Schedule
SECURE MIAMI AGENDA 2026
Opening Remarks
Rather than cataloging attacks, the discussion focuses on why common AI security approaches fall short, including brittle safeguards and limited visibility once systems are in use. As AI systems become more agentic, small failures or exploitations can have outsized impact, allowing models to take actions, influence other systems, or compound mistakes at scale. The talk closes by outlining how security teams can reason more clearly about AI risk today and what needs to change as these systems continue to evolve.
Ransomware, Shadow AI, and the Race for Your Data
Data has become the primary currency of modern cybercrime. Today, the vast majority of ransomware attacks involve data exfiltration, transforming ransomware from a disruption tactic into a powerful tool for extortion. Organizations are no longer just facing system downtime, they’re confronting regulatory exposure, reputational damage, and long-term loss of trust.
At the same time, the threat landscape is expanding beyond traditional cybercriminal activity. Insider threats and Shadow AI, unsanctioned AI tools used by employees to process corporate data, are introducing new and often invisible pathways for sensitive information to leave the organization. As AI-driven productivity tools become widespread, data can move beyond corporate controls without security teams realizing it.
In this evolving environment, attackers share a common objective: extract valuable data before defenses react.
This session explores why data exfiltration now sits at the center of cyber risk, how ransomware tactics have evolved, and why organizations must rethink how they protect sensitive information at the endpoint. Attendees will gain insight into emerging data loss risks, the limitations of detection-only strategies, and why prevention-focused approaches are becoming essential in defending against modern cyberthreats.
Attendees will learn:
-How ransomware has evolved from encryption attacks to data exfiltration and extortion
-How Shadow AI is creating new, often invisible, data exposure risks
-Why endpoints and insider activity remain critical vulnerability points
-The limitations of detection-only security strategies
-Why prevention-focused approaches are becoming essential for protecting sensitive data
Accelerate Your AI Transformation with Confidence
You will learn how to:
Monitor: Gain full visibility into agent actions with deep identity and application context.
Govern: Enforce custom behavioral policies using simple natural language to block risky tools in real-time.
Remediate: Instantly undo destructive agent mistakes with one-click rewind capabilities
In a landscape defined by chaotic threats—from AI-driven attacks to operational fragility—the industry standard has settled on "resilience": the ability to withstand a hit. But resilience is merely survival. To thrive, we must evolve back to the ultimate power in security and business: Prevention.
Protecting the Prompt (and more)
The New Cyberthreat Landscape
Rachel will describe the current cybersecurity threats facing companies and institutions from nation states like Russia, North Korea and Iran, from cyber organized crime syndicates, and from individual hackers looking to make money or create mayhem.
Cybersecurity Threats in 2025:
Rachel will define 2025 cyber threats as "The Three R's - Russia, Ransomware, and Resilience" and will explain the strategic importance and tactical implications of each.
The New Threat - Artificial Intelligence:
Rachel will walk us through the benefits and the detriments of artificial intelligence as it pertains to cybersecurity.
Action Steps:
Drawing from her experience at the NSA and in the financial sector, she will discuss what professionals need to be considering in the current cyber risk environment and describe the aspects of an effective corporate cyber resiliency strategy.

