GuidePoint Security
 
  • Home
  • Agenda
  • Sponsors
  • Event Info
  • REGISTER
☰ ×

Tuesday, April 22, 2025 | 8:00 am - 6:00 pm ET

Convene - 1221 Avenue of the Americas, New York, NY

Register Now

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Duis aute irure dolor in reprehenderit in voluptate velit esse cillum dolore eu fugiat nulla pariatur.

Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit anim id est laborum.

The GPSEC NY agenda features a dynamic range of sessions focused on the latest cybersecurity trends, challenges, uses cases and innovations.

Agenda Highlights

AI Security for CISOs & AI-SPM Questions
Discover cutting-edge AI security innovations tailored for CISOs and delve into the essential questions every organization should ask to optimize their AI security strategy.

Cyber Crime Monetization & API Attacks
Explore the rising threat of cybercrime, the monetization of attacks, and the increasing vulnerability of APIs to breaches—critical topics for today’s security leaders.

Identity & Insider Threat Management
Learn how to protect both human and non-human identities, mitigate insider threats, and adopt an identity-first security approach to stay ahead of emerging risks.

AI in SecOps & Proactive Risk Detection
Understand how AI is transforming security operations (SecOps) by enabling rapid threat detection, automated responses, and more efficient exposure mitigation.

Integrated Cloud Risk & Modern IGA Approach
Gain insights into integrating cloud risk management and modern identity governance and administration (IGA) to ensure seamless and secure cloud operations.

Data Modernization & Shadow AI Security
Explore strategies for modernizing your data infrastructure while securing against the growing threat of Shadow AI, ensuring comprehensive data security.

Crisis Simulation & CTEM in Practice
Experience hands-on crisis simulations and real-world examples of Continuous Threat Exposure Management (CTEM) in action to improve incident response and threat mitigation.

EVENT AGENDA

8:00 a.m. – 9:00 a.m.

Registration, Breakfast, Vendor Showcase

9:00 a.m. – 10:00 a.m.

Event Welcome & CISO Panel

GuidePoint Security’s CISO, Gary Brickhouse dives deep into the key issues and responses to current cybersecurity risks and the expanding threat landscape through the day-to-day experiences of information security leaders

10:15 a.m. – 10:45 a.m.

AM Breakout Sessions: Choose The Session Most Aligned with Your Role and/or Interest

  • [Leadership] Cloud Security Maturity Framework: Best Practices To Operationalize Cloud Security, Wiz
  • [Leadership] Driving Cybersecurity Resilience: CTEM in the Era of ASM and EASM Demand, Rapid7
  • [Technical] 0 to SASE in 60 Minutes, Cato
  • [Technical] Observability & Cost Control, Cribl
  • [Workshop - 10:15am - 11:30am] Shaping the Future of IT and Security: Proactive Strategies and Innovations for Maximum Impact, Axonious

11:00 a.m. – 11:30 a.m.

AM Breakout Sessions: Choose The Session Most Aligned with Your Role and/or Interest

  • [Leadership] Building AI Security Strategy - The Essential Components, SentinelOne
  • [Leadership] Containing Threats <5 Mins. How Automation And AI Are Transforming SecOps Today, ReliaQuest
  • [Technical] Protect Innovation and Solve Shadow AI: DLP + IRM = Better Data Security, Cyberhaven
  • [Technical] Building an Identity-First Incident Response Playbook on the Fly Against Lateral Movement, Silverfort

11:45 a.m. – 12:15 p.m

AM Breakout Sessions: Choose The Session Most Aligned with Your Role and/or Interest

  • [Leadership] Dollars & Sense: The Impact of API Attacks and Data Breaches, Akamai
  • [Leadership] Completing the Identity Picture, Delinea, Astrix, & Saviynt
  • [Technical] Snackable AD Security: 30 Minutes a Day Keeps the Bad Guys Away, Semperis
  • [Technical] Practical DevSecOps Implementation – 5 Key Steps to A Successful DevSecOps Transformation, Cycode

12:15 p.m. – 1:30 p.m

Lunch & Vendor Showcase

1:30 p.m. – 2:30 p.m

Keynote Presentation: Jennifer Easterly, Former Director of the Cybersecurity and Infrastructure Security Agency (CISA)

2:45 p.m. – 3:15 p.m

PM Breakout Sessions: Choose The Session Most Aligned with Your Role and/or Interest

  • [Leadership] Aligning Identity Governance with the Speed of Business: A Modern IGA Approach, Zilla Security
  • [Leadership] Starting CTEM Without Starting From Scratch, Nucleus
  • [Technical] Proactive Defense: Leveraging Business Context to Streamline Risk Management and Response, Qualys
  • [Technical] Unlocking Data Insights: The 20 Key Queries That Can Expose Your Biggest Risks, Proofpoint
  • [Workshop: 2:45pm - 4:00pm] Facing the Fakes - A Cyber Crisis Simulation & Technical Exercise on AI-Driven Deception, Immersive

3:30 p.m. – 4:00 p.m

PM Breakout Sessions: Choose The Session Most Aligned with Your Role and/or Interest

GuidePoint Security Led Sessions

  • Considering All Aspects of SecOps in Your Strategy
  • Reduce Friction Between AppSec and Development
  • Cyber Elements of Executive Safety
  • Demystifying Cyber Insurance

4:00 p.m. – 6:00 p.m

Happy Hour & Closing Remarks

FEATURED SPEAKERS

Speaker Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip.

Speaker Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip.

Speaker Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip.

Speaker Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip.

Speaker Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip.

Speaker Name

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip.

THANK YOU TO OUR SPONSORS

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea com.

Gold

Silver

Bronze

Custom Sponsors – “Beverage Table Sponsor” or “Coffee Break Sponsor”

Lorem ipsum dolor sit, amet consectetur adipisicing elit. Repudiandae, natus quos, debitis aspernatur adipisci voluptatibus non? Sequi ab molestias veniam fugiat placeat praesentium quidem natus cumque omnis, non saepe optio!

ABOUT US

GuidePoint Security provides trusted cybersecurity expertise, solutions and services and help organizations make better decisions that minimize risk. By taking a three-tiered, holistic approach for evaluating security posture and ecosystems, GuidePoint enables some of the nation's top organizations, such as Fortune 500 companies and U.S government agencies, to identify threats, optimize resources and integrate best-fit solutions that mitigate risk.

Copyright © 2025 GuidePoint Security LLC. All rights reserved. 2025 Privacy Policy Terms of Service