June 2, 2025

* JOIN US FOR THE PRE-EVENT HAPPY HOUR on JUNE 1 2025 FROM 6:00 PM – 7:00 PM

7:00 am – 8:00 am PST

Delegate Registration and Networking Breakfast

8:00 am – 8:10 am PST

Chair's Welcome and Opening Remarks

CyberSecurity

Artificial Intelligence & Machine Learning

Digital Transformation & Data Management

8:10 am – 8:40 am PST

Opening Keynote

Securing the Enterprise 2026: From Reactive Defense to Cyber Resilience

  • Shift from castle-and-moat defense to “assume-breach” + zero-trust verification
  • Embed security by design into DevOps, data pipelines, and multi-cloud workloads
  • Align cyber-resilience metrics with board-level risk tolerance and business KPIs
8:40 am – 9:10 am PST

Plenary

Generative AI Meets Cyber Ops

  • Deploy large-language models as analyst copilots that correlate alerts, enrich context, and recommend playbook actions in seconds.
  • Establish LLM guardrails—prompt filtering, policy-based data masking, and chained validation—to prevent prompt injection or data leakage.
  • Balance innovation speed with AI governance frameworks that set clear lines of ownership for model risk, privacy, and compliance.
9:10 am – 9:40 am PST

Plenary

Cloud, Data, and the Modern Zero-Trust Fabric

  • Build an identity-centric fabric that segments traffic by user, device posture, and workload sensitivity—across on-prem, multi-cloud, and SaaS.
  • Integrate continuous posture checks (MFA, patch level, device health) so policy decisions adapt in real time to changing risk signals.
  • Demonstrate ROI in terms of faster M&A integration, reduced lateral-movement attacks, and lower cloud compliance costs.
9:45 am – 11:25 am PST

Refreshments, Networking, and Pre-Arranged 1-2-1 Meetings

11:30 am – 12:00 pm PST

Stream Sessions

cybersecurity

Defending OT & IT: Converged Security for Smart Factories

  • Inventory and classify production-line assets—PLCs, IIoT sensors, SCADA—to close blind spots between plant and IT.
  • Implement micro-segmentation and passive anomaly detection so security doesn’t interrupt uptime.
  • Map each mitigation step to safety, quality, and regulatory KPIs to secure budget.

Artificial Intelligence & Machine Learning

Data to Decisions: Operationalizing Machine-Learning Pipelines

  • Stand up feature stores and automated CI/CD so models move from notebook to production in days, not months.
  • Use drift monitoring and bias testing to keep models accountable after deployment, avoiding “set-and-forget” ML.
  • Tie every algorithm to a business OKR—revenue lift, cost avoidance, or risk reduction—to validate ROI.

Digital Transformation & Data Management

Modern Data Mesh: Unifying Analytics Across Silos

  • Shift from a centralized data lake to domain-owned data products with clear SLAs for quality and lineage.
  • Apply federated governance so privacy and access policies travel with the data, no matter where it lives.
  • Empower analysts with self-service BI while keeping one “currency of truth” for executive reporting.
12:05 pm – 12:35 pm PST

Workshops

Room 1

Ransomware Table-Top: 30-Minute Cyber Crisis Simulation

  • Walk through a live breach scenario: attackers encrypt ERP, demand crypto.
  • Assign roles—CISO, legal, PR—and practice real-time decision making under the clock.
  • Leave with a tabletop checklist and post-incident communication plan.

Room 2

Building AI-Native Platforms on Cloud-First Architectures

  • Compare reference stacks for Gen-AI model hosting, GPU scheduling, and cost controls.
  • Design data-centric security—tokenization, vaults, and access tiers—to keep training sets safe.
  • Show how FinOps dashboards flag runaway compute before the monthly bill arrives.

Room 3

KPI-Driven Program Management for Large-Scale Digital Initiatives

  • Translate big-picture transformation goals into measurable OKRs and sprint metrics.
  • Blend agile squads with a classic PMO to maintain executive visibility.
  • Use real-time dashboards to celebrate wins and course-correct lagging workstreams.
12:40 pm – 1:40 pm PST

Lunch & Learn Roundtable Discussions

Benefit from additional learning by joining a moderated roundtable discussion on pressing issues in the industry. Registration is required, and attendance for moderated roundtables on Day 1 is limited to attendees and speakers. Choose from:

Securing the API Economy: From Discovery to Runtime Shielding

Talent Upskilling for Gen-AI & Cyber: Bootcamps, Badges, and Beyond

Cloud FinOps Masterclass: Turning Cost Data into Actionable Insights

Global Data-Privacy Roadmaps: Navigating GDPR, CPRA, and Beyond

Vendor-Risk Scoring 2.0: Continuous Monitoring for Supply-Chain Trust

AI Ethics & Responsible Innovation: Policy, Practice, and Culture

1:45 pm – 2:15 pm PST

Stream Sessions

Cybersecurity

From Detection to Response in Under 10 Minutes

  • Correlate EDR, NDR, and SIEM data into a single alert storyline.
  • Use SOAR to auto-triage and contain 90% of commodity threats.
  • Measure success with MTTR and “analyst hours saved,” freeing staff for higher-value work.

Artificial Intelligence & Machine Learning

Conversational AI: Chatbots That Don’t Leak Data

  • Embed retrieval-augmented generation (RAG) so bots answer from governed sources, not the open web.
  • Red-team against prompt-injection and harmful content with automated adversarial tests.
  • Track real-time CSAT, containment rate, and compliance audit logs.

Digital Transformation & Data Management

ERP in the Cloud: Zero-Downtime Migration Playbook

  • Choose between parallel-run, phased, or big-bang cut-over models
  • Clean master data and archive ROT (redundant, obsolete, trivial) records before lift-and-shift
  • Align licensing, FinOps tagging, and API integrations so value shows Day 1
2:20 pm – 2:50 pm PST

Workshops

Room 1

Responsible AI: Governing Models Before Regulators Force Your Hand

  • Rank every AI system by business impact and risk.
  • Keep detailed audit trails of data, training, and testing for future proof.
  • Form an internal AI ethics council that includes legal, security, and product teams.

Room 2

Cloud Security 2.0: Protecting Data Across Every Cloud and App

  • Combine cloud-security tools into one clear health score.
  • Embed security checks directly into development pipelines so mistakes are caught early.
  • Discover and lock down “shadow” cloud apps you never knew you had.

Room 3

Cloud Security 2.0: Protecting Data Across Every Cloud and App

  • Combine cloud-security tools into one clear health score.
  • Embed security checks directly into development pipelines so mistakes are caught early.
  • Discover and lock down “shadow” cloud apps you never knew you had.
1:45 pm – 2:15 pm PST

Stream Sessions

Cybersecurity

Zero-Trust in 90 Days: A Practical Roadmap

  • Identify the first network segments to protect for quick wins.
  • Use continuous checks on user identity, device health, and location instead of one-time log-ins.
  • Measure success by shorter attacker dwell time and faster breach isolation.

Artificial Intelligence & Machine Learning

Conversational AI That Earns Customer Trust

  • Feed chatbots only with approved company data to avoid wrong answers
  • Add filters so the bot never shares private or harmful content
  • Track user satisfaction, completion rate, and cost per conversation

Digital Transformation & Data Management

Cloud Security 2.0: Are Shadow Apps Draining Your Budget?

  • Pipeline gates that stop risky code before it hits prod.
  • Discovery demos that surface hidden SaaS in minutes.
2:55 pm – 3:25 pm PST

Plenary

Workforce of the Future: Human Ingenuity Amplified by Automation

  • Deploy AI copilots to erase toil and let teams focus on creative problem-solving.
  • Craft nano-degree–style upskilling pathways that evolve with tech velocity.
  • Foster a culture that rewards experimentation, resilience, and lifelong learning.
3:25 pm – 4:45 pm PST

HAPPY HOUR, NETWORKING, AND PRE-ARRANGED 1-2-1 MEETINGS

4:50 pm – 5:35 pm PST

Panel discussion

Architecture as a Business Multiplier: From Strategic Roadmaps to AI-Native Platforms

  • Translating EA into measurable P&L impact
  • Aligning Gen-AI pilots with enterprise reference architectures
  • Balancing innovation velocity with governance and risk
  • Building the foundation for AI-native, continuously learning systems
6:20 pm – 6:30 pm PST

Chair's closing remarks

CyberSecurity

Artificial Intelligence & Machine Learning

Digital Transformation & Data Management

6:30 pm – 7:30 pm PST

Networking drinks reception

Unlock Exclusive Summit Details

Looking to unlock exclusive details about the summit? Enter your password or Request access using the link below.

Dont have a password?

If you do not have a password, click below to submit a request for access.

Request Access