Go Back
United States Summit

The Security Chapter

The Adolphus, Dallas, TX

2 Days
-
2026 Cybersecurity Leadership
The Adolphus Hotel

A bit about our summit

What we're known for

File

Industry Analysis

Glean the knowledge of your peers to shape your organisation's future

File

Peer-Led

Workshops, Fireside Chats & Keynote Addresses

File

1 on 1 Meetings

Strategic BANT-qualified meetings based on project alignment

File

Custom Agenda

Be in control of your own agenda. Maximise your experience.

The Technology Chapter

Audience

We use Apella to understand each executive’s priorities ahead of the summit. Their current focus areas, challenges and interests. This allows us to shape thoughtful, relevant connections where both executives and partners gain value. Every 1:1 meeting is informed, purposeful and mutually beneficial, ensuring conversations feel natural, context-aware and genuinely worthwhile for everyone involved.

Audience illustration
  • 80+
    Senior Executives
  • 15-20
    Solution Providers
  • 5:1
    Executive to Solution Provider Representatives
  • 48%
    C-Suite Executives
  • 52%
    SVP, Directors & Heads of

Agenda

Day 1

12:00 - 13:15
Registration & Networking Lunch
13:20 - 14:10
Welcome Address & Opening Keynote

The summit officially opens with a forward-looking welcome address, setting the agenda for two days of insight, collaboration and strategic discussion. You’ll hear the vision behind this year’s programme and the themes shaping the security landscape in 2026 and beyond.

Our Opening Keynote then takes the stage. Designed to challenge thinking, spotlight emerging risks and opportunities, and provide a practical perspective from the front line of innovation. It’s an energising start to the summit, offering a shared foundation for the conversations and sessions that follow.

14:15 - 14:55
Strengthening Cyber Resilience in a High-Pressure Threat Landscape

By 2026, organisations will be judged not only on how well they prevent attacks, but on how effectively they can withstand and recover from them. With adversaries targeting business continuity and regulators raising expectations, resilience has become a core strategic priority.

This workshop focuses on practical approaches to building resilience across people, processes and technology. You’ll explore real incident scenarios, discuss how peers are stress-testing their environments, and compare methods for improving readiness, response coordination and communication under pressure.

 

dr. lovelie
Name
Dr. Lovelie Moore
Position
BISO
Company
Tayota Financial Services
14:15 - 14:55
Preparing for the Quantum Era Through Practical Crypto-Agility

Quantum computing may not be fully realised yet, but the risk landscape is already shifting. “Harvest-now, decrypt-later” attacks, evolving standards and the push towards post-quantum cryptography make preparation a priority for organisations with long-lived or highly sensitive data.

This workshop focuses on what executives should be doing today to build crypto-agility into their environments. You’ll explore where quantum exposure sits, how to identify systems that need priority migration and what a realistic transition plan looks like without disruption to critical services.

14:15 - 14:55
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

15:00 - 15:40
Securing Autonomous AI Systems & Agentic Workflows

By 2026, AI isn’t just assisting workflows; it’s executing them. Internal agents, copilots with elevated permissions, automated decision engines and LLM-driven integrations have expanded the attack surface in ways traditional controls were never built to handle.

This workshop examines the next phase of AI security: protecting autonomous systems that read, write, decide and act across the business. Discussions will cover agent permissions, safe action boundaries, continuous monitoring, prompt-injection hardening, model integrity and preventing silent failure modes.

Executives will explore what a secure operational model looks like when AI becomes an actor rather than a tool.

f
Name
Dana Kilcrease
Position
Chief Information Security Officer
Company
Berkeley College
15:00 - 15:40
From Blind Spot to Board Priority: Managing Cryptographic Risk in the Age of AI, Quantum, and Zero Trust

Cryptography secures every identity, transaction, and connection — yet most organizations can’t see all the keys, certificates, and algorithms they rely on. This hidden gap is a growing target for threat actors, especially with AI-driven attacks and post-quantum disruption on the horizon. Learn how to discover and prioritize vulnerabilities, automate cryptographic inventory, and make cryptographic risk a measurable part of your security strategy.

In this session, you'll learn how to:

  • Discover and prioritize cryptographic vulnerabilities
  • Automate cryptographic inventory and management
  • Make cryptographic risk a measurable part of your overall security strategy
h
Name
Troy Stark
Position
Head of Strategic Accounts and Business Development
Company
Keyfactor
15:00 - 15:40
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

15:40 - 16:10
Check-In Break

The perfect time to go grab your luggage and check-in to your rooms...

16:15 - 16:55
Peer-Led Problem Solving

This collaborative session brings executives together to unpack real challenges, share practical experiences and explore new approaches as a group. Rather than traditional presentations, the focus is on open dialogue, identifying what’s working, what isn’t, and how others are navigating similar issues in their own organisations.

Guided by a facilitator, you’ll work through emerging pain points, compare strategies and exchange insight with peers facing the same pressures. It’s an opportunity to gain clarity, discover alternative viewpoints and walk away with ideas you can apply immediately.

Designed to be energetic, conversational and outcome-driven, this is where collective expertise turns into practical solutions.

16:15 - 16:55
Hands-On Technology Insights

The demo sessions give you the chance to explore emerging capabilities directly with our partners, seeing how their technology performs in real scenarios rather than on slides. These are practical, interactive demonstrations designed to help you understand what each solution actually does, how it integrates, and where it can support your priorities.

You’ll be able to ask focused questions, dive deeper into specific use-cases and get a clear sense of the value behind each offering. It’s a straightforward, no-pressure way to compare approaches, discover what’s possible, and uncover ideas you can take straight back into your own environment.

A meaningful opportunity to experience innovation first-hand and engage with the people building it.

Horizon3.ai
16:15 - 16:55
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

17:00 - 17:40
Wellness Time & Sponsored Activities

This dedicated break in the programme is designed to help you reset, recharge and prepare for the evening ahead. Take the time to pause, step away from the pace of the day and choose whatever helps you feel at your best — whether that’s a moment of quiet, a walk, or connecting informally with peers.

Our partners may also host optional activities during this window, offering relaxed opportunities to explore new ideas, continue conversations or experience something a little different. Full details will be shared closer to the summit, giving you the freedom to engage in a way that suits your energy and interests.

18:20 - 19:00
Pre-Dinner Happy Hour

 

 

19:00 - 21:00
Gala Dinner

The Gala Dinner is the centrepiece of the summit’s first day, an evening designed to bring the entire community together in a refined, welcoming setting. Enjoy a relaxed three-course dinner while connecting with peers, partners and industry leaders in an environment that encourages open conversation and meaningful interaction.

During the evening, you’ll hear from a distinguished CISO delivering an insightful keynote woven into the dinner experience. Expect a thought-provoking perspective on the evolving security landscape, offering strategic clarity and ideas that resonate long after the final course.

21:00 - 22:00
Post-Dinner Drinks

Day 2

07:00 - 08:20
Breakfast
08:30 - 09:15
Keynote

Day 2 opens with a Keynote, offering a sharp, forward-looking perspective on the trends reshaping security and technology in 2026. Expect a session grounded in real-world insight — highlighting emerging risks, new opportunities and the strategic shifts leaders need to prepare for.

09:20 - 10:00
Securing App Delivery: How Desktop-as-a-Service and Secure Enterprise Browsers Transform IT

Simplifying and securing the delivery of Windows and web applications has become a strategic priority in an era where hybrid work, security, and user experience define IT success. This workshop explores how Desktop-as-a-Service (DaaS) and Secure Enterprise Browser (SEB) solutions can enable you to securely deliver any application to any device, anywhere. Learn how leading organizations are leveraging these cloud-based strategies to accelerate digital transformation, reduce complexity, and strengthen compliance and security—all while delivering a seamless experience that empowers both IT teams and end users.

Key Takeaways

  • How modern cloud-based DaaS and SEB solutions simplify app and desktop delivery
  • Strategies to improve security and user experience while reducing IT complexity 
  • Real-world lessons from organizations using DaaS and SEB to transform IT
Dizzion Logo
09:20 - 10:00
Governing Data, Privacy & AI Risk in a World of Digital Sovereignty

With the EU AI Act, evolving privacy rules, data localisation requirements and the rise of internal AI systems, 2026 is the year when data governance becomes deeply entangled with security. Sensitive data now moves through vector stores, RAG pipelines, SaaS chains and analytics platforms, often without full visibility.

This workshop examines how executives are navigating the new realities of privacy and digital sovereignty. Expect discussion on governing AI training data, enforcing data residency, managing cross-border risk, embedding privacy by design and aligning security, legal and AI teams around a shared operating model.

Devon E
Name
Devon Euring
Position
Head of Operational Risk
Company
iHeartMedia
09:20 - 10:00
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

10:05 - 10:45
Peer-Led Problem Solving

This collaborative session brings executives together to unpack real challenges, share practical experiences and explore new approaches as a group. Rather than traditional presentations, the focus is on open dialogue, identifying what’s working, what isn’t, and how others are navigating similar issues in their own organisations.

Guided by a facilitator, you’ll work through emerging pain points, compare strategies and exchange insight with peers facing the same pressures. It’s an opportunity to gain clarity, discover alternative viewpoints and walk away with ideas you can apply immediately.

Designed to be energetic, conversational and outcome-driven, this is where collective expertise turns into practical solutions.

10:05 - 10:45
AgileSec Analytics: Cryptographic Posture Intelligence and PQCReady Risk Management

This demo explains how Keyfactor’s AgileSec Analytics provides real-time visibility into an organization’s cryptographic posture across applications, certificates, code, hosts, and other endpoints. The session walks through discovered cryptographic assets, identifies the algorithms in use, flags weak or non-compliant implementations, and maps the cryptographic dependencies that support business-critical workflows.

Key Takeaways:

  • Full Cryptographic Discovery: See how AgileSec maps all certificates, keys, algorithms, and encryption patterns across hybrid environments—no agents required.
  • Real-Time Posture Assessment: Learn how the platform evaluates algorithm strength, expiration risk, compliance status, and crypto hygiene across all systems.
  • PQC Migration Readiness: Understand how AgileSec identifies quantum-vulnerable assets and guides phased migration planning.
  • Dependency Intelligence: Explore how AgileSec builds a cryptographic bill of material (CBOM) across applications, services, and certificates to surface hidden upgrade blockers.
  • Risk-Based Prioritization: Experience how analytics elevate the most impactful cryptographic risks based on business context, exposure, and operational criticality.
  • Remediation-Ready Insights: Learn how AgileSec surfaces detailed cryptographic posture data—including certificate status, algorithm usage, and PQC-vulnerable assets—so it can be consumed by orchestration tools for renewal, upgrade, and migration workflows.
Shayne
Name
Shayne Campbell
Position
Manager, Field & Channel Marketing
Company
Keyfactor
10:05 - 10:45
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

10:50 - 11:05
Networking Break
11:10 - 11:55
Panel Discussion

"What Keeps Boards Awake in 2026 - And What Security Leaders Should Do About It"

In 2026, boards are more engaged in security than ever, not because they want to be, but because AI, regulation and escalating threats have pushed cyber into the centre of organisational risk. This panel brings together senior security leaders to unpack the issues that are shaping boardroom conversations right now: AI-driven attacks, regulatory pressure, operational resilience, data exposure, and the widening gap between perceived and actual risk.

The discussion will explore how security leaders can translate complex technical challenges into clear, strategic narratives that boards understand and act on. Expect honest perspectives on navigating expectation vs. reality, setting priorities, communicating in the language of value and risk, and driving alignment at the highest level.

Brent
Name
Brent Forrest
Position
CISO
Company
Crash Champions
12:00 - 12:40
In the Cyber Trenches: War Stories from 180,000 pentests

Hosted by Horizon3.ai, In the Cyber Trenches: War Stories from 180,000 Pentests provides an in-depth exploration of real-world cybersecurity incidents derived from a vast dataset of penetration testing engagements.

Designed for cybersecurity professionals, this workshop bridges the gap between theoretical security concepts and real-world application, equipping attendees with knowledge that can be immediately applied within their own environments.

Horizon3.ai
12:00 - 12:40
Zero Trust in a Borderless Estate – Identity, APIs & Machine Identities

Hybrid ecosystems in 2026 are dominated by SaaS chains, API-to-API communication, machine identities, service accounts and ephemeral workloads that appear and disappear within seconds. With attackers exploiting identity systems and API connections at scale, Zero Trust has become less of a framework and more of a live operational discipline.

This workshop dives into how mature organisations are reshaping Zero Trust for a borderless estate, tightening identity governance, securing API interconnectivity, managing fast-proliferating machine identities and enforcing “least privilege” in environments where nothing is static.

12:00 - 12:40
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

12:45 - 13:30
Keynote & Closing Remarks

The summit concludes with an inspiring keynote from a respected CISO within our community, offering an honest, forward-looking perspective on the security landscape and the leadership challenges shaping the years ahead. Expect a grounded, experience-led talk that ties together the themes explored across the summit, bringing clarity, perspective and momentum for what comes next.

Following the keynote, the final remarks bring the programme to a close, reflecting on the key insights, shared moments and connections made over the two days. It’s a chance to gather final takeaways, acknowledge the community that makes the Security Chapter so powerful, and leave with renewed focus for the year ahead.

13:30 - 14:30
Lunch

Join Us

Register Interest

Meet with fellow industry leaders and solve today’s greatest business
challenges.

File

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

File

Join the Executive Community

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.