Agenda
Mainstage Programming
Operationalizing Zero Trust
Strengthening Cyber Resilience with AI and ML Breakout Track
Fortifying Foundations: Securing Critical Infrastructure and the Supply Chain
Merlin Labs Interactive
Mainstage Programming
Times are subject to change.
Opening Remarks
Welcome to Xccelerate 2025!
Welcome to Xccelerate 2025!
Welcome to Xccelerate 2025!
Securing Every Identity: The Federal Blueprint for Zero Trust
From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.
From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.
Randy Resnick
Director, Zero Trust Portfolio Management Office, DOD CIODepartment of Defense
From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.
Randy Resnick
Director, Zero Trust Portfolio Management Office, DOD CIODepartment of Defense
End-to-End Resilience in the Ransomware Era: Defending Data and Mobile Endpoints
With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.
With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.
With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.
Post-Quantum Readiness: A Holistic Approach to Vulnerability and Cryptographic Risk Management
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.
Landon Van Dyke
Chief Operations OfficerSystalex
As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.
Landon Van Dyke
Chief Operations OfficerSystalex
AI Powered Security Operations: Continuous Visibility & Protection from On-Prem to Multi-Cloud
In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced AI-driven solutions. Join this session to explore how to leverage AI to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.
In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced AI-driven solutions. Join this session to explore how to leverage AI to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.
Richard Grabowski
CDM Deputy, Program ManagerCISA
In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced AI-driven solutions. Join this session to explore how to leverage AI to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.
Richard Grabowski
CDM Deputy, Program ManagerCISA
Networking & Happy Hour
Thank you for attending Xccelerate 2025!
Thank you for attending Xccelerate 2025!
Thank you for attending Xccelerate 2025!
Operationalizing Zero Trust
Times are subject to change.
Building a Practical Zero Trust Roadmap
Gain insights on aligning Zero Trust goals with specific business objectives, identifying quick wins, and overcoming common adoption roadblocks.
Gain insights on aligning Zero Trust goals with specific business objectives, identifying quick wins, and overcoming common adoption roadblocks.
Gain insights on aligning Zero Trust goals with specific business objectives, identifying quick wins, and overcoming common adoption roadblocks.
Deploying Zero Trust in Hybrid Environments
What are some of the unique challenges and best practices for deploying Zero Trust in hybrid cloud and on-premises environments?
What are some of the unique challenges and best practices for deploying Zero Trust in hybrid cloud and on-premises environments?
What are some of the unique challenges and best practices for deploying Zero Trust in hybrid cloud and on-premises environments?
Strengthening Zero Trust Architecture with AI and ML
Explore how AI and machine learning can be used to support and enhance Zero Trust principles.
Explore how AI and machine learning can be used to support and enhance Zero Trust principles.
Explore how AI and machine learning can be used to support and enhance Zero Trust principles.
Strengthening Cyber Resilience with AI and ML Breakout Track
Times are subject to change.
Merlin Ventures CISO Community Broadcast
Engage in lively discussion with fellow security leaders and join a community of CISOs from across commercial and government industries as co-founders and CEOs of early-stage Israeli cyber startups pitch their innovations.
Engage in lively discussion with fellow security leaders and join a community of CISOs from across commercial and government industries as co-founders and CEOs of early-stage Israeli cyber startups pitch their innovations.
Engage in lively discussion with fellow security leaders and join a community of CISOs from across commercial and government industries as co-founders and CEOs of early-stage Israeli cyber startups pitch their innovations.
Transforming Security with AI and Data Insights
Many agencies are seeking to leverage AI within a modernized IT framework to enhance cybersecurity and unlock the power of data intelligence. This session will explore practical strategies for transitioning from legacy systems while harnessing data insights to drive informed decision-making. Discover how to overcome common modernization challenges, build agile, cloud-enabled infrastructures, and integrate scalable AI deployments that not only bolster cybersecurity but also deliver actionable intelligence to optimize operations and improve outcomes.
Many agencies are seeking to leverage AI within a modernized IT framework to enhance cybersecurity and unlock the power of data intelligence. This session will explore practical strategies for transitioning from legacy systems while harnessing data insights to drive informed decision-making. Discover how to overcome common modernization challenges, build agile, cloud-enabled infrastructures, and integrate scalable AI deployments that not only bolster cybersecurity but also deliver actionable intelligence to optimize operations and improve outcomes.
Many agencies are seeking to leverage AI within a modernized IT framework to enhance cybersecurity and unlock the power of data intelligence. This session will explore practical strategies for transitioning from legacy systems while harnessing data insights to drive informed decision-making. Discover how to overcome common modernization challenges, build agile, cloud-enabled infrastructures, and integrate scalable AI deployments that not only bolster cybersecurity but also deliver actionable intelligence to optimize operations and improve outcomes.
Cryptographic Inventory and Posture Management
The U.S. Government requires agencies to take immediate action to achieve post-quantum readiness and advance cryptographic posture. Discovering and inventorying all cryptographic objects are the first steps organizations need to meet requirements such as M23-02. See how we’re helping organizations easily achieve this.
The U.S. Government requires agencies to take immediate action to achieve post-quantum readiness and advance cryptographic posture. Discovering and inventorying all cryptographic objects are the first steps organizations need to meet requirements such as M23-02. See how we’re helping organizations easily achieve this.
The U.S. Government requires agencies to take immediate action to achieve post-quantum readiness and advance cryptographic posture. Discovering and inventorying all cryptographic objects are the first steps organizations need to meet requirements such as M23-02. See how we’re helping organizations easily achieve this.
Fortifying Foundations: Securing Critical Infrastructure and the Supply Chain
Times are subject to change.
Critical Infrastructure Resilience and Recovery
Resilience is the cornerstone of critical infrastructure security, encompassing not only the ability to withstand and recover from attacks but also the proactive measures required to secure software supply chains. As threat actors increasingly exploit vulnerabilities in software dependencies, ensuring the integrity and security of the supply chain has become paramount. Learn how to enhance your organization’s defenses against emerging threats while ensuring rapid recovery and operational continuity.
Resilience is the cornerstone of critical infrastructure security, encompassing not only the ability to withstand and recover from attacks but also the proactive measures required to secure software supply chains. As threat actors increasingly exploit vulnerabilities in software dependencies, ensuring the integrity and security of the supply chain has become paramount. Learn how to enhance your organization’s defenses against emerging threats while ensuring rapid recovery and operational continuity.
Resilience is the cornerstone of critical infrastructure security, encompassing not only the ability to withstand and recover from attacks but also the proactive measures required to secure software supply chains. As threat actors increasingly exploit vulnerabilities in software dependencies, ensuring the integrity and security of the supply chain has become paramount. Learn how to enhance your organization’s defenses against emerging threats while ensuring rapid recovery and operational continuity.
Asset Visibility and Protection
Identifying every asset – IT, OT, and IoT – is essential to achieve comprehensive operational visibility. See how we’re helping organizations gain unprecedented visibility and protecting all enterprise assets.
Identifying every asset – IT, OT, and IoT – is essential to achieve comprehensive operational visibility. See how we’re helping organizations gain unprecedented visibility and protecting all enterprise assets.
Identifying every asset – IT, OT, and IoT – is essential to achieve comprehensive operational visibility. See how we’re helping organizations gain unprecedented visibility and protecting all enterprise assets.
Real Time Threat Monitoring and Rapid Response
Uncover the importance of real-time monitoring and swift incident response to protect essential services from cyber and physical threats. Learn about the latest advancements in threat detection technologies, monitoring platforms, and response strategies designed specifically for critical infrastructure.
Uncover the importance of real-time monitoring and swift incident response to protect essential services from cyber and physical threats. Learn about the latest advancements in threat detection technologies, monitoring platforms, and response strategies designed specifically for critical infrastructure.
Uncover the importance of real-time monitoring and swift incident response to protect essential services from cyber and physical threats. Learn about the latest advancements in threat detection technologies, monitoring platforms, and response strategies designed specifically for critical infrastructure.
Merlin Labs Interactive
Times are subject to change.
Merlin Labs Interactive - Automated Crypto Discovery & Inventory
Join us in this interactive Labs demonstration that showcases how to utilize existing endpoint management tools to discover, inventory and report on cryptographic assets to comply with OMB memorandum M-23-02, Migrating to Post-Quantum Cryptography.
Join us in this interactive Labs demonstration that showcases how to utilize existing endpoint management tools to discover, inventory and report on cryptographic assets to comply with OMB memorandum M-23-02, Migrating to Post-Quantum Cryptography.
Join us in this interactive Labs demonstration that showcases how to utilize existing endpoint management tools to discover, inventory and report on cryptographic assets to comply with OMB memorandum M-23-02, Migrating to Post-Quantum Cryptography.
Merlin Labs Interactive - Ransomware Protection & Data Resiliency
Join us in this interactive Labs demonstration where we will showcase various techniques to protect against Ransomware attacks and how to quickly recover data.
Join us in this interactive Labs demonstration where we will showcase various techniques to protect against Ransomware attacks and how to quickly recover data.
Join us in this interactive Labs demonstration where we will showcase various techniques to protect against Ransomware attacks and how to quickly recover data.
Merlin Labs Interactive - Threat Hunting
Join us in this interactive Labs demonstration that showcases real-time network threat detection, protection & response using automated workflows to streamlined incident management. The powerful combination of tools used will demonstrate comprehensive threat hunting.
Join us in this interactive Labs demonstration that showcases real-time network threat detection, protection & response using automated workflows to streamlined incident management. The powerful combination of tools used will demonstrate comprehensive threat hunting.
Join us in this interactive Labs demonstration that showcases real-time network threat detection, protection & response using automated workflows to streamlined incident management. The powerful combination of tools used will demonstrate comprehensive threat hunting.