Tuesday, February 11, 2025
8:00am-6:00pm
Tuesday - 2/11/25
10:00-10:45am
Tuesday - 2/11/25
Enterprise Cybersecurity ()
Cybersecurity 2024: The State of Cyber Threats ECE-01
In this opening discussion, industry experts will provide a comprehensive overview of the current cybersecurity landscape. Attendees will gain insights into emerging threats, attack vectors, and the latest trends in cybercrime. The session will discuss the impact of these threats on organizations of all sizes and explore the challenges faced by security professionals in mitigating risks. REGISTER ME
|
Enterprise Cybersecurity |
11:00-11:45am
Tuesday - 2/11/25
Enterprise Cybersecurity ()
Leveraging Threat Intelligence for Proactive Defense ECE-02
CEO
Red Sentry
Head of Product Strategy, Cybersecurity and Fraud Prevention
Digital Element
Threat intelligence plays a crucial role in preventing and responding to cyberattacks. This session will delve into the importance of collecting, analyzing, and sharing threat intelligence data. Attendees will learn how to leverage threat intelligence to identify potential threats, prioritize risks, and develop effective defense strategies. REGISTER ME
|
Enterprise Cybersecurity |
12:00-12:30pm
Tuesday - 2/11/25
12:30pm
Tuesday - 2/11/25
12:45pm
Tuesday - 2/11/25
1:30-1:55pm
Tuesday - 2/11/25
2:00-2:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity ()
Security Automation and Orchestration for Improved Efficiency ECE-05
As the number and complexity of cyber threats continue to grow, organizations must find ways to improve their security operations. This session will explore the benefits of security automation and orchestration (SOAR) in streamlining security processes, reducing response times, and enhancing overall efficiency. Attendees will learn about best practices for implementing SOAR solutions and integrating them with existing security tools. REGISTER ME
|
Enterprise Cybersecurity |
3:00-3:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity ()
API Security: Protecting Web APIs ECE-06
Head of Cloud Services
Radware
APIs have become an integral part of modern applications, but they also introduce new security vulnerabilities. This session will focus on the importance of API security and discuss common vulnerabilities, such as injection attacks, unauthorized access, and data breaches. Attendees will learn about best practices for securing APIs, including authentication, authorization, and rate limiting. REGISTER ME
|
Enterprise Cybersecurity |
4:00-4:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity ()
Best Practices for Securing Your Remote and Mobile Workforce ECE-07
CEO
Forthright Technologies
President, Technology Services
James Moore and Co.
The increasing adoption of remote and mobile work has created new challenges for security teams. This session will explore the unique security risks associated with remote and mobile workforces. Attendees will learn about best practices for securing devices, networks, and data, as well as implementing effective access controls and data protection measures. REGISTER ME
|
Enterprise Cybersecurity |
5:00-6:00pm
Tuesday - 2/11/25
Wednesday, February 12, 2025
7:30am-7:00pm
Wednesday - 2/12/25
8:30am
Wednesday - 2/12/25
()
Continental Breakfast Served X-06
|
|
9:00-9:45am
Wednesday - 2/12/25
Enterprise Cybersecurity ()
Identity Management: The First Line of Defense ECE-08
CEO and Next-Generation MFA Evangelist
Token
CEO
White Swan Security
Identity management is a fundamental component of a robust security strategy. This session will discuss the importance of effective identity management practices and explore common challenges such as credential theft, privilege escalation, and insider threats. Attendees will learn about best practices for identity governance, authentication, and authorization. REGISTER ME
|
Enterprise Cybersecurity |
10:00-10:45am
Wednesday - 2/12/25
Enterprise Cybersecurity ()
DevSecOps: Integrating Security into Development ECE-09
Shifting security into the development process is essential for building secure applications. This session will explore the principles of DevSecOps and discuss how to integrate security into the development lifecycle. Attendees will learn about tools, techniques, and best practices for building secure code, conducting security testing, and addressing vulnerabilities early in the development process. REGISTER ME
|
Enterprise Cybersecurity |
11:00-11:45am
Wednesday - 2/12/25
Enterprise Cybersecurity ()
How to Create a Resilient Incident Response and Recovery Plan ECE-10
Senior Manager of Cybersecurity
CITY Furniture
VP Cybersecurity Consulting
PDI Technologies
It's not a question of if, but when, a cyber attack will impact your business. A well-crafted incident response and recovery plan is essential for minimizing the impact of any cyberattacks. This session will discuss the key components of an effective incident response plan, including incident detection, containment, eradication, recovery, and lessons learned. Attendees will learn about testing incident response plans and ensuring that organizations are prepared to respond to a variety of cyber threats. REGISTER ME
|
Enterprise Cybersecurity |
12:00-12:45pm
Wednesday - 2/12/25
Enterprise Cybersecurity ()
The Human Element: Building a Security Culture to Combat Phishing and Social Engineering Threats ECE-11
Vice President of Information Security
C3 Complete
President
On Technology Partners
CISO
NINJIO
Phishing and social engineering attacks continue to be a significant threat to organizations, and they are only becoming more complex and harder to identify. This session will explore the human element of security and discuss the importance of building a strong security culture. Attendees will learn about strategies for raising awareness, training employees, and fostering a security-conscious mindset, with the goal of understanding how to effecetivly mitigate social engineering and phishing risks. REGISTER ME
|
Enterprise Cybersecurity |
12:45-1:30pm
Wednesday - 2/12/25
1:30pm
Wednesday - 2/12/25
2:00pm
Wednesday - 2/12/25
2:30pm
Wednesday - 2/12/25
3:00-7:00pm
Wednesday - 2/12/25
()
#TECHSUPERSHOW Expo Hall Grand Opening X-08
|
|
3:30pm
Wednesday - 2/12/25
4:00pm
Wednesday - 2/12/25
4:30pm
Wednesday - 2/12/25
5:00pm
Wednesday - 2/12/25
Solutions Theatre (Expo Floor Theatre)
Generative AI Solutions Showcase - Shaping the Future of AI: Voice Cloning and Synthetic Data in Action SS-04
Head of Data Operations
Deepgram
Voice cloning and synthetic data are transforming conversational AI by enabling scalable, personalized interactions. Deepgram’s advanced voice synthesis allows for the creation of diverse, natural voices, while synthetic data provides an unstoppable gateway to model accuracy, reducing bias, and ensuring privacy. In this session, we’ll explore how these technologies are reshaping industries and improving user experiences, offering insights into the future of AI-driven voice applications. REGISTER ME
|
Solutions Theatre |
5:00-7:00pm
Wednesday - 2/12/25
5:30pm
Wednesday - 2/12/25
6:00pm
Wednesday - 2/12/25
Thursday, February 13, 2025
7:30am-5:00pm
Thursday - 2/13/25
8:00am
Thursday - 2/13/25
()
Continental Breakfast Served X-11
|
|
9:00am
Thursday - 2/13/25
9:30am
Thursday - 2/13/25
10:00am
Thursday - 2/13/25
10:30am
Thursday - 2/13/25
Keynote Presentation (Floridian Ballroom, 3rd Floor)
Keynote Presentation: AI in Action: Driving Excellence Across Customer Experience, Cybersecurity, and Cloud K-08
Widespread AI implementation is just around the corner. Productivity and efficiency gains enabled by generative and non-generative AI technologies are no longer just hype – they’re here. In this dynamic panel discussion led by Telarus CRO Dan Foster, you’ll learn the latest trends behind AI buying behaviors, proven use cases for AI as a powerhouse enablement technology across CX, cybersecurity, and cloud, and upsell strategies for adding AI to your growing business offerings. REGISTER ME
|
Keynote Presentation |
11:00am-5:00pm
Thursday - 2/13/25
()
#TECHSUPERSHOW Expo Hall Open X-12
|
|
11:30am
Thursday - 2/13/25
12:00pm
Thursday - 2/13/25
12:30pm
Thursday - 2/13/25
12:00-12:45pm
Thursday - 2/13/25
Enterprise Cybersecurity ()
Defending Tomorrow: The Convergence of Cybersecurity and Artificial Intelligence ECE-12
Executive Director
Woodside Capital Partners
Chief Security Officer
PDI Technologies
Artificial intelligence has the potential to revolutionize cybersecurity. This session will explore the intersection of cybersecurity and AI, discussing the benefits and challenges of using AI for threat detection, prevention, and response. Attendees will learn about AI-powered security tools and techniques, as well as the ethical implications of using AI in cybersecurity. REGISTER ME
|
Enterprise Cybersecurity |
1:00pm
Thursday - 2/13/25
1:00-1:45pm
Thursday - 2/13/25
Enterprise Cybersecurity ()
The Future of Cybersecurity: Quantum Computing and Beyond ECE-13
While the cybersecurity space has evolved significantly over the past several years, new innovations and technologies will pose new threats (and create new opporuntities). For instance, quantum computing has the potential to break traditional cryptographic algorithms, posing a significant threat to cybersecurity. This session will discuss the implications of quantum computing for cybersecurity and explore potential countermeasures. Attendees will learn about quantum-resistant algorithms and other emerging technologies that may help organizations prepare for a more secure future. REGISTER ME
|
Enterprise Cybersecurity |
1:30pm
Thursday - 2/13/25
2:00pm
Thursday - 2/13/25
2:30pm
Thursday - 2/13/25
3:00pm
Thursday - 2/13/25
3:00-5:00pm
Thursday - 2/13/25
3:30pm
Thursday - 2/13/25
4:00pm
Thursday - 2/13/25
4:30pm
Thursday - 2/13/25
5:15pm
Thursday - 2/13/25
IDEA 2025 ()
IDEA Showcase Startup Pitches & Reception IDEA-01
|
IDEA 2025 |
8:00-10:00pm
Thursday - 2/13/25