May 14, 2025
8 AM - 5 PM
Monona Terrace | 1 John Nolen Dr, Madison, WI 53703
As automation, machine learning, and AI reshape cybersecurity, industry leaders will dive into the risks, innovations, and strategies to stay ahead in this ever-changing digital battlefield. Don't miss this opportunity to connect with experts, gain actionable insights, and prepare for the next era of cyber resilience.
More details to come.
Event welcome and introduction to the day's schedule.
A recent study indicated that nearly 90% of enterprise GenAI use is done without proper IT oversight. This is the modern equivalent of Shadow IT, a battle that network defenders have been fighting since the inception of time. We thought we had the problem under control. We were wrong. A statistic that high indicates a need to rethink enterprise security on all fronts.
Despite years of security training, password policies, and technical controls, users are still choosing bad passwords and handing them over to attackers. In this talk, we'll share what we've learned from the past seven years of real-world security assessments:
- How password complexity and user behavior are evolving
- Why some policies make things worse
- How attackers are adapting through the more efficient use of technology.
You'll see how we use comprehensive wordlists, advanced rulesets, and — increasingly — AI to break even well-crafted credentials. But the problem doesn't stop at passwords. We'll also explore how phishing techniques are evolving thanks to AI and how even MFA can be phished and bypassed.
To wrap up, we'll share practical, forward-looking recommendations:
- How to fix your organization's security culture problem
- How to implement password policies that frustrate attackers, not your users
- How to choose phishing-resistant authentication methods
Whether you're managing a mature security program or still wrangling weak passwords, this talk will give you actionable insight into what's working, what's not, and what's next.
Machine identity security is a critical component of cybersecurity, ensuring that non-human entities- such as applications, services, and devices, are authenticated and protected. This presentation will explore key topics, including certificate lifecycle management, crypto agility, and the growing threat of unmanaged and compromised machine identities. Attendees will gain insights into industry best practices, emerging trends, and strategies for securing an increasingly automated and interconnected digital landscape.
The role of IT security is constantly evolving, especially in today’s hybrid enterprise environments. When reporting to the C-suite, it is essential to include not only how the company manages change visibility and complexity but also how it ensures the security policies that govern these systems are well-maintained and effective. Cybercriminals often exploit misconfigurations, human errors, and exposed vulnerabilities—issues that can arise from both unnecessary complexity and poor policy hygiene. These vulnerabilities often go unnoticed in complex, rapidly changing environments.
In this presentation, we will discuss strategies to reduce complexity while enhancing security visibility, particularly through the lens of attack surface management. A critical aspect of managing the attack surface is maintaining clean and well-managed enforcement security policies. Real-time Life Cycle Management of network security policies help eliminate gaps in coverage, misconfigurations, and outdated controls that threat actors frequently target. By combining policy hygiene with automation and comprehensive change visibility, organizations can reduce the opportunity for exploitation and proactively secure their ever-expanding attack surface. Ultimately, simplifying the security landscape, along with maintaining robust security policies, not only improves visibility but also strengthens the organization’s defenses against evolving threats.
Experience the next frontier of cybersecurity at Mortal vs Machine, where cutting-edge technology meets human expertise. At the heart of this electrifying competition is Purple AI, SentinelOne’s revolutionary AI security analyst that propels security operations to unprecedented heights.
In a series of dynamic matchups, Mortal vs Machine pits seasoned security professionals against audience volunteers—each equipped with the rapid, AI-driven capabilities of Purple AI. The question is simple yet game-changing: can advanced, AI-augmented threat detection outperform the nuanced insights of human analysts?
Purple AI reshapes traditional security practices—like threat hunting and incident investigations—by transforming them into intuitive, natural-language conversations. Its advanced generative AI empowers users of any skill level to uncover hidden threats, analyze complex logs, and detect anomalies through straightforward prompts. Even those new to query languages can instantly investigate potential breaches with confidence.
Picture the synergy: experienced security veterans facing off against volunteers augmented by Purple AI. Participants witness firsthand how effortlessly Purple AI streamlines threat investigations—often outpacing the speed and accuracy of experts. Each session is a testament to Purple AI’s power, drawing massive crowds and generating buzz at high-profile events like Black Hat and RSA.
The Mortal vs Machine competition showcases Purple AI as a force multiplier that dramatically reduces mean time to detect and respond. By removing the hurdles of complex query languages and accelerating threat analysis, Purple AI positions itself as an essential ally for security teams.
Step into this immersive experience to see, participate, and compare the difference between conventional threat hunting and a future driven by AI. With Purple AI, your SOC operations will never be the same—enjoy faster, more precise threat detection, comprehensive data protection, and robust privacy protocols.
Join us at our next Mortal vs Machine event to discover how Purple AI can revolutionize your security operations—smarter, faster, and more efficient than ever before. Embrace autonomous cybersecurity with SentinelOne’s Purple AI and experience how human expertise measures up against machine intelligence.
Cloud AI products face many of the same IT security challenges that SaaS solutions have for decades. As well as brings new IT security challenges. An overview of SaaS security, the tooling, and the how these ideas are changing with the introduction of Cloud AI.
AI models like DeepSeek, Grok, and ChatGPT are rapidly evolving, pushing the boundaries of technology while introducing new challenges for data security. How can organizations harness the power of AI while ensuring compliance and protecting sensitive data? This session delves into strategies for data security tailored to the risks and opportunities of AI. Join us to learn: emerging trends in AI and how to safely integrate these tools into your enterprise environment, Best practices for securing data in the era of generative AI, How a top retail organization leveraged GenAI for enhanced security.
In today’s rapidly evolving digital landscape, organizations must balance cost optimization with robust security while also reducing complexity and unlocking the full value of their data to stay competitive. This session explores real-world examples of organizations that have streamlined their technology stacks, simplified operations, and advanced business outcomes—without sacrificing security or performance. We'll dive into: - key innovations, form actionable threat intelligence to post-quantum cryptography considerations, and showcase strategies for securing applications, networks, and remote workforces, - How modern security solutions can only fortify your defenses but also simplify infrastructure, reduce operational overhead, and extract meaningful insights from data to drive smarter business decisions.