Wed 19 Nov 2025
View event detailsRegistration and Networking
8:15 AM - 8:50 AM (35 mins)
Welcome from the Public Sector Network
8:50 AM - 9:00 AM (10 mins)
Welcome from the Chair
9:00 AM - 9:10 AM (10 mins)
CISA 101: Standing Against Cyber Threats to Critical Infrastructure
9:10 AM - 9:30 AM (20 mins)

An introduction to what CISA does, and how we can protect essential services for the American people by identifying current threats to critical infrastructure and strengthening resilience to withstand cyber attacks.
- What is the Cybersecurity and Infrastructure Security Agency (CISA) and why it matters
- Understanding the cyber threat landscape to our critical infrastructure
- Tools and resources available for protection
- Building resilience to withstand and recover from cyber incidents
Doing More With Less Tools To Secure Public Cloud Infrastructure
9:30 AM - 9:50 AM (20 mins)
- What specific security challenges do you see organizations facing in public cloud environments, and how can your services help address these issues effectively?
- Can you share examples of cost-effective tools or solutions that have successfully enhanced cloud security for your clients without significantly increasing their budgets?
- How do your services assist organizations in maintaining compliance with industry regulations while optimizing their cloud security strategies?
- What automation solutions do you offer that can streamline security operations in public cloud infrastructure, and what benefits have your clients experienced from implementing these solutions?
Enhancing Cybersecurity in the Digital Age: Innovative Approaches to Safeguard Critical Infrastructure and Data Assets (TBC)
9:50 AM - 10:10 AM (20 mins)

The Future of Security Operations
10:10 AM - 10:30 AM (20 mins)
- What key emerging technologies are expected to transform security operations, and how should organizations prepare to leverage these advancements?
- In light of the evolving threat landscape, what best practices should organizations adopt to adapt their security operations and maximize resource efficiency?
- How is the integration of artificial intelligence and machine learning reshaping security operations, and what measurable impacts are organizations seeing as a result?
- What strategies can organizations implement to enhance visibility and control over their security environments amidst growing complexity and regulatory demands?
Morning Coffee and Networking Break
10:30 AM - 10:50 AM (20 mins)
Concurrent Roundtables: An interactive opportunity to collaborate
10:50 AM - 11:50 AM (60 mins)
- Cyber Threat Assessment: Better Identification for a Better Response
- It is a Team Sport: How the State of California Can Combat Cybersecurity Risks
- The Future of Security Operations with Cortex XSIAM
- Endpoint Security & the Culture of Defense: Making Cybersecurity Everyone’s Job
Cyber Security Landscape - Unlocking Value by Understanding and Adapting to Change
11:50 AM - 12:20 PM (30 mins)


- What considerations should organizations take into account when phasing out legacy systems?
- What strategies are organizations utilizing to increase digital and cyber literacy?
- What should an organization do when they notice a cybersecurity breach or threat?
- What are you doing to keep your team relevant, up to date on changes, and embracing a forward-thinking mentality?
Closing Remarks from Chair
12:20 PM - 12:35 PM (15 mins)
Networking Lunch
12:35 PM - 1:35 PM (60 mins)