Agenda
Mainstage Programming [The Forum]
Operationalizing Zero Trust [The Forum]
Strengthening Cyber Resilience with AI and ML Breakout Track [The North Hub]
Fortifying Foundations: Securing Critical Infrastructure and the Supply Chain [The Central Hub]
Merlin Labs Interactive [The South Hub]
Mainstage Programming [The Forum]
Times are subject to change.
Opening Remarks
Welcome to Xccelerate 2025!
Welcome to Xccelerate 2025!
Welcome to Xccelerate 2025!
Opening Keynote
As we navigate a time of transition and complexity, government leaders face unprecedented challenges. Nearly 50% of decision-makers report declining confidence in their ability to lead through uncertainty. The rapid pace of change, evolving technology threats, and operational disruptions can be overwhelming. Now more than ever, public sector leaders must embrace a new approach to ensure mission success.
Renowned entrepreneur, venture capital investor, and innovation expert Josh Linkner introduces Find A Way™️, a proven five-step framework designed to help agencies and organizations cultivate ingenuity at every level. Whether the goal is enhancing resilience, strengthening cybersecurity, improving service delivery, or fostering workforce engagement, this approach provides practical strategies to drive sustainable success in government operations.
The Find A Way™️ framework emphasizes adaptability over rigidity, creativity over routine, and strategic improvisation over static planning. By adopting this model, government leaders can navigate uncertainty with confidence, remain agile in the face of disruption, and achieve their agency’s objectives with clarity and impact—regardless of external challenges.
As we navigate a time of transition and complexity, government leaders face unprecedented challenges. Nearly 50% of decision-makers report declining confidence in their ability to lead through uncertainty. The rapid pace of change, evolving technology threats, and operational disruptions can be overwhelming. Now more than ever, public sector leaders must embrace a new approach to ensure mission success.
Renowned entrepreneur, venture capital investor, and innovation expert Josh Linkner introduces Find A Way™️, a proven five-step framework designed to help agencies and organizations cultivate ingenuity at every level. Whether the goal is enhancing resilience, strengthening cybersecurity, improving service delivery, or fostering workforce engagement, this approach provides practical strategies to drive sustainable success in government operations.
The Find A Way™️ framework emphasizes adaptability over rigidity, creativity over routine, and strategic improvisation over static planning. By adopting this model, government leaders can navigate uncertainty with confidence, remain agile in the face of disruption, and achieve their agency’s objectives with clarity and impact—regardless of external challenges.

Josh Linkner
Serial Entrepreneur, New York Times Bestselling Author,and Venture Capital Investor
As we navigate a time of transition and complexity, government leaders face unprecedented challenges. Nearly 50% of decision-makers report declining confidence in their ability to lead through uncertainty. The rapid pace of change, evolving technology threats, and operational disruptions can be overwhelming. Now more than ever, public sector leaders must embrace a new approach to ensure mission success.
Renowned entrepreneur, venture capital investor, and innovation expert Josh Linkner introduces Find A Way™️, a proven five-step framework designed to help agencies and organizations cultivate ingenuity at every level. Whether the goal is enhancing resilience, strengthening cybersecurity, improving service delivery, or fostering workforce engagement, this approach provides practical strategies to drive sustainable success in government operations.
The Find A Way™️ framework emphasizes adaptability over rigidity, creativity over routine, and strategic improvisation over static planning. By adopting this model, government leaders can navigate uncertainty with confidence, remain agile in the face of disruption, and achieve their agency’s objectives with clarity and impact—regardless of external challenges.

Josh Linkner
Serial Entrepreneur, New York Times Bestselling Author,and Venture Capital Investor
Securing Every Identity: The Federal Blueprint for Zero Trust
From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.
From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.

Mark Canter
Chief Information Security OfficerGovernment Accountability Office

Randy Resnick
Director, Zero Trust Portfolio Management Office, DOD CIODepartment of Defense

Rahul Dubey
VP, Global Public Sector SolutionsCyberArk

Matt Tarr
SE Manager, Solutions ArchitectureCyberArk

Tom Suder
President & FounderATARC
From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.

Mark Canter
Chief Information Security OfficerGovernment Accountability Office

Randy Resnick
Director, Zero Trust Portfolio Management Office, DOD CIODepartment of Defense

Rahul Dubey
VP, Global Public Sector SolutionsCyberArk

Matt Tarr
SE Manager, Solutions ArchitectureCyberArk

Tom Suder
President & FounderATARC
End-to-End Resilience in the Ransomware Era: Defending Data and Mobile Endpoints
With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.
With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.

Densmore Bartly
Chief Information Security OfficerUS House of Representatives

Benjamin Gilbert
Supervisory Cybersecurity Advisor, Region 3CISA

Mark Bentkower, VMCE, CISSP
Principal Technologist, AmericasVeeam Software

Mike Damiano
Solutions EngineerZimperium

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.

Densmore Bartly
Chief Information Security OfficerUS House of Representatives

Benjamin Gilbert
Supervisory Cybersecurity Advisor, Region 3CISA

Mark Bentkower, VMCE, CISSP
Principal Technologist, AmericasVeeam Software

Mike Damiano
Solutions EngineerZimperium

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
Post-Quantum Readiness: A Holistic Approach to Vulnerability and Cryptographic Risk Management
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.

Cherilyn Pascoe
Director, Cybersecurity Center of ExcellenceNIST

Landon Van Dyke
Senior Advisor, Emerging TechnologiesDepartment of State

Taher Elgamal
PartnerInfoSec Global

Steve Orrin
Chief Technology OfficerIntel Federal

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.

Cherilyn Pascoe
Director, Cybersecurity Center of ExcellenceNIST

Landon Van Dyke
Senior Advisor, Emerging TechnologiesDepartment of State

Taher Elgamal
PartnerInfoSec Global

Steve Orrin
Chief Technology OfficerIntel Federal

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
Next-Gen Security Operations: Continuous Visibility & Protection from On-Prem to Multi-Cloud
In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced innovative driven solutions. Join this session to explore how to leverage innovative technologies to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.
In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced innovative driven solutions. Join this session to explore how to leverage innovative technologies to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.

Manuel "Manny" Medrano
Director, Office of Cyber Monitoring and Operations, Bureau of Diplomatic SecurityDepartment of State

Ray Romano
Deputy Assistant Director, Cyber Threat and InvestigationsDepartment of State

Alex Kreilein
Vice President, Product SecurityQualys

Rob Sherry
District Sales Manager - Federal - Next Generation SecurityPalo Alto Networks

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced innovative driven solutions. Join this session to explore how to leverage innovative technologies to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.

Manuel "Manny" Medrano
Director, Office of Cyber Monitoring and Operations, Bureau of Diplomatic SecurityDepartment of State

Ray Romano
Deputy Assistant Director, Cyber Threat and InvestigationsDepartment of State

Alex Kreilein
Vice President, Product SecurityQualys

Rob Sherry
District Sales Manager - Federal - Next Generation SecurityPalo Alto Networks

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
Networking & Happy Hour
Thank you for attending Xccelerate 2025!
Thank you for attending Xccelerate 2025!
Thank you for attending Xccelerate 2025!
Operationalizing Zero Trust [The Forum]
Times are subject to change.
Identity-First Security: A Comprehensive Approach to Secure All Identities
During this session, learn how identity has become the new security perimeter and how CyberArk meets today's evolving threats with a comprehensive identity security platform to secure human and machine identities. We will discuss practical ways to achieve optimal maturity for the identity pillar of Zero Trust.
During this session, learn how identity has become the new security perimeter and how CyberArk meets today's evolving threats with a comprehensive identity security platform to secure human and machine identities. We will discuss practical ways to achieve optimal maturity for the identity pillar of Zero Trust.

Nick Curcuru
Head of Solutions MarketingCyberArk

James Johnson
Public Sector Solutions EngineerCyberArk
During this session, learn how identity has become the new security perimeter and how CyberArk meets today's evolving threats with a comprehensive identity security platform to secure human and machine identities. We will discuss practical ways to achieve optimal maturity for the identity pillar of Zero Trust.

Nick Curcuru
Head of Solutions MarketingCyberArk

James Johnson
Public Sector Solutions EngineerCyberArk
The Zero Trust Roadmap: From Theory to Implementation
Explore agencies' journey towards Zero Trust maturity, hearing directly from ZT practitioners as they offer valuable insights on their Zero Trust implementations. Hear lessons-learned on overcoming challenges and how they achieve effective Zero Trust security.
Explore agencies' journey towards Zero Trust maturity, hearing directly from ZT practitioners as they offer valuable insights on their Zero Trust implementations. Hear lessons-learned on overcoming challenges and how they achieve effective Zero Trust security.

Victoria Pillitteri
Manager, Security Engineering and Risk Management GroupNIST

Gerald Caron
VP of CybersecurityRIVA Solutions, Inc. (Formerly ITA)

Mahreen Huque
Senior Manager, CybersecurityEY Government Services

Imran Umar
Vice PresidentBooz Allen

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
Explore agencies' journey towards Zero Trust maturity, hearing directly from ZT practitioners as they offer valuable insights on their Zero Trust implementations. Hear lessons-learned on overcoming challenges and how they achieve effective Zero Trust security.

Victoria Pillitteri
Manager, Security Engineering and Risk Management GroupNIST

Gerald Caron
VP of CybersecurityRIVA Solutions, Inc. (Formerly ITA)

Mahreen Huque
Senior Manager, CybersecurityEY Government Services

Imran Umar
Vice PresidentBooz Allen

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
Cryptographic Discovery, Inventory and Posture Management
As federal agencies advance their Zero Trust strategies, understanding and managing cryptographic assets is essential for securing data and identities. Learn how cryptographic discovery and visibility provide the foundation for Zero Trust Architecture, enabling organizations to identify vulnerabilities, mitigate risks, and ensure compliance with mandates such as M-23-02 and the Cyber EO.
As federal agencies advance their Zero Trust strategies, understanding and managing cryptographic assets is essential for securing data and identities. Learn how cryptographic discovery and visibility provide the foundation for Zero Trust Architecture, enabling organizations to identify vulnerabilities, mitigate risks, and ensure compliance with mandates such as M-23-02 and the Cyber EO.

Steve Briley
Solutions Architect - FederalCyberArk

Troy Stark
Head of SalesInfoSec Global
As federal agencies advance their Zero Trust strategies, understanding and managing cryptographic assets is essential for securing data and identities. Learn how cryptographic discovery and visibility provide the foundation for Zero Trust Architecture, enabling organizations to identify vulnerabilities, mitigate risks, and ensure compliance with mandates such as M-23-02 and the Cyber EO.

Steve Briley
Solutions Architect - FederalCyberArk

Troy Stark
Head of SalesInfoSec Global
Strengthening Cyber Resilience with AI and ML Breakout Track [The North Hub]
Times are subject to change.
CISO Community Cyber Showcase
Watch four co-founders and CEOs from early-stage cyber companies pitch their innovations to a Merlin Ventures panel of four CISOs, moderated by Merlin Ventures Managing Partner Seth Spergel. Hear the grilling questions, evaluate the thoughtful responses, and see the genuine reactions. What do you think of these emerging technologies?
This session provides an exclusive opportunity for government CISOs and qualified security executives to get an inside look into very early emerging technologies -- and invites government security executives to join the community.
Watch four co-founders and CEOs from early-stage cyber companies pitch their innovations to a Merlin Ventures panel of four CISOs, moderated by Merlin Ventures Managing Partner Seth Spergel. Hear the grilling questions, evaluate the thoughtful responses, and see the genuine reactions. What do you think of these emerging technologies?
This session provides an exclusive opportunity for government CISOs and qualified security executives to get an inside look into very early emerging technologies -- and invites government security executives to join the community.

Reuven Aharoni
CEO & FounderCye Security

Almog Apirion
CEO & FounderCyolo

Yossi Appleboum
CEO & FounderSepio

Yair Cohen
VP Product & Co-FounderSentra

Seth Spergel
Managing PartnerMerlin Ventures
Watch four co-founders and CEOs from early-stage cyber companies pitch their innovations to a Merlin Ventures panel of four CISOs, moderated by Merlin Ventures Managing Partner Seth Spergel. Hear the grilling questions, evaluate the thoughtful responses, and see the genuine reactions. What do you think of these emerging technologies?
This session provides an exclusive opportunity for government CISOs and qualified security executives to get an inside look into very early emerging technologies -- and invites government security executives to join the community.

Reuven Aharoni
CEO & FounderCye Security

Almog Apirion
CEO & FounderCyolo

Yossi Appleboum
CEO & FounderSepio

Yair Cohen
VP Product & Co-FounderSentra

Seth Spergel
Managing PartnerMerlin Ventures
Data Resilience: Safeguarding Your Mission-Critical Data
Safeguarding mission-critical data against cyber threats is a critical component of Data Resilience. During this session, learn how you can centralize security-related activity across your environment, including data backups. Learn how you can empower your teams through Automation+AI to respond more quickly to cyber threats, ensuring that data remains protected and resilient.
Safeguarding mission-critical data against cyber threats is a critical component of Data Resilience. During this session, learn how you can centralize security-related activity across your environment, including data backups. Learn how you can empower your teams through Automation+AI to respond more quickly to cyber threats, ensuring that data remains protected and resilient.

Grace Clement
Cortex Domain Consultant - FederalPalo Alto Networks

Neil Henderson
Sr. Systems Engineer - FederalVeeam Software
Safeguarding mission-critical data against cyber threats is a critical component of Data Resilience. During this session, learn how you can centralize security-related activity across your environment, including data backups. Learn how you can empower your teams through Automation+AI to respond more quickly to cyber threats, ensuring that data remains protected and resilient.

Grace Clement
Cortex Domain Consultant - FederalPalo Alto Networks

Neil Henderson
Sr. Systems Engineer - FederalVeeam Software
Transforming Security Operations with AI and Data
Unifying security data enhances threat detection, accelerates incident response, and lowers operational costs by delivering actionable insights. In this session, learn how to improve SOC efficiencies and achieve compliance with mandates such as M-22-09 and M-21-31 through a unified approach of your security data.
Unifying security data enhances threat detection, accelerates incident response, and lowers operational costs by delivering actionable insights. In this session, learn how to improve SOC efficiencies and achieve compliance with mandates such as M-22-09 and M-21-31 through a unified approach of your security data.

Deepak Badami
Principal Sales EngineerExtraHop

Josh Brunvoll
Sr. Solution EngineerCribl
Unifying security data enhances threat detection, accelerates incident response, and lowers operational costs by delivering actionable insights. In this session, learn how to improve SOC efficiencies and achieve compliance with mandates such as M-22-09 and M-21-31 through a unified approach of your security data.

Deepak Badami
Principal Sales EngineerExtraHop

Josh Brunvoll
Sr. Solution EngineerCribl
Fortifying Foundations: Securing Critical Infrastructure and the Supply Chain [The Central Hub]
Times are subject to change.
Advanced Strategies for Fortifying OT and ICS Networks
As cyber threats increasingly target operational technology (OT) and industrial control systems (ICS), agencies need deep visibility and real-time threat detection. In this session, explore how Claroty’s cybersecurity platform delivers these capabilities without disrupting mission-critical operations. Learn how to apply Zero Trust principles to OT networks, and meet mandates such as BOD-23-01 and M-22-09.
As cyber threats increasingly target operational technology (OT) and industrial control systems (ICS), agencies need deep visibility and real-time threat detection. In this session, explore how Claroty’s cybersecurity platform delivers these capabilities without disrupting mission-critical operations. Learn how to apply Zero Trust principles to OT networks, and meet mandates such as BOD-23-01 and M-22-09.

Randy Benn
Solutions Engineer - U.S. FederalClaroty
As cyber threats increasingly target operational technology (OT) and industrial control systems (ICS), agencies need deep visibility and real-time threat detection. In this session, explore how Claroty’s cybersecurity platform delivers these capabilities without disrupting mission-critical operations. Learn how to apply Zero Trust principles to OT networks, and meet mandates such as BOD-23-01 and M-22-09.

Randy Benn
Solutions Engineer - U.S. FederalClaroty
Protecting IOT, OT and Mobile Endpoints Against Advanced Threats
We know cyber attacks are more complex than ever. How can federal agencies best safeguard IoT, OT, and mobile environments? Experts will explore best practices for implementing Zero Trust for these environments, beginning with comprehensive asset visibility and protection against a dynamic cyber threat landscape that targets these mission-critical systems.
We know cyber attacks are more complex than ever. How can federal agencies best safeguard IoT, OT, and mobile environments? Experts will explore best practices for implementing Zero Trust for these environments, beginning with comprehensive asset visibility and protection against a dynamic cyber threat landscape that targets these mission-critical systems.

Mike Damiano
Solutions EngineerZimperium

Max Lewis
Director of Solution Architecture, Federal CivilianArmis
We know cyber attacks are more complex than ever. How can federal agencies best safeguard IoT, OT, and mobile environments? Experts will explore best practices for implementing Zero Trust for these environments, beginning with comprehensive asset visibility and protection against a dynamic cyber threat landscape that targets these mission-critical systems.

Mike Damiano
Solutions EngineerZimperium

Max Lewis
Director of Solution Architecture, Federal CivilianArmis
Bridging the Gap: Partnerships to Secure our Critical Infrastructure
Protecting critical infrastructure requires a unified approach between government and industry. Join this session for a lively discussion about successful partnerships, policy frameworks, and initiatives that enhance resilience and mitigate risks
Protecting critical infrastructure requires a unified approach between government and industry. Join this session for a lively discussion about successful partnerships, policy frameworks, and initiatives that enhance resilience and mitigate risks

Genevieve Marquardt
Cybersecurity Advisor (CSA)CISA

Alex Kreilein
Vice President, Product SecurityQualys

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
Protecting critical infrastructure requires a unified approach between government and industry. Join this session for a lively discussion about successful partnerships, policy frameworks, and initiatives that enhance resilience and mitigate risks

Genevieve Marquardt
Cybersecurity Advisor (CSA)CISA

Alex Kreilein
Vice President, Product SecurityQualys

Heather Kuldell-Ware
Former Editor-in-ChiefGovExec
Merlin Labs Interactive [The South Hub]
Times are subject to change.
Merlin Labs Interactive - Automated Crypto Discovery & Inventory
Join us in this interactive Labs demonstration as we walk through a scenario of cryptographic discovery and inventory utilizing existing endpoint management tools to report cryptographic assets and comply with OMB M-23-02, Migrating to Post-Quantum Cryptography. We will demonstrate how the solution can discover unknown and malicious algorithms to protect the environment against threats like ransomware.
Join us in this interactive Labs demonstration as we walk through a scenario of cryptographic discovery and inventory utilizing existing endpoint management tools to report cryptographic assets and comply with OMB M-23-02, Migrating to Post-Quantum Cryptography. We will demonstrate how the solution can discover unknown and malicious algorithms to protect the environment against threats like ransomware.

Dave Maphis
Cyber Security Solutions ArchitectMerlin Cyber

Troy Stark
Head of SalesInfoSec Global
Join us in this interactive Labs demonstration as we walk through a scenario of cryptographic discovery and inventory utilizing existing endpoint management tools to report cryptographic assets and comply with OMB M-23-02, Migrating to Post-Quantum Cryptography. We will demonstrate how the solution can discover unknown and malicious algorithms to protect the environment against threats like ransomware.

Dave Maphis
Cyber Security Solutions ArchitectMerlin Cyber

Troy Stark
Head of SalesInfoSec Global
Merlin Labs Interactive - Ransomware Protection & Data Resiliency
Join us in this interactive Labs demonstration where we will showcase various techniques to protect against ransomware throughout the attack chain. We will demonstrate how our solutions can effectively protect endpoints, detect threats and quickly recover data in the event of data loss.
Join us in this interactive Labs demonstration where we will showcase various techniques to protect against ransomware throughout the attack chain. We will demonstrate how our solutions can effectively protect endpoints, detect threats and quickly recover data in the event of data loss.

Rick Friend
Manager, Cybersecurity Solutions & ArchitectureMerlin Cyber

Chris Rainey
Cybersecurity Solutions EngineerMerlin Cyber
Join us in this interactive Labs demonstration where we will showcase various techniques to protect against ransomware throughout the attack chain. We will demonstrate how our solutions can effectively protect endpoints, detect threats and quickly recover data in the event of data loss.

Rick Friend
Manager, Cybersecurity Solutions & ArchitectureMerlin Cyber

Chris Rainey
Cybersecurity Solutions EngineerMerlin Cyber
Merlin Labs Interactive - Threat Hunting
Join us in this interactive Labs demonstration as we dive into a threat hunting scenario using the events, incidents and telemetry data from our previous Labs demonstrations. Using orchestration and automation, we will demonstrate how the security analyst can quickly identity threats, correlate, enrich and automate incident response.
Join us in this interactive Labs demonstration as we dive into a threat hunting scenario using the events, incidents and telemetry data from our previous Labs demonstrations. Using orchestration and automation, we will demonstrate how the security analyst can quickly identity threats, correlate, enrich and automate incident response.

Jeremy Newberry
Cybersecurity Strategist & ArchitectMerlin Cyber
Join us in this interactive Labs demonstration as we dive into a threat hunting scenario using the events, incidents and telemetry data from our previous Labs demonstrations. Using orchestration and automation, we will demonstrate how the security analyst can quickly identity threats, correlate, enrich and automate incident response.

Jeremy Newberry
Cybersecurity Strategist & ArchitectMerlin Cyber