Go Back
United States Summit

The Security Chapter

The Adolphus, Dallas, TX

2 Days
-
2026 Cybersecurity Leadership
The Adolphus Hotel

A bit about our summit

What we're known for

File

Industry Analysis

Glean the knowledge of your peers to shape your organisation's future

File

Peer-Led

Workshops, Fireside Chats & Keynote Addresses

File

1 on 1 Meetings

Strategic BANT-qualified meetings based on project alignment

File

Custom Agenda

Be in control of your own agenda. Maximise your experience.

The Technology Chapter

Audience

We use Apella to understand each executive’s priorities ahead of the summit. Their current focus areas, challenges and interests. This allows us to shape thoughtful, relevant connections where both executives and partners gain value. Every 1:1 meeting is informed, purposeful and mutually beneficial, ensuring conversations feel natural, context-aware and genuinely worthwhile for everyone involved.

Audience illustration
  • 80+
    Senior Executives
  • 15-20
    Solution Providers
  • 5:1
    Executive to Solution Provider Representatives
  • 48%
    C-Suite Executives
  • 52%
    SVP, Directors & Heads of

Agenda

Day 1

12:00 - 13:15
Registration & Networking Lunch
13:20 - 14:10
Welcome Address & Opening Keynote

The summit officially opens with a forward-looking welcome address, setting the agenda for two days of insight, collaboration and strategic discussion. You’ll hear the vision behind this year’s programme and the themes shaping the security landscape in 2026 and beyond.

Our Opening Keynote then takes the stage. Designed to challenge thinking, spotlight emerging risks and opportunities, and provide a practical perspective from the front line of innovation. It’s an energising start to the summit, offering a shared foundation for the conversations and sessions that follow.

14:15 - 14:55
Strengthening Cyber Resilience in a High-Pressure Threat Landscape

By 2026, organisations will be judged not only on how well they prevent attacks, but on how effectively they can withstand and recover from them. With adversaries targeting business continuity and regulators raising expectations, resilience has become a core strategic priority.

This workshop focuses on practical approaches to building resilience across people, processes and technology. You’ll explore real incident scenarios, discuss how peers are stress-testing their environments, and compare methods for improving readiness, response coordination and communication under pressure.

 

dr. lovelie
Name
Dr. Lovelie Moore
Position
BISO
Company
Tayota Financial Services
14:15 - 14:55
Go Hack Yourself: More War Stories from 200k+ Pentests

We’ve run more than 200,000 pentests, and the story is consistent: weak and reused credentials, unpatched and misconfigured software, and misplaced security effort create outsized business risk. Attackers chain these failures into full domain compromise—often in minutes, without exploiting a CVE. The result isn’t just a technical issue, it’s operational disruption, regulatory exposure, and reputational damage.

 

Join Ramzi Harb, Senior Sales Engineer at Horizon3.ai, for a candid session on what this means for executives accountable for risk. You’ll see how an AI hacker like NodeZero exposes the weaknesses that matter most, validates which controls actually work, and reframes vulnerability management through our Risk-Based Vulnerability Management (RBVM) approach—where risk is measured by exploitability and business impact, not by vulnerability counts.

 

What you will walk away with:

  • Why exploitability, not volume of vulnerabilities, defines true risk.
  • How our RBVM model helps prioritize investments that reduce breach probability fastest.
  • Executive-level metrics—mean time to mitigate, mean time to remediate, and reoccurrence rate—to track and prove resilience.
  • How FixOps creates an operating model for resilience, turning proof of exploitability into rapid, measurable fixes.
Ramzi
Name
Ramzi Harb
Position
Senior Sales Engineer
Company
Horizon3.ai
14:15 - 14:55
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

15:00 - 15:40
Securing Autonomous AI Systems & Agentic Workflows

By 2026, AI isn’t just assisting workflows; it’s executing them. Internal agents, copilots with elevated permissions, automated decision engines and LLM-driven integrations have expanded the attack surface in ways traditional controls were never built to handle.

This workshop examines the next phase of AI security: protecting autonomous systems that read, write, decide and act across the business. Discussions will cover agent permissions, safe action boundaries, continuous monitoring, prompt-injection hardening, model integrity and preventing silent failure modes.

Executives will explore what a secure operational model looks like when AI becomes an actor rather than a tool.

f
Name
Dana Kilcrease
Position
Chief Information Security Officer
Company
Berkeley College
15:00 - 15:40
When Encryption Expires: Preparing Trust, Identity, and AI for the Post‑Quantum Era

Digital trust assumes that cryptography ages gracefully. Quantum computing breaks that assumption. As public‑key algorithms fail abruptly rather than gradually, the foundations of encryption, digital signatures, and certificate‑based identity must be re‑engineered.

This presentation explores the post‑quantum threat and the case for acting now. We examine how long‑lived trust artifacts and manual lifecycle management amplify quantum risk, and how evolving NIST guidance and related standards are driving stronger requirements for auditability, visibility, and cryptographic inventory across identity and certificate systems. The session concludes with considerations and preparatory steps for PQC migration that will preserve trust long after today’s algorithms become obsolete.

h
Name
Troy Stark
Position
AVP of Sales
Company
Keyfactor
15:00 - 15:40
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

15:40 - 16:10
Check-In Break

The perfect time to go grab your luggage and check-in to your rooms...

16:15 - 16:55
Peer-Led Problem Solving

This collaborative session brings executives together to unpack real challenges, share practical experiences and explore new approaches as a group. Rather than traditional presentations, the focus is on open dialogue, identifying what’s working, what isn’t, and how others are navigating similar issues in their own organisations.

Guided by a facilitator, you’ll work through emerging pain points, compare strategies and exchange insight with peers facing the same pressures. It’s an opportunity to gain clarity, discover alternative viewpoints and walk away with ideas you can apply immediately.

Designed to be energetic, conversational and outcome-driven, this is where collective expertise turns into practical solutions.

16:15 - 16:55
Hack, Fix, Verify, Repeat: A Deep Dive Demo of Horizon3.ai’s NodeZero Platform

Security teams are drowning in vulnerabilities, but only a small fraction are truly exploitable — and attackers know exactly which ones to go after. In this technical deep dive, we’ll walk through a live demonstration of NodeZero®, Horizon3.ai’s autonomous pentesting platform, to show how you can continuously identify, validate, and fix the risks that actually matter.

We’ll trace a full attack path from initial access to domain compromise, highlight how NodeZero chains misconfigurations and vulnerabilities into real-world impact, and then pivot into remediation validation — proving that your fixes break the attack, not just clear a scanner finding. Along the way, we’ll cover key use cases like internal and external pentesting, cloud and AD assessments, and compliance-driven testing, and show how teams are operationalizing a “hack, fix, verify, repeat” workflow to stay ahead of attackers.

Ramzi
Name
Ramzi Harb
Position
Senior Sales Engineer
Company
Horizon3.ai
16:15 - 16:55
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

17:00 - 17:40
Wellness Time & Sponsored Activities

This dedicated break in the programme is designed to help you reset, recharge and prepare for the evening ahead. Take the time to pause, step away from the pace of the day and choose whatever helps you feel at your best — whether that’s a moment of quiet, a walk, or connecting informally with peers.

Our partners may also host optional activities during this window, offering relaxed opportunities to explore new ideas, continue conversations or experience something a little different. Full details will be shared closer to the summit, giving you the freedom to engage in a way that suits your energy and interests.

18:20 - 19:00
Pre-Dinner Happy Hour

 

 

19:00 - 21:00
Gala Dinner

The Gala Dinner is the centrepiece of the summit’s first day, an evening designed to bring the entire community together in a refined, welcoming setting. Enjoy a relaxed three-course dinner while connecting with peers, partners and industry leaders in an environment that encourages open conversation and meaningful interaction.

During the evening, you’ll hear from a distinguished CISO delivering an insightful keynote woven into the dinner experience. Expect a thought-provoking perspective on the evolving security landscape, offering strategic clarity and ideas that resonate long after the final course.

21:00 - 22:00
Post-Dinner Drinks

Day 2

07:00 - 08:20
Breakfast
08:30 - 09:15
Keynote

Day 2 opens with a Keynote, offering a sharp, forward-looking perspective on the trends reshaping security and technology in 2026. Expect a session grounded in real-world insight — highlighting emerging risks, new opportunities and the strategic shifts leaders need to prepare for.

09:20 - 10:00
Workshop 5
09:20 - 10:00
Governing Data, Privacy & AI Risk in a World of Digital Sovereignty

With the EU AI Act, evolving privacy rules, data localisation requirements and the rise of internal AI systems, 2026 is the year when data governance becomes deeply entangled with security. Sensitive data now moves through vector stores, RAG pipelines, SaaS chains and analytics platforms, often without full visibility.

This workshop examines how executives are navigating the new realities of privacy and digital sovereignty. Expect discussion on governing AI training data, enforcing data residency, managing cross-border risk, embedding privacy by design and aligning security, legal and AI teams around a shared operating model.

Devon E
Name
Devon Euring
Position
Head of Operational Risk
Company
iHeartMedia
09:20 - 10:00
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

10:05 - 10:45
Peer-Led Problem Solving

This collaborative session brings executives together to unpack real challenges, share practical experiences and explore new approaches as a group. Rather than traditional presentations, the focus is on open dialogue, identifying what’s working, what isn’t, and how others are navigating similar issues in their own organisations.

Guided by a facilitator, you’ll work through emerging pain points, compare strategies and exchange insight with peers facing the same pressures. It’s an opportunity to gain clarity, discover alternative viewpoints and walk away with ideas you can apply immediately.

Designed to be energetic, conversational and outcome-driven, this is where collective expertise turns into practical solutions.

10:05 - 10:45
AgileSec Analytics: Cryptographic Posture Intelligence and PQCReady Risk Management

This demo explains how Keyfactor’s AgileSec Analytics provides real-time visibility into an organization’s cryptographic posture across applications, certificates, code, hosts, and other endpoints. The session walks through discovered cryptographic assets, identifies the algorithms in use, flags weak or non-compliant implementations, and maps the cryptographic dependencies that support business-critical workflows.

Key Takeaways:

  • Full Cryptographic Discovery: See how AgileSec maps all certificates, keys, algorithms, and encryption patterns across hybrid environments—no agents required.
  • Real-Time Posture Assessment: Learn how the platform evaluates algorithm strength, expiration risk, compliance status, and crypto hygiene across all systems.
  • PQC Migration Readiness: Understand how AgileSec identifies quantum-vulnerable assets and guides phased migration planning.
  • Dependency Intelligence: Explore how AgileSec builds a cryptographic bill of material (CBOM) across applications, services, and certificates to surface hidden upgrade blockers.
  • Risk-Based Prioritization: Experience how analytics elevate the most impactful cryptographic risks based on business context, exposure, and operational criticality.
  • Remediation-Ready Insights: Learn how AgileSec surfaces detailed cryptographic posture data—including certificate status, algorithm usage, and PQC-vulnerable assets—so it can be consumed by orchestration tools for renewal, upgrade, and migration workflows.
Troy
Name
Troy Stark
Position
AVP of Sales
Company
Keyfactor
10:05 - 10:45
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

10:50 - 11:05
Networking Break
11:10 - 11:55
Panel Discussion

"What Keeps Boards Awake in 2026 - And What Security Leaders Should Do About It"

In 2026, boards are more engaged in security than ever, not because they want to be, but because AI, regulation and escalating threats have pushed cyber into the centre of organisational risk. This panel brings together senior security leaders to unpack the issues that are shaping boardroom conversations right now: AI-driven attacks, regulatory pressure, operational resilience, data exposure, and the widening gap between perceived and actual risk.

The discussion will explore how security leaders can translate complex technical challenges into clear, strategic narratives that boards understand and act on. Expect honest perspectives on navigating expectation vs. reality, setting priorities, communicating in the language of value and risk, and driving alignment at the highest level.

Brent
Name
Brent Forrest
Position
CISO
Company
Crash Champions
12:00 - 12:40
Preparing for the Quantum Era Through Practical Crypto-Agility

Quantum computing may not be fully realised yet, but the risk landscape is already shifting. “Harvest-now, decrypt-later” attacks, evolving standards and the push towards post-quantum cryptography make preparation a priority for organisations with long-lived or highly sensitive data.

This workshop focuses on what executives should be doing today to build crypto-agility into their environments. You’ll explore where quantum exposure sits, how to identify systems that need priority migration and what a realistic transition plan looks like without disruption to critical services.

12:00 - 12:40
Zero Trust in a Borderless Estate – Identity, APIs & Machine Identities

Hybrid ecosystems in 2026 are dominated by SaaS chains, API-to-API communication, machine identities, service accounts and ephemeral workloads that appear and disappear within seconds. With attackers exploiting identity systems and API connections at scale, Zero Trust has become less of a framework and more of a live operational discipline.

This workshop dives into how mature organisations are reshaping Zero Trust for a borderless estate, tightening identity governance, securing API interconnectivity, managing fast-proliferating machine identities and enforcing “least privilege” in environments where nothing is static.

12:00 - 12:40
Strategically Matched 1:1 Meetings

These focused 1:1 sessions pair you with peers and sponsors based on shared priorities, challenges and areas of expertise. Each meeting is curated using attendee insights, ensuring every conversation is relevant, purposeful and aligned to your interests.

Whether you’re exploring new ideas, pressure-testing a strategy, or discovering emerging capabilities, these sessions are designed to deliver genuine value in a short window of time. It’s a chance to engage in informed, high-quality discussions that move beyond introductions and straight into meaningful exchange.

12:45 - 13:30
Keynote & Closing Remarks

The summit concludes with an inspiring keynote from a respected CISO within our community, offering an honest, forward-looking perspective on the security landscape and the leadership challenges shaping the years ahead. Expect a grounded, experience-led talk that ties together the themes explored across the summit, bringing clarity, perspective and momentum for what comes next.

Following the keynote, the final remarks bring the programme to a close, reflecting on the key insights, shared moments and connections made over the two days. It’s a chance to gather final takeaways, acknowledge the community that makes the Security Chapter so powerful, and leave with renewed focus for the year ahead.

13:30 - 14:30
Lunch

Join Us

Register Interest

Meet with fellow industry leaders and solve today’s greatest business
challenges.

File

Join Our Partner Network

Join our Partner Network and position your brand as a thought leader. Partnering with us unlocks excess to our community of engaged executives and offers a wealth of benefits.

File

Join the Executive Community

Our Executive Community is the heart of innovation and leadership. By joining our Executive Community, you gain unparalleled access to a world of opportunities.