Merlin Group | Xccelerate 2025: Advancing Cyber Innovation for Government - Agenda

Agenda

Mainstage Programming

Operationalizing Zero Trust

Strengthening Cyber Resilience with AI and ML Breakout Track

Fortifying Foundations: Securing Critical Infrastructure and the Supply Chain

Merlin Labs Interactive

Times are subject to change.

8:30 AM EDT Tuesday, March 11

Opening Remarks

5 minutes

Welcome to Xccelerate 2025!

Welcome to Xccelerate 2025!

Read More
8:35 AM EDT Tuesday, March 11

9:05 AM EDT Tuesday, March 11

Securing Every Identity: The Federal Blueprint for Zero Trust

45 minutes

From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.

From people to AI tools, every identity must be managed with precision. This session explores identity security solutions and their role in enforcing Zero Trust principles. Drawing insights from the federal government’s approach to Zero Trust, we’ll highlight how comprehensive identity management is critical to achieve agencies’ goals of securing complex and diverse environments. Learn practical strategies for implementing Zero Trust principles effectively to strengthen access controls and protect federal networks.

Randy Resnick
Randy Resnick
Director, Zero Trust Portfolio Management Office, DOD CIO
Department of Defense
Read More
9:50 AM EDT Tuesday, March 11

End-to-End Resilience in the Ransomware Era: Defending Data and Mobile Endpoints

45 minutes

With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.

With ransomware accounting for nearly one-third of all breaches in 2023, organizations must adopt a holistic approach to resilience. It's no longer enough to focus solely on traditional data protection; mobile endpoints now represent a critical frontier in cybersecurity. This session will explore comprehensive strategies for protecting your organization's data and mobile endpoints, strengthening defenses against ransomware, and enabling fast recovery with minimal disruption to operations. Gain insights into building a proactive, integrated defense posture that keeps your organization resilient in an ever-evolving threat landscape.

Read More
10:35 AM EDT Tuesday, March 11

10:45 AM EDT Tuesday, March 11

Post-Quantum Readiness: A Holistic Approach to Vulnerability and Cryptographic Risk Management

45 minutes

As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.

As the quantum era approaches, enterprises must navigate dual challenges: mitigating current vulnerabilities and preparing for the shift to quantum-resistant cryptography. A critical aspect of this preparation is achieving comprehensive asset visibility—locating all endpoints, identifying assets across workloads, applications, and multi-cloud environments, and uncovering hidden vulnerabilities. Experts will discuss strategies to build a unified vulnerability management process that not only addresses M23-01 and M23-02 requirements but also ensures cryptographic resilience by replacing weak encryption algorithms. Gain insights into securing enterprise assets, enhancing endpoint discovery, and adopting quantum-safe cryptographic standards.

Landon Van Dyke
Landon Van Dyke
Chief Operations Officer
Systalex
Read More
11:30 AM EDT Tuesday, March 11

AI Powered Security Operations: Continuous Visibility & Protection from On-Prem to Multi-Cloud

45 minutes

In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced AI-driven solutions. Join this session to explore how to leverage AI to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.

In an era where cyber threats are increasingly sophisticated, effective cybersecurity demands advanced AI-driven solutions. Join this session to explore how to leverage AI to deliver efficient vulnerability detection, rapid threat prioritization, and proactive response across hybrid and multi-cloud environments. Learn how tools can integrate seamlessly to secure your network from on-prem data centers to the cloud, ensuring visibility, protection, and adaptability in an evolving threat landscape. Discover innovative techniques to detect vulnerabilities, mitigate risks, and simplify multi-cloud security management without overstretching resources.

Richard Grabowski
Richard Grabowski
CDM Deputy, Program Manager
CISA
Read More
12:15 PM EDT Tuesday, March 11

1:00 PM EDT Tuesday, March 11

4:00 PM EDT Tuesday, March 11

Networking & Happy Hour

1 hour

Thank you for attending Xccelerate 2025!

Thank you for attending Xccelerate 2025!

Read More