AI Security

TECHNOLOGIST FORUM

Top vendor technologists share their point of view

It's often overlooked that at the core of each vendor sits at least one brilliant technologist.

They spend their days contemplating solutions to big problems but with all of the punditry crowding industry discourse we rarely get their perspective.

This forum aims to right that.

Panels are comprised of invited vendor technologists and are hosted by non vendor SMEs.

FILTERS
Filter by Month:Filter by:
DATE
HOST
TOPIC
PANELISTS
January
Richard Stiennon
Chief Research Analyst
IT-Harvest

Agentic AI: Assessing the Risks and Impacts on Offensive and Defensive Security

Panelists:TBA
January
Anton Chuvakin
Industry Analyst
Google

Navigating AI Regulatory Compliance: Challenges and Solutions

Panelists:TBA
January
Rob Van Der Veer
Chief AI Officer
Software Improvement Group

Strategies for Red Teaming Agentic AI Applications

Panelists:TBA
Technology review
LIVE NOW

Continuous AI Risk Detection with Red Teaming, real time vulnerability removal with LLM Guardrails

Enkrypt AI

Powered by the world’s most advanced AI threat database, Enkrypt’s capabilities are based on proprietary databases that combine insights from GenAI applications, open source data, and our dedicated ML research. Detects threats, removes vulnerabilities, and monitors performance for continuous insights.

Executive Overview

Executive Overview

A discussion of Enkrypt AI’s approach to enterprise agentic AI security, covering policy-to-rule enforcement, adversarial testing, runtime guardrails, and how Encrypt builds trust infrastructure for autonomous AI.
Sahil Agarwal
CEO
Enkrypt AI
Platform Demo

Platform Demo

A tour of Enkrypt AI’s policy engine, endpoint management, automated red-teaming, and runtime guardrails, showing how the platform secures and governs generative AI systems.
Go to Demo Room
January
Ben Johns
Cyber Risk Manager
ANZ

The Future of Agentic AI: Navigating Opportunities and Challenges

Panelists:TBA
January
Patrick Angel
CISO
WGroup

Securing the AI Supply Chain: Identifying and Mitigating Backdoors in Open Source AI Models

Panelists:TBA
Technology review
LIVE NOW

AI Native Terminal for Technical Ops: full security, full compliance

Kindo

How to bring Agentic execution to security, DevOps, and IT via one platform where AI analyzes context, takes action across systems, and verifies outcomes in production.

Platform Demo

Platform Demo

A full walkthrough of the Kindo agentic automation platform, covering platform architecture, DevSecOps solutions, user experience, admin controls, and Kindo’s proprietary offensive security model
Go to Demo Room
January
Sam Rehman
CEO
Hitachi Cyber

AI-Driven Identity Verification: Strengthen KYC with biometrics, liveness checks, document analysis, and risk scoring

Panelists:TBA
January
Michael Myint
CISO
AdaptHealth

Securing Your AI Investment

Panelists:TBA
January
Eidan Siniver
Cyber, Data & AI CTO
Team8

How to Keep Your AI Agents from Going Rogue

Panelists:TBA
Technology review
LIVE NOW

Always on” AI security requires model selection and import to red teaming and testing, as well as deployment and runtime monitoring.

Protect AI

Each product in the Protect AI suite is backed by 17k+ security researchers from the huntr community, and in partnership with Hugging Face, our first- and third-party threat research feeds our products so teams can stay ahead of attackers.

Executive Overview

Executive Overview

Ian explains how Protect AI enables you to implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats, end-to-end.
Richard Stiennon
Research Analyst
IT-Harvest
Ian Swanson
CEO and Founder
Protect AI
Platform Demo

Platform Demo

Chris tours the Protect AI platform with a focus on the Guardian component, the main capability of the most comprehensive platform for securing your AI. Chris show how you can implement AI-SPM capabilities to see, know, and manage security risks and defend against unique AI security threats
Go to Demo Room
January
Sean McGregor
AI & Media Integrity Steering Committee, Responsible AI Collaborative

Contrasting AI Application Security with Traditional Cybersecurity Practices

Panelists:TBA
January
Sam Rehman
CEO
Hitachi Cyber

AI Security: Pushing the Boundaries of Prompt Injection Attacks

Panelists:TBA
February
Walker Dimon
AI for Cyber Group Leader
MITRE

Effective Implementation of AI and ML: Steering Clear of Security Pitfalls

Panelists:TBA
Technology review
LIVE NOW

Agentic Security for Agentic AI applications

Straiker

Agentic-native models for detection and minimal false positives, sub-second guardrail and detection performance designed for real production workloads and enterprise-grade privacy, isolated data paths, and adaptive guardrails that continuously improve without human tuning are the hallmarks of Straiker’s technology.

Analyst Briefing

Analyst Briefing

A discussion of Straiker’s approach to agentic AI security including prompt-injection, data leakage, tool manipulation, red-teaming, guardrails, and how enterprises should prioritize AI security.
Ankur Shah
Co-Founder & CEO
Straiker
Anton Chuvakin
Industry Analyst
Google
Platform Demo

Platform Demo

A full walkthrough of Straiker’s Ascend and Defend AI, showing automated red-teaming, runtime guardrails, and threat detection across RAG and agentic AI applications.
Go to Demo Room
February
Christina Liaghati
AI Department Manager
MITRE

Strategies for Safeguarding Individuals and Securing Data in the Era of Generative AI

Panelists:TBA
February
Karina Klever
CEO / CISO
Klever Compliance

AI-Driven Anomaly Detection for API Abuse and Fraud

Panelists:TBA
February
Mark Kraynak
Founding Partner
Acrew Capital

AI-Driven CTEM Strategy: Leveraging Machine Learning for Advanced Threat Management

Panelists:TBA
Technology review
LIVE NOW

Using one, comprehensive AI Security Platform for all LLMs, RAG, & AI Agents

Noma Security

To secure the entire AI ecosystem you must have full visibility and control over LLMs, RAG systems and autonomous agents. Without this comprehensive security and governance you cannot ensure your organization is safe, compliant and ready for the AI-driven future

The Role of AI at Noma

The Role of AI at Noma

Go to Demo Room
March
Michael Myint
CISO
AdaptHealth

Automated Breach and Attack Simulation: The AI-Powered Cost & Risk Reduction Revolution

Panelists:TBA
March
Jonathan Litchman
Co-Founder & CEO
The Providence Group

Securing LLMs: Practical Protection Strategies for AI Developers

Panelists:TBA
March
Rick Doten
CISO
Centene

AI Security: LLM Security and Abuse Cases

Panelists:TBA
Technology review
LIVE NOW

Deploy AI with full, real time visibility, AI native protection and behavior based governance for every model, application, and autonomous agent.

Witness AI

Govern human and AI agent workforces with network wide visibility and behavior based controls. Protect models and applications with runtime defense, enabling innovation with an enterprise-first, private instance architecture.

Executive Overview

Executive Overview

WitnessAI is building the guardrails that make AI safe, productive, and usable. Our platform allows enterprises to innovate and enjoy the power of generative AI, without losing control, privacy, or security.
Trevor Welsh
VP of Products
Witness AI
Platform Demo

Platform Demo

See how we enable you to observe, control and protect all aspects of AI usage in your environment
Trevor Welsh
VP of Products
Witness AI
Go to Demo Room
March
Dean Sapp
CISO
Filevine

Data Security in AI Systems: Major Threats, Mitigation Strategies, and Recommended Best Practices

Panelists:TBA
March
Derek Melber
Technology Strategist
Guidepoint Security

Best Practices for Generative AI Risk Management and Security

Panelists:TBA
March
James Rutt
CISO
The Dana Foundation

Emerging Protocols: Understanding MCP and A2A Security

Panelists:TBA
Technology review
LIVE NOW

Minimizing the risk of threat exposure, promptware & anomalous AI Agent behavior via Agentless SAAS

Zenity

Protection across the entire Agent ecosystem and organizations’ modern environments (e.g. misconfigurations, tool usage, triggers, and runtime behavior) to give security teams a unified, intent-aware view of agent activity. Our dynamic graph stitches together build-time and runtime data, revealing how individual issues compound into real risk.

Analyst Briefing

Analyst Briefing

Michael Bargury
Co-Founder & CTO
Zenity
Anton Chuvakin
Industry Analyst
Google
Go to Demo Room
March
Walker Dimon
AI for Cyber Group Leader
MITRE

AI for API Security: How AI can enhance security measures for APIs, including automated testing and monitoring for vulnerabilities

Panelists:TBA
March
Jonathan Litchman
Co-Founder & CEO
The Providence Group

Exploring AI Agents: Their Purpose, Capabilities and Impact

Panelists:TBA
March
Christina Liaghati
AI Department Manager
MITRE

AI-Powered Code Review: Automating code analysis to surface security flaws and improve quality

Panelists:TBA
March
Jonathan Litchman
Co-Founder & CEO
The Providence Group

Continuous Threat Modeling with AI: Adaptive, real-time threat modeling and vulnerability prioritization

Panelists:TBA
March
Andy Chun
Founder
B9AI

AI-Integrated Secure SDLC: Embedding AI across the SDLC to detect risks and automate security controls

Panelists:TBA
March
Dean Sapp
CISO
Filevine

AI-Powered Identity Analytics: Predicting and Preventing Identity Fraud

Panelists:TBA
March
Kevin McDonald
CISO
Alvaka

AI in PTaaS: Revolutionizing Penetration Testing with Machine Learning

Panelists:TBA
March
Rick Doten
CISO
Centene Corporation

AI-Powered Threat Intelligence Collection: Automate aggregation, enrichment, and normalization of feeds

Panelists:TBA
March
J. Michael Daniel
President & CEO
Cyber Threat Alliance

Predictive Threat Intelligence: Use ML to forecast attacks, exploit trends, and emerging TTPs for proactive defense

Panelists:TBA
March
Christina Liaghati
AI Department Manager
MITRE

Safeguarding Data Privacy in Agentic AI Systems

Panelists:TBA
March
Rob Van Der Veer
Chief AI Officer
Software Improvement Group

Managing AI Security Risks

Panelists:TBA
March
Sam Rehman
CEO
Hitachi Cyber

Taming Shadow AI: Detecting, Managing and Mitigating Unsupervised AI Usage in the Enterprise

Panelists:TBA
March
Ken Huang
Author, Speaker at CSA

Talking to the Board About Governance for AI, Cyber and Privacy

Panelists:TBA
March
Martin Stanley
AI and Cybersecurity Researcher
NIST

Organizational, Operational and Pragmatic Considerations for Securing AI Systems and Data

Panelists:TBA
April
Chloe Autio
Founder & CEO
Autio Strategies

Balancing Benefits and Risks: The Role of Agentic AI

Panelists:TBA
April
Derek Melber
Technology Strategist
Guidepoint Security

Agentic AI in Action: Revolutionizing Automated Vulnerability Remediation

Panelists:TBA
April
Namrata Shah
Managing Director - Global Head of Engineering
Nuveen

Threat Modeling for Agentic AI Applications

Panelists:TBA
April
Michael Myint
CISO
AdaptHealth

Silent Sabotage: Weaponizing AI Models in Exposed Containers

Panelists:TBA
April
Kevin McDonald
CISO
Alvaka

The Rise of Agentic AI and its Security Considerations

Panelists:TBA
April
Michael Myint
CISO
AdaptHealth

AI and Machine Learning in Identity Threat Detection: Transforming Security Posture

Panelists:TBA
April
Kevin McDonald
CISO
Alvaka

AI-Driven Identity Governance: Automating Compliance and Risk Assessment Processes

Panelists:TBA
April
Rick Doten
CISO
Centene Corporation

AI-Powered Risk Assessment: Automating risk analysis by ingesting diverse data to surface, score, and prioritize vulnerabilities

Panelists:TBA
April
Merlin Namuth
CISO
City and County of Denver

AI Security: Understanding the AI/ML Threat Landscape

Panelists:TBA
April
J. Michael Daniel
President & CEO
Cyber Threat Alliance

Automated Compliance Monitoring: Continuous AI-driven checks and alerts to ensure adherence to GDPR, HIPAA, PCI-DSS

Panelists:TBA
April
Tyson Kopczynski
CISO
WhiteRabbit

AI-Powered Third-Party Risk Management: Continuous vendor scoring, supply-chain exposure detection, and automated due diligence

Panelists:TBA
April
Mark Butler
VP Security Solutions
Trace3

AI-Enabled DPIAs: Automated Data Protection Impact Assessments to map data flows, score privacy risks, and generate mitigation guidance

Panelists:TBA
April
Michael Morgenstern
Partner
DayBlink Consulting

AI and Machine Learning: Revolutionizing Vulnerability Detection and Remediation

Panelists:TBA
May
Tim Dzierzek
Director, Security and Compliance
Atomic

Risk-Based Vulnerability Management: Leveraging AI for Prioritization and Mitigation

Panelists:TBA
May
Ken Huang
Author, Speaker at CSA

Securing Large Language Models: From Training to Deployment

Panelists:TBA
May
Tyson Kopczynski
CISO
WhiteRabbit

Contextualized Threat Intelligence with AI: Tailor signals to organizational context for improved relevance and prioritization

Panelists:TBA
May
Harold Booth
Computer Scientist
NIST

Leveraging AI in Cybersecurity: Enhancing Security Teams with Advanced Tools and Benefits

Panelists:TBA
May
Rick Doten
CISO
Centene Corporation

Governance for AI Agents

Panelists:TBA
May
Benjamin Dulieu
CISO
Duck Creek Technologies

AI-Powered Threat Detection in Runtime Environments

Panelists:TBA
May
J. Michael Daniel
President & CEO
Cyber Threat Alliance

AI Security: Retrieval Augmented Generation Systems

Panelists:TBA
May
Rob van der Veer
Chief AI Officer
Software Improvement Group

Unmasking Bias in AI: Securing Products in an Imperfect World

Panelists:TBA
May
Michael Nouguier
Partner & CISO
Richey May

AI-Driven Insights: Leveraging Artificial Intelligence for Predictive Vulnerability Analysis

Panelists:TBA
May
Michelle Dennedy
Chief Data Strategy Officer
Abaxx Technologies

AI & Machine Learning: Revolutionizing Code Scanning Efficiency for the Modern Developer

Panelists:TBA
May
Christina Liaghati
AI Department Manager
MITRE

AI-Enhanced SAST & DAST: Improve static and dynamic vulnerability detection, reduce false positives, and prioritize actionable findings

Panelists:TBA
May
James Rutt
CISO
The Dana Foundation

AI-Powered Real-Time Transaction Monitoring: Monitor and block fraudulent transactions instantly using anomaly detection and behavioral analytics

Panelists:TBA
May
Derek Melber
Technology Strategist
Guidepoint Security

AI-Augmented Anti-Money Laundering (AML): Detect suspicious patterns and networks, prioritize alerts, and automate investigations

Panelists:TBA