DEEP608 v9.0 | Rise of the Machines

May 14, 2025

8 AM - 5 PM

Monona Terrace | 1 John Nolen Dr, Madison, WI 53703

Event Details

As automation, machine learning, and AI reshape cybersecurity, industry leaders will dive into the risks, innovations, and strategies to stay ahead in this ever-changing digital battlefield. Don't miss this opportunity to connect with experts, gain actionable insights, and prepare for the next era of cyber resilience.

More details to come.

Button Text
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
8:00 am
-
9:00 am
-
Main Hall
Registration & Exhibition Hall
No items found.
9:00 am
-
9:15 am
-
Main Hall
Welcome
No items found.

Event welcome and introduction to the day's schedule.

9:15 am
-
10:00 am
-
Main Hall
Keynote Speaker - Phil Henrickson
No items found.
10:10 am
-
10:40 am
-
Hall of Ideas E
Breakout Session - Shadow AI-The Next Evolution of Shadow IT
No items found.

Shadow AI - The Next Evolution of Shadow IT

Presented By: Josh Colvin - Security Solutions Engineer, AE Business Solutions and Trevor Cross - Data Scientist, AE Business Solutions

A recent study indicated that nearly 90% of enterprise GenAI use is done without proper IT oversight. This is the modern equivalent of Shadow IT, a battle that network defenders have been fighting since the inception of time. We thought we had the problem under control. We were wrong. A statistic that high indicates a need to rethink enterprise security on all fronts.

10:10 am
-
10:40 am
-
Hall of Ideas F
Breakout Session - Rise of the Machines, Fall of the P@$$w0rd1
No items found.

Rise of the Machines, Fall of the P@$$w0rd1

Presented By: Joe Hopper - Principal Security Consultant, Fracture Labs

Despite years of security training, password policies, and technical controls, users are still choosing bad passwords and handing them over to attackers. In this talk, we'll share what we've learned from the past seven years of real-world security assessments:

- How password complexity and user behavior are evolving

- Why some policies make things worse

- How attackers are adapting through the more efficient use of technology.

You'll see how we use comprehensive wordlists, advanced rulesets, and — increasingly — AI to break even well-crafted credentials. But the problem doesn't stop at passwords. We'll also explore how phishing techniques are evolving thanks to AI and how even MFA can be phished and bypassed.

To wrap up, we'll share practical, forward-looking recommendations:

- How to fix your organization's security culture problem

- How to implement password policies that frustrate attackers, not your users

- How to choose phishing-resistant authentication methods

Whether you're managing a mature security program or still wrangling weak passwords, this talk will give you actionable insight into what's working, what's not, and what's next.

10:10 am
-
10:40 am
-
Hall of Ideas H
Breakout Session - CyberArk
No items found.

Presented By: Kevin Jacque - Strategic Channel Solutions Engineer, CyberArk

Machine identity security is a critical component of cybersecurity, ensuring that non-human entities- such as applications, services, and devices, are authenticated and protected.  This presentation will explore key topics, including certificate lifecycle management, crypto agility, and the growing threat of unmanaged and compromised machine identities. Attendees will gain insights into industry best practices, emerging trends, and strategies for securing an increasingly automated and interconnected digital landscape. 

10:50 am
-
11:20 pm
-
Hall of Ideas H
Breakout Session - Strategic Simplicity: How to Combat Complexity and Enhance Security Visibility and Strengthen Attack Surface Management
No items found.

Strategic Simplicity: How to Combat Complexity and Enhance Security Visibility and Strengthen Attack Surface Management

Presented By: Tim Woods - VP of Technology Alliances, FireMon

The role of IT security is constantly evolving, especially in today’s hybrid enterprise environments. When reporting to the C-suite, it is essential to include not only how the company manages change visibility and complexity but also how it ensures the security policies that govern these systems are well-maintained and effective. Cybercriminals often exploit misconfigurations, human errors, and exposed vulnerabilities—issues that can arise from both unnecessary complexity and poor policy hygiene. These vulnerabilities often go unnoticed in complex, rapidly changing environments.

In this presentation, we will discuss strategies to reduce complexity while enhancing security visibility, particularly through the lens of attack surface management. A critical aspect of managing the attack surface is maintaining clean and well-managed enforcement security policies. Real-time Life Cycle Management of network security policies help eliminate gaps in coverage, misconfigurations, and outdated controls that threat actors frequently target. By combining policy hygiene with automation and comprehensive change visibility, organizations can reduce the opportunity for exploitation and proactively secure their ever-expanding attack surface. Ultimately, simplifying the security landscape, along with maintaining robust security policies, not only improves visibility but also strengthens the organization’s defenses against evolving threats.

11:30 am
-
12:30 pm
-
Main Hall
Keynote Speaker - Adrian Diaz
No items found.
1:15 pm
-
2:15 pm
-
Hall of Ideas F
Lab Session - Unleash the Future of Cyber Defense: Mortal vs. Machine, Powered by Purple AI
No items found.

Unleash the Future of Cyber Defense: Mortal vs. Machine, Powered by Purple AI

Presented By: Shane Harsch - Principal Solutions Architect, SentinelOne

Experience the next frontier of cybersecurity at Mortal vs Machine, where cutting-edge technology meets human expertise. At the heart of this electrifying competition is Purple AI, SentinelOne’s revolutionary AI security analyst that propels security operations to unprecedented heights.

In a series of dynamic matchups, Mortal vs Machine pits seasoned security professionals against audience volunteers—each equipped with the rapid, AI-driven capabilities of Purple AI. The question is simple yet game-changing: can advanced, AI-augmented threat detection outperform the nuanced insights of human analysts?

Purple AI reshapes traditional security practices—like threat hunting and incident investigations—by transforming them into intuitive, natural-language conversations. Its advanced generative AI empowers users of any skill level to uncover hidden threats, analyze complex logs, and detect anomalies through straightforward prompts. Even those new to query languages can instantly investigate potential breaches with confidence.

Picture the synergy: experienced security veterans facing off against volunteers augmented by Purple AI. Participants witness firsthand how effortlessly Purple AI streamlines threat investigations—often outpacing the speed and accuracy of experts. Each session is a testament to Purple AI’s power, drawing massive crowds and generating buzz at high-profile events like Black Hat and RSA.

The Mortal vs Machine competition showcases Purple AI as a force multiplier that dramatically reduces mean time to detect and respond. By removing the hurdles of complex query languages and accelerating threat analysis, Purple AI positions itself as an essential ally for security teams.

Step into this immersive experience to see, participate, and compare the difference between conventional threat hunting and a future driven by AI. With Purple AI, your SOC operations will never be the same—enjoy faster, more precise threat detection, comprehensive data protection, and robust privacy protocols.

Join us at our next Mortal vs Machine event to discover how Purple AI can revolutionize your security operations—smarter, faster, and more efficient than ever before. Embrace autonomous cybersecurity with SentinelOne’s Purple AI and experience how human expertise measures up against machine intelligence.

2:30 pm
-
3:00 pm
-
Hall of Ideas G
Breakout Session - Is AI Just Another SaaS?
No items found.

Is AI Just Another SaaS?

Presented By: Alec Vandeleest - Security Solutions Engineer, AE Business Solutions

Cloud AI products face many of the same IT security challenges that SaaS solutions have for decades. As well as brings new IT security challenges. An overview of SaaS security, the tooling, and the how these ideas are changing with the introduction of Cloud AI.

2:30 pm
-
3:00 pm
-
Hall of Ideas J
Breakout Session - Empowering the Workforce with Safe GenAI Practices
No items found.

Empowering the Workforce with Safe GenAI Practices

Presented By: Curtis Wray - Staff Enterprise Security Architect, Proofpoint

AI models like DeepSeek, Grok, and ChatGPT are rapidly evolving, pushing the boundaries of technology while introducing new challenges for data security. How can organizations harness the power of AI while ensuring compliance and protecting sensitive data? This session delves into strategies for data security tailored to the risks and opportunities of AI. Join us to learn: emerging trends in AI and how to safely integrate these tools into your enterprise environment, Best practices for securing data in the era of generative AI, How a top retail organization leveraged GenAI for enhanced security.

2:30 pm
-
3:00 pm
-
Hall of Ideas H
Breakout Session - Future-Proof Your Tech Stack: Cutting Costs, Reducing Risks & Embracing Modern Security
No items found.

Future-Proof Your Tech Stack: Cutting Costs, Reducing Risks & Embracing Modern Security

In today’s rapidly evolving digital landscape, organizations must balance cost optimization with robust security while also reducing complexity and unlocking the full value of their data to stay competitive. This session explores real-world examples of organizations that have streamlined their technology stacks, simplified operations, and advanced business outcomes—without sacrificing security or performance.  We'll dive into: - key innovations, form actionable threat intelligence to post-quantum cryptography considerations, and showcase strategies for securing applications, networks, and remote workforces, - How modern security solutions can only fortify your defenses but also simplify infrastructure, reduce operational overhead, and extract meaningful insights from data to drive smarter business decisions.

3:15 pm
-
4:15 pm
-
Main Hall
Keynote Speaker - Liz O'Sullivan
No items found.
4:30 pm
-
5:30 pm
-
Main Hall
Networking & Happy Hour
No items found.

Platinum Sponsors

Titanium Sponsors

Gold Sponsors

Silver Sponsors