March 4-6, 2026
$595 - ALL ACCESS
Access to all sessions | Hands-on hacking labs | All meals and Welcome Reception | Opportunities to take the Cyber Hero Certification Exam | Guaranteed spot at the ThreatLocker After Party
Agenda is subject to change.
Time
Session Title
Presenter
2:00 - 7:00
Registration open
3:00 - 7:00
Cyber Hero Exam Bootcamp
6:00 - 9:00
Welcome Reception
7:30 - 5:00
Registration open
8:00 –10:00
Certification Exam
8:30 –10:00
BREAKFAST in Solutions Pavilion
10:00 – 12:00
Mainstage Sessions
Augmented Humanity
Jason Silva
5 Minute Hacks
12:00 - 1:30
LUNCH in Solutions Pavilion
1:30 – 5:15pm
Afternoon Labs
Metasploit
Alex Benton
Introduction to Web Hacking
Justin Gardiner
SQL Injection Technique
Kieran Human
How to Lose a Domain in 45 Minutes: Active Directory Hacking
Spencer Alessi
1:30 – 5:35pm
Afternoon Sessions
From 8K to Alpha: The Buy-the-Breach Method
Dr. Chase Cunningham
Dark Web Tour
Collin Ellis
Invisible Gateways: Exploiting IoT
Phillip Wylie
Security Roadmap
Cameron Smith
Zero Days and Supply Chain Risks
Eoin McGrath
Securing Remote Workforces
Erik Jansen
The Dangers of Shadow IT
Ryan Bowman
Endpoint Risks for Linux Environments
Daniel Madden
MacOS Malware Risks and Protections
Brad Schneider
Defense Against Misconfigurations
Bruce Mines
Secure by Design: Patch Management Without Disruption
JD Eger
Jordan Hinden
Security Now: The Call is Coming From Inside the House
*ends at 5:45pm and is followed by a meet and greet in the Solutions Pavilion
Steve Gibson
Leo Laporte
3:15 - 3:45
BREAK in Solutions Pavilion
5:35 - 6:35
HAPPY HOUR in Solutions Pavilion

Time
Session Title
Presenter
7:00 - 9:00
Certification Exam
8:00 - 9:00
BREAKFAST in Solutions Pavilion
9:00 – 10:15am
Mainstage Sessions
Rethinking Cyber Defense in an Era of High Velocity Attacks
Marcus Hutchins
Securing Large Complex Organizations
NetApp case study
10:15 - 10:45
BREAK in Solutions Pavilion
10:45 - 12:15
Mainstage Session: Challenges Accepted Innovation Hour
Danny Jenkins
Rob Allen
12:15 - 1:30
LUNCH in Solutions Pavilion
1:30 – 5:30pm
Afternoon Labs
Zero Trust vs Modern Attacks
Jakoby
Rubber Ducky Advanced Techniques
Kieran Human
Conditional Access Strategies
Adam Fuller
Prompt Engineering Malware
Kieran Human
Securing O365
Adam Fuller
CTRL+ALT+PWN: The breakdown
1:30 – 5:30pm
Afternoon Sessions
Securing Healthcare
Panel
Zero Trust vs Next-Gen Malware
Leo - The PC Security Channel
Building an Effective Anti-Phishing Program
Rob, BowTie Security Guy
Mainstage: Human Side of Zero Trust
Martin Astley
Evolution of Allowlisting as a Viable Security Technique
Jherome DeGuzman
Removing Local Admin Without Breaking IT
Sam Sundell
Stopping the Unstoppable: Neutralizing Modern Data Exfiltration
Cristiano Guerrieri
Don’t Space Out! Focusing on Traffic that Matters with Network Control
Matheus Harder
Preventing Unintended Lateral Movement with Application Control
Jherome DeGuzman
Endpoint Hardening in 5 Minutes or Less, No gpupdate /force Needed
Amanda Makowsky
Your Business is Vulnerable and You Are Clueless
Wayne Selk
How Hackers Beat Zero Trust – And How Your Users Can Stop Them
Luke Patneau
5:30 - 7:00
RECEPTION in Solutions Pavilion
7:00 - 10:00
ThreatLocker After Party
7:00 - 9:00
Certification Exam
8:00 - 9:00
BREAKFAST in Solutions Pavilion
9:00 – 9:50
Mainstage Session: CISO Series Podcast LIVE
David Spark
Michelle Wilson
Rob Allen
9:50 - 10:20
BREAK in Solutions Pavilion
10:20 – 11:40am
Mainstage Sessions:
When Should Cybersecurity Become a Priority for Your Business
Linus + Luke
Closing Guest Keynote
Wrap Up with raffle, and donation
12:00pm
Program Concludes