Why Attend?

Master Attack Surface Management:

Learn core strategies to reduce and control your digital attack surface.

Stay Ahead of Exploited Vulnerabilities:

Get expert insights on the CISA KEV list and threat response tactics.

Leverage Modern Security Testing:

Understand when and how to use red-teaming, pen-tests, and bug bounties.

Secure Your Assets & Cloud Environment:

Discover best practices for asset visibility and cloud protection.

Presented by

Sponsored by

SecurityWeek Virtual Event Sponsorships

I want to become a sponsor

SecurityWeek Virtual Events Provide

  • BRAND AWARENESS: Introduce your brand to a large audience and deepen connections with existing customers and prospects through powerful brand integration by being part of a high-profile event that is heavily marketed for months.
  • THOUGHT LEADERSHIP: Demonstrate expertise and build trust by presenting to a targeted, information-hungry audience of cybersecurity professionals.
  • LEAD GENERATION: The scale of SecurityWeek’s virtual events serve as a cost effective lead generation platform to fuel your sales teams.

Agenda

09/17/2025 11:00

Rewriting The Rules of Exposure Management

Vulnerability management is one of the oldest practices in security, yet it remains one of the most frustrating. The legacy model of scan-and-patch has stalled, leaving defenders buried under incomplete inventories, endless patch cycles, and rigid scoring systems that don’t reflect the messy reality of modern networks. Security teams now lean heavily on endpoint agents as the only workable solution, but agents cover barely half the problem; leaving unmanaged systems, shadow IT, and entire unknown networks in the dark. 

This session examines why traditional approaches keep failing and why vendor hype and competing frameworks only add to the noise. Drawing on real-world lessons and attacker perspectives, it maps out the current coverage landscape, explains how detection methods differ, and explores the trade-offs between established tools and emerging techniques. Attendees will leave with a pragmatic vision for the next generation of exposure management; a hybrid model that meets you where you are by combining cutting-edge research with open source innovation.

speaker headshot

HD Moore
runZero, CEO and Founder

09/17/2025 11:45

The AI Blind Spot: Why Your LLM is a Critical New Part of Your Attack Surface

While organizations race to deploy generative AI, they are introducing a new and poorly understood attack surface ripe for exploitation. This technical deep-dive moves past theory to detail the actual vulnerabilities and attack paths Cobalt pentesters are discovering in genAI systems today. What You Will Learn: 

  • Quantify the AI security blind spot with new data from the 2025 State of Pentesting Report, which shows a mere 21% of serious AI-related vulnerabilities are ever remediated. 
  • Get the details and technical nuances of these attacks, including Prompt Injection and Insecure Output Handling, that consistently bypass automated scanners and require human creativity to uncover. 
  • See how these novel vulnerabilities allow attackers to manipulate model behavior, leak sensitive data, and gain unauthorized access to underlying systems. 
  • Learn how to proactively protect your attack surface from these attacks and drive down risk for your business.
speaker headshot

Willa Riggins
Cobalt, Principal Security Consultant & Product Leader

09/17/2025 12:15

Vulnerability Haruspicy: Picking Out Risk Signals from Scoring System Entrails

Vulnerability scoring frameworks promise clarity but often deliver confusion. CVSS (Common Vulnerability Scoring System) bends messy math into neat curves, EPSS (Exploit Prediction Scoring System) leans on opaque models, and SSVC (Stakeholder-Specific Vulnerability Categorization) relies on structured intuition. This talk explores the strengths and flaws of these systems, asking whether they improve risk decisions or simply rationalize them. You can expect smart analysis, best practices (and astrology jokes!) along the way.

speaker headshot

Tod Beardsley
runZero, VP of Security Research

09/17/2025 12:45

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer your questions.

09/17/2025 13:00

Exploiting API Misconfigurations: Lessons from Real Attacks & How to Secure Them

APIs are the backbone of modern applications, but without proper security, they are vulnerable to DDoS attacks, data exfiltration, and business disruption. In this talk, we’ll explore key OWASP API security vulnerabilities, real-world breaches caused by misconfigured APIs, and mitigation strategies through proper security configurations.

We'll cover critical concepts like Broken Object Level Authorization (BOLA), Broken Function Level Authorization (BFLA), infrastructure security, and the importance of using Identity Providers (IDPs) instead of building custom authentication systems. Through live code examples, we’ll demonstrate common vulnerabilities and how to remediate them using robust validation and access control mechanisms.

speaker headshot

Siri Varma Vegiraju
Microsoft Azure Security, Security Tech Lead

09/17/2025 13:30

Adversarial AI in Practice: Managing Your Expanding Attack Surface

AI systems are the newest and fastest growing part of the attack surface and also the least understood. In this talk, I’ll pull back the curtain on real-world adversarial campaigns against large language models and AI applications, showing how attackers use prompt injection, data poisoning, and model manipulation to bypass guardrails, leak sensitive data, and subvert business logic. I’ll share lessons from building and running the largest generative red teaming platform to date along with practical strategies for finding, prioritizing, and hardening AI attack surfaces so security teams can stay ahead of threats. You will leave with a clear framework for adding adversarial AI testing into your attack surface management program and a plan for protecting your platforms, your business, and your customers as AI becomes mission critical.

speaker headshot

David Campbell
Scale AI, Head of AI Security Research

09/17/2025 14:00

Securing AI Data Pipelines: Threat Modeling & Defense for Regulated Industries

As AI and machine learning systems become integral to critical infrastructure in finance, healthcare, and energy sectors, they present unique security challenges that extend far beyond traditional application security. This presentation examines the specific threat landscape facing AI-driven data pipelines and provides actionable strategies for implementing security controls that satisfy both regulatory compliance and robust defense-in-depth principles.

AI systems in regulated industries process highly sensitive data while operating under strict compliance frameworks like GDPR, HIPAA, and PCI DSS. However, these systems introduce novel attack vectors including model poisoning, adversarial inputs, data exfiltration through model inference, and supply chain vulnerabilities in ML libraries and pre-trained models. With healthcare data breaches increasing 55% year-over-year and financial services facing an average of 700 security incidents annually, securing AI pipelines has become mission-critical.

This talk will cover comprehensive security strategies for AI data pipelines, including secure model training environments, encrypted data processing workflows, access control mechanisms for ML operations, and monitoring systems designed to detect both traditional security threats and AI-specific attacks. We'll explore techniques for implementing zero-trust architectures in ML workflows, securing model deployment pipelines, and maintaining audit trails that satisfy regulatory requirements while preserving operational efficiency.

Real-world case studies will demonstrate practical implementations, such as a healthcare organization that prevented a potential model poisoning attack through anomaly detection in their training pipeline, and a financial institution that implemented secure federated learning to improve fraud detection while maintaining customer privacy and regulatory compliance. Attendees will leave with practical knowledge of threat modeling methodologies specific to AI systems, implementation strategies for secure ML operations (MLSecOps), and frameworks for balancing security requirements with the operational needs of AI-driven business processes in highly regulated environments.

speaker headshot

Rahul Vats
Capital One Financial Corporation, Senior Lead (Manager)

09/17/2025 14:30

Interactive Demo: See runZero in action

runZero delivers the fastest, most complete security visibility possible across all of your assets (including IT, OT, IoT) across your entire internal and external attack surfaces, so you can mitigate exposures before they can be compromised and stay compliant. This interactive demo explores how runZero can help you address specific challenges and use cases with our interactive demos.

09/17/2025 14:50

Security at Speed: Pentesting Your Attack Surface with Cobalt

In an era of rapid development, security teams can no longer rely on slow, traditional testing methods to manage their expanding attack surface. The Cobalt Offensive Security Platform delivers fast, human-led pentesting on-demand so you can innovate securely without sacrificing speed. See how you can build a programmatic and continuous offensive security program that keeps pace with your business. In this session, you will learn how to: 

  • Launch a comprehensive pentest in 24 hours to secure new releases and meet tight deadlines.
  • Leverage real-time collaboration with expert pentesters to act on critical findings while testing is still in progress.
  • Gain continuous coverage and confidence year-round with automated scanning between deep-dive pentests.
  • Integrate seamlessly with your dev tools such as Jira, GitHub and Slack, pushing critical findings directly into your team’s backlog to remediate and retest faster.
09/17/2025 15:05

Networking & Virtual Expo

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer your questions.

Interactive demo: see runZero in action

runZero delivers the fastest, most complete security visibility possible across all of your assets (including IT, OT, IoT) across your entire internal and external attack surfaces, so you can mitigate exposures before they can be compromised and stay compliant. This interactive demo explores how runZero can help you address specific challenges and use cases with our interactive demos.

Security at Speed: Pentesting Your Attack Surface with Cobalt

In an era of rapid development, security teams can no longer rely on slow, traditional testing methods to manage their expanding attack surface. The Cobalt Offensive Security Platform delivers fast, human-led pentesting on-demand so you can innovate securely without sacrificing speed. See how you can build a programmatic and continuous offensive security program that keeps pace with your business. In this session, you will learn how to: 

  • Launch a comprehensive pentest in 24 hours to secure new releases and meet tight deadlines. 
  • Leverage real-time collaboration with expert pentesters to act on critical findings while testing is still in progress.
  • Gain continuous coverage and confidence year-round with automated scanning between deep-dive pentests. 
  • Integrate seamlessly with your dev tools such as Jira, GitHub and Slack, pushing critical findings directly into your team’s backlog to remediate and retest faster.

Register Now

FAQ


Yes, you’ll need to fill out our registration form to gain access to the event. Please fill in the registration form with some basic information to get started.
The information you provide upon registration will be used to establish you as a user on the platform.

SecurityWeek is committed to protecting and respecting your privacy. From time to time, we would like to contact you about our products and services, as well as other content and information from event sponsors that may be of interest to you. You may unsubscribe from these communications at any time.

By registering for this event, you consent to allow SecurityWeek to store and process the personal information submitted to provide you the content requested.
Yes, the vFairs platform is compatible with any computer or mobile device and any browser.
Yes, this event is completely free to attend. We encourage you to login and have a look around at your convenience.
Yes, the event will be available on-demand following the live broadcast.