Program Hosts
Jamie Morrison
Director SOC
One Source

Jim Rutt
CISO
The Dana Foundation

Jon Shende
Global VP SecOps
Sutherland

Greg Rogers
CISO
GuidePoint Security

Christopher Crowley
Independent Consultant
Montance

Arif Hameed
CISO
C&R Software

John Rubey
Managing Director
Accenture

Garrett Smiley, Ph.D.
Chief Digital Risk Officer (CDRO)
Maximus

James Castle
CEO & CSO
Terranova Aerospace & Defense Group

Pauline Parra
Director, Governance, Risk & Compliance (GRC)
Bullish

Scott Foote
Chief AI Officer (CAIO)
Phenomenati

Candy Alexander
AI Strategist, Speaker, and Evangelist
Alexander Cyber Advisory Services

Krista Arndt
Associate CISO
St. Luke's University Health Network

John Bruggeman
vCISO
CBTS

Robert Boyce
AI + Cyber Leader
Accenture

Joshua Kuntz
vCISO
Vistrada

Meg Anderson
Retired CISO
Retired

Chirag Arora
Chief AI & Security Officer
Dorf Nelson & Zauderer LLP

Ian Schneller
CISO
Health Care Service Corporation

Frank DePaola
VP & CISO
Enpro

Analyzing Attack Behavior to Deliver Precise, Contextual Remediation Filters
Radware’s AI SOC Xpert technology continuously analyzes attack behavior across protected assets. Rather than monitoring thresholds alone, it learns from traffic evolution, recognizing when patterns shift and how protections respond. The result is a coherent incident narrative that accelerates triage, sharpens decision‑making, and significantly reduces time to resolution.


Analyst Briefing

AI SOC Xpert: Revolutionizing SOC Operations
Scoring AI‑Driven Alert Investigation Platforms That Mimic Expert Analysts
Dropzone AI is an autonomous AI SOC Analyst that investigates security alerts, mimicking the reasoning process of expert analysts. It triages alerts, correlates data, and provides decision-ready reports—helping SOC teams reduce manual investigation time and improve security response efficiency.


Dropzone Platform Demo
- 2 Minute Intro
- 5 Minute Product Tour
- Deep Dive Demo

The Role of AI at Dropzone
Measuring Agentic AI Capabilities for Fusing Behavioral Baselines with Contextual Threat Data
Exaforce Exabot Triage autonomously investigates security alerts across SIEM, EDR, phishing tools, and Exaforce detections, delivering context-rich verdicts in minutes. Performs Tier 1 through 3 investigations using enriched, correlated data to classify alerts as False Positive, Benign, or Needs Investigation.


Executive Overview

The Role of AI at StrikeReady

Platform Demo
- 2 Minute Intro
- 5 Minute Product Tour
- Deep Dive Demo
Demonstrating Multi‑Layered AI Agent Architectures for SIEM/EDR Alert Triage
Multi-layered AI agents handle alert triage across your security stack. Hyperagents embedded in workflows process and enrich alerts in context, while a purpose-built AI SOC triage solution analyzes incoming signals from SIEM, EDR, and cloud security tools distinguishing genuine threats from noise and routing critical incidents to the right response workflows.


Executive Interview

Platform Demo
- 2 Minute Intro
- 5 Minute Product Tour
- Deep Dive Demo
Evaluating SIEM Flexibility in the AI Era: Scalable Detection Engineering Across Hybrid Environments
Our mission is to make advanced detection accessible to every security team, enabling them to detect across hybrid, multi-cloud, and data lake environments while keeping their data where it belongs. We meet teams where they are, with a unified, AI-native approach built for flexibility, precision, and scale. Anvilogic was created by operators who've lived the challenges of brittle rules, false positives, and siloed logs.


Executive Interview

The Role of AI at Anvilogic

Platform Demo
- 2 Minute Intro
- 5 Minute Product Tour
- Deep Dive Demo
Comparing Agentic AI Techniques for Correlating Behavioral Baselines & Contextual Intelligence
StrikeReady’s AI powered data pipeline ingests, normalizes, enriches, and stores telemetry, transforming raw information into actionable intelligence by correlating behavioral baselines and contextual intelligence to identify and expose complex attacks.


Executive Overview

The Role of AI at StrikeReady

Platform Demo
- 2 Minute Intro
- 5 Minute Product Tour
- Deep Dive Demo
Mapping Unified Workstream & Data‑Silo Integration for a Human‑AI SOC
This foundationally AI designed platform connects workstreams and data silos into the same view across security platforms and tools and get alerts from multiple sources, prioritized in the same list. No ETL required,no data migration or extraction needed, no delays. AI-driven investigations can be traced back to verified sources and insights so humans can review and replay the analysis.

Testing Claims of Infinite Capacity: 100% Alert Coverage with Two‑Minute Triage Targets
D3's Morpheus ingests events from all sources, strips IOCs instantly and builds a contextual playbook with full stack, time based threat analysis. Our technology analyzes links, generates a full stack risk score and prioritizes based on impact—driven by deep context and intense security intelligence. Your team receives a full incident picture with summaries, timelines, key findings, and precise action steps for fast, effective remediation.

Optimizing Telemetry Ingestion for Modern AI SOC Platforms
Seceon's platform utilizes AI to instantaneously collect telemetry from endpoints, firewalls, cloud apps, identity providers, and more—centralizing your threat landscape for a comprehensive view. Built-in normalization nd enrichment deliver structured, usable data for fast decisions.

Interested in showcasing your technology?
Join our technology agenda and connect with cybersecurity professionals
Get in Touch



