Agenda
Mainstage Programming
Operationalizing Zero Trust
Strengthening Cyber Resilience with AI and ML Breakout Track
Fortifying Foundations: Securing Critical Infrastructure and the Supply Chain
Merlin Labs Interactive
Mainstage Programming
Times are subject to change.
Opening Remarks
Welcome to Xccelerate 2025!
Welcome to Xccelerate 2025!
Welcome to Xccelerate 2025!
Identity Management for Humans and Beyond
From people to our AI tools, every identity must be managed with precision. Dive into AI-driven identity security solutions for enforcing access controls and managing the diverse identities within today’s complex enterprise environments.
From people to our AI tools, every identity must be managed with precision. Dive into AI-driven identity security solutions for enforcing access controls and managing the diverse identities within today’s complex enterprise environments.
From people to our AI tools, every identity must be managed with precision. Dive into AI-driven identity security solutions for enforcing access controls and managing the diverse identities within today’s complex enterprise environments.
Data Resiliency for the Ransomware Era
With about 1/3 of all breaches in 2023 involving ransomware, organizations need a proactive approach to data resilience. Discuss how to protect endpoints and strengthen your defenses against ransomware, ensuring quick recovery and minimal impact on operations.
With about 1/3 of all breaches in 2023 involving ransomware, organizations need a proactive approach to data resilience. Discuss how to protect endpoints and strengthen your defenses against ransomware, ensuring quick recovery and minimal impact on operations.
With about 1/3 of all breaches in 2023 involving ransomware, organizations need a proactive approach to data resilience. Discuss how to protect endpoints and strengthen your defenses against ransomware, ensuring quick recovery and minimal impact on operations.
Post-Quantum Readiness: A Holistic Approach to Vulnerability and Cryptographic Risk Management
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.
AI Powered Security Operations: Journey from On-Prem to Multi-Cloud
In an era where cyber threats are increasingly sophisticated, effective network security demands advanced AI-driven solutions. Join this session to explore how to leverage AI to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how these tools integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.
In an era where cyber threats are increasingly sophisticated, effective network security demands advanced AI-driven solutions. Join this session to explore how to leverage AI to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how these tools integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.
In an era where cyber threats are increasingly sophisticated, effective network security demands advanced AI-driven solutions. Join this session to explore how to leverage AI to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how these tools integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.
Networking & Happy Hour
Thank you for attending Xccelerate 2025!
Thank you for attending Xccelerate 2025!
Thank you for attending Xccelerate 2025!
Operationalizing Zero Trust
Times are subject to change.
Building a Practical Zero Trust Roadmap
Gain insights on aligning Zero Trust goals with specific business objectives, identifying quick wins, and overcoming common adoption roadblocks.
Gain insights on aligning Zero Trust goals with specific business objectives, identifying quick wins, and overcoming common adoption roadblocks.
Gain insights on aligning Zero Trust goals with specific business objectives, identifying quick wins, and overcoming common adoption roadblocks.
Deploying Zero Trust in Hybrid Environments
What are some of the unique challenges and best practices for deploying Zero Trust in hybrid cloud and on-premises environments?
What are some of the unique challenges and best practices for deploying Zero Trust in hybrid cloud and on-premises environments?
What are some of the unique challenges and best practices for deploying Zero Trust in hybrid cloud and on-premises environments?
Strengthening Zero Trust Architecture with AI and ML
Explore how AI and machine learning can be used to support and enhance Zero Trust principles.
Explore how AI and machine learning can be used to support and enhance Zero Trust principles.
Explore how AI and machine learning can be used to support and enhance Zero Trust principles.
Strengthening Cyber Resilience with AI and ML Breakout Track
Times are subject to change.
Merlin Ventures CISO Community Broadcast
Engage in lively discussion with fellow security leaders and join a community of CISOs from across commercial and government industries as co-founders and CEOs of early-stage Israeli cyber startups pitch their innovations.
Engage in lively discussion with fellow security leaders and join a community of CISOs from across commercial and government industries as co-founders and CEOs of early-stage Israeli cyber startups pitch their innovations.
Engage in lively discussion with fellow security leaders and join a community of CISOs from across commercial and government industries as co-founders and CEOs of early-stage Israeli cyber startups pitch their innovations.
Transforming Security with AI and Data Insights
Many agencies are seeking to leverage AI within a modernized IT framework to enhance cybersecurity and unlock the power of data intelligence. This session will explore practical strategies for transitioning from legacy systems while harnessing data insights to drive informed decision-making. Discover how to overcome common modernization challenges, build agile, cloud-enabled infrastructures, and integrate scalable AI deployments that not only bolster cybersecurity but also deliver actionable intelligence to optimize operations and improve outcomes.
Many agencies are seeking to leverage AI within a modernized IT framework to enhance cybersecurity and unlock the power of data intelligence. This session will explore practical strategies for transitioning from legacy systems while harnessing data insights to drive informed decision-making. Discover how to overcome common modernization challenges, build agile, cloud-enabled infrastructures, and integrate scalable AI deployments that not only bolster cybersecurity but also deliver actionable intelligence to optimize operations and improve outcomes.
Many agencies are seeking to leverage AI within a modernized IT framework to enhance cybersecurity and unlock the power of data intelligence. This session will explore practical strategies for transitioning from legacy systems while harnessing data insights to drive informed decision-making. Discover how to overcome common modernization challenges, build agile, cloud-enabled infrastructures, and integrate scalable AI deployments that not only bolster cybersecurity but also deliver actionable intelligence to optimize operations and improve outcomes.
Cryptographic Inventory and Posture Management
The U.S. Government requires agencies to take immediate action to achieve post-quantum readiness and advance cryptographic posture. Discovering and inventorying all cryptographic objects are the first steps organizations need to meet requirements such as M23-02. See how we’re helping organizations easily achieve this.
The U.S. Government requires agencies to take immediate action to achieve post-quantum readiness and advance cryptographic posture. Discovering and inventorying all cryptographic objects are the first steps organizations need to meet requirements such as M23-02. See how we’re helping organizations easily achieve this.
The U.S. Government requires agencies to take immediate action to achieve post-quantum readiness and advance cryptographic posture. Discovering and inventorying all cryptographic objects are the first steps organizations need to meet requirements such as M23-02. See how we’re helping organizations easily achieve this.
Fortifying Foundations: Securing Critical Infrastructure and the Supply Chain
Times are subject to change.
Critical Infrastructure Resilience and Recovery
Resilience is the cornerstone of critical infrastructure security, encompassing not only the ability to withstand and recover from attacks but also the proactive measures required to secure software supply chains. As threat actors increasingly exploit vulnerabilities in software dependencies, ensuring the integrity and security of the supply chain has become paramount. Learn how to enhance your organization’s defenses against emerging threats while ensuring rapid recovery and operational continuity.
Resilience is the cornerstone of critical infrastructure security, encompassing not only the ability to withstand and recover from attacks but also the proactive measures required to secure software supply chains. As threat actors increasingly exploit vulnerabilities in software dependencies, ensuring the integrity and security of the supply chain has become paramount. Learn how to enhance your organization’s defenses against emerging threats while ensuring rapid recovery and operational continuity.
Resilience is the cornerstone of critical infrastructure security, encompassing not only the ability to withstand and recover from attacks but also the proactive measures required to secure software supply chains. As threat actors increasingly exploit vulnerabilities in software dependencies, ensuring the integrity and security of the supply chain has become paramount. Learn how to enhance your organization’s defenses against emerging threats while ensuring rapid recovery and operational continuity.
Asset Visibility and Protection
Identifying every asset – IT, OT, and IoT – is essential to achieve comprehensive operational visibility. See how we’re helping organizations gain unprecedented visibility and protecting all enterprise assets.
Identifying every asset – IT, OT, and IoT – is essential to achieve comprehensive operational visibility. See how we’re helping organizations gain unprecedented visibility and protecting all enterprise assets.
Identifying every asset – IT, OT, and IoT – is essential to achieve comprehensive operational visibility. See how we’re helping organizations gain unprecedented visibility and protecting all enterprise assets.
Real Time Threat Monitoring and Rapid Response
Uncover the importance of real-time monitoring and swift incident response to protect essential services from cyber and physical threats. Learn about the latest advancements in threat detection technologies, monitoring platforms, and response strategies designed specifically for critical infrastructure.
Uncover the importance of real-time monitoring and swift incident response to protect essential services from cyber and physical threats. Learn about the latest advancements in threat detection technologies, monitoring platforms, and response strategies designed specifically for critical infrastructure.
Uncover the importance of real-time monitoring and swift incident response to protect essential services from cyber and physical threats. Learn about the latest advancements in threat detection technologies, monitoring platforms, and response strategies designed specifically for critical infrastructure.
Merlin Labs Interactive
Times are subject to change.