails that continuously improve without human tuning are the hallmarks of Straiker’s technology.


Analyst Briefing

Platform Demo
Using one, comprehensive AI Security Platform for all LLMs, RAG, & AI Agents
To secure the entire AI ecosystem you must have full visibility and control over LLMs, RAG systems and autonomous agents. Without this comprehensive security and governance you cannot ensure your organization is safe, compliant and ready for the AI-driven future


The Role of AI at Noma
Deploy AI with full, real time visibility, AI native protection and behavior based governance for every model, application, and autonomous agent.
Govern human and AI agent workforces with network wide visibility and behavior based controls. Protect models and applications with runtime defense, enabling innovation with an enterprise-first, private instance architecture.


Executive Overview

Platform Demo
Minimizing the risk of threat exposure, promptware & anomalous AI Agent behavior via Agentless SAAS
Protection across the entire Agent ecosystem and organizations’ modern environments (e.g. misconfigurations, tool usage, triggers, and runtime behavior) to give security teams a unified, intent-aware view of agent activity. Our dynamic graph stitches together build-time and runtime data, revealing how individual issues compound into real risk.

