Program Hosts
Walker Dimon
AI for Cyber Group Leader
MITRE

Christina Liaghati
AI Department Manager
MITRE

Martin Stanley
AI and Cybersecurity Researcher
NIST

James Rutt
CISO
The Dana Foundation

Jonathan Litchman
Co-Founder & CEO
The Providence Group

Sam Rehman
CEO
Hitachi Cyber

Andy Chun
Founder
B9AI

Derek Melber
Technology Strategist
Guidepoint Security

Dean Sapp
CISO
Filevine

Mark Kraynak
Founding Partner
Acrew Capital

Michelle Dennedy
Chief Data Strategy Officer
Abaxx Technologies

Michael Myint
CISO
AdaptHealth

Zaheer Shaikh
CISO
Al Maryah Community Bank

Kevin McDonald
CISO
Alvaka

Chloe Autio
Founder and CEO
Autio Strategies

Rick Doten
CISO
Centene Corporation

Merlin Namuth
CISO
City and County of Denver

J. Michael Daniel
President & CEO
Cyber Threat Alliance

Apostol Vassilev
Research Team Supervisor
NIST

Tyson Kopczynski
CISO
WhiteRabbit

Rob van der Veer
Chief AI Officer
Software Improvement Group

Mark Butler
VP Security Solutions
Trace3

Patrick Angel
CISO
WGroup

Michael Nouguier
Partner & CISO
Richey May

Eidan Siniver
Cyber, Data & AI CTO
Team8

Michael Morgenstern
Partner
DayBlink Consulting

Karina Klever
CEO / CISO
Klever Compliance

Tim Dzierzek
Director, Security and Compliance
Atomic

Benjamin Dulieu
CISO
Duck Creek Technologies

Michelle Dennedy
Chief Data Strategy Officer
Abaxx Technologies

Benchmarking Continuous AI Risk Detection & LLM-Guardrail Remediation
Powered by the world's most advanced AI threat database, Enkrypt's capabilities are based on proprietary databases that combine insights from GenAI applications, open source data, and our dedicated ML research. Detects threats, removes vulnerabilities, and monitors performance for continuous insights.


Executive Overview

Platform Demo
Evaluating AI-Native Terminals for Technical Ops: Security & Compliance
How to bring Agentic execution to security, DevOps, and IT via one platform where AI analyzes context, takes action across systems, and verifies outcomes in production.


Platform Demo
Assessing "Always-On" AI Security: Model Vetting, Red-Teaming & Runtime Monitoring
Each product in the Protect AI suite is backed by 17k+ security researchers from the huntr community, and in partnership with Hugging Face, our first- and third-party threat research feeds our products so teams can stay ahead of attackers.


Executive Overview

Platform Demo
Testing Agentic Security for Agentic AI Applications
Agentic-native models for detection and minimal false positives, sub-second guardrail and detection performance designed for real production workloads and enterprise-grade privacy, isolated data paths, and adaptive guardrails that continuously improve without human tuning are the hallmarks of Straiker's technology.


Analyst Briefing

Platform Demo
Comparing Unified AI Security Platforms for LLMs, RAG & AI Agents
To secure the entire AI ecosystem you must have full visibility and control over LLMs, RAG systems and autonomous agents. Without this comprehensive security and governance you cannot ensure your organization is safe, compliant and ready for the AI-driven future


The Role of AI at Noma
Measuring Real-Time Visibility & Behavior-Based Governance for Every Model & Agent
Govern human and AI agent workforces with network wide visibility and behavior based controls. Protect models and applications with runtime defense, enabling innovation with an enterprise-first, private instance architecture.


Executive Overview

Platform Demo
Profiling Agentless SaaS Controls to Minimize Promptware & Anomalous AI Behavior
Protection across the entire Agent ecosystem and organizations’ modern environments (e.g. misconfigurations, tool usage, triggers, and runtime behavior) to give security teams a unified, intent-aware view of agent activity. Our dynamic graph stitches together build-time and runtime data, revealing how individual issues compound into real risk.


Analyst Briefing
Build and Run Secure AI Systems: identify, assess and mitigate security risks across your entire AI lifecycle
Accelerate your AI journey with full visibility, continuous risk assessment, and adaptive protection while discovering all AI assets across your organization to eliminate blind spots and ensure compliance.





