AGENDA

2025 AGENDA

SECURE MIAMI AGENDA 2025

Opening Remarks

Your Defenders versus 130,000

We used to think the hack of Equifax, Anthem Insurance, Marriott, and Office of Personnel Management were the golden years of China’s hacking–this webinar will demonstrate why those years were only the beginning. This talk will cover China’s ecosystem of state-backed, state-directed, and contracted hackers from the military to the security services and gain a greater understanding of China’s vulnerability collection system, the cyber ranges on which China’s hackers can practice, and the talent pipelines they have constructed over the last decade.

Panel: Next-Generation Threats: Preparing for the Unknown

Moderator: William Mendez / Chief Information Security Officer & VP of Client Success at DigitalEra Group

Panelists: 

Margaret Cunningham SM

 

Margaret Cunningham, Ph.D. / Director, Security & AI Strategy, FCISO at Darktrace
Snehal-Contractor - Stellar Cyber - SM

 

Snehal Contractor / Senior Vice President Global Systems Engineering at Stellar Cyber
Patrick-Orzechowski-Headshot- TORQ- SM

 

Patrick Orzechowski / Field CISO at Torq

 

Panel: The Human Element: Reducing Insider Threats and Building Trust

Moderator: Sonal Rattan / Co-Founder and Chief Technology Officer at Exate

Panelists: 

Chuck Grindle, Ph.D - Executive Advisor, Public Sector at Proofpoint - SM

 

Chuck Grindle, Ph.D / Executive Advisor, Public Sector at Proofpoint
Cristian Rodriguez - Field CTO - Americas at Crowdstrike - SM

 

Cristian Rodriguez / Field CTO | Americas at Crowdstrike
David Reis, Ph.D  - SVP Chief information and Digital Officer at University of Miami, & University of Miami Health System, Leonard M. Miller School of Medicine- SM

 

David Reis, Ph.D / SVP Chief information and Digital Officer at University of Miami, & University of Miami Health System, Leonard M. Miller School of Medicine

 

A Deep Dive into HiddenLayer's AI Threat Landscape Report 2025

AI is driving business innovation at an unheard-of scale, with 89% of IT leaders stating AI models in production are critical to their organization’s success. Yet, security teams are racing to keep up, spending nearly half their time mitigating AI risks. The report underscores that security is key to unlocking AI’s immense potential. Encouragingly, companies are taking action, with 96% increasing their AI security budgets in 2025 to stay ahead of emerging threats. 

The AI Threat Landscape Report 2025 provides an in-depth analysis of the evolving cybersecurity threats facing artificial intelligence (AI) systems and the advancements in AI security. Based on extensive research and a survey of 250 IT decision-makers, the report highlights key challenges organizations face in securing AI-driven technologies. It covers rising security breaches, adversarial machine learning attacks, generative AI vulnerabilities, and supply chain risks. 

Inside the Mind of Exposure: How Psychology Shapes the Threat Landscape

A strategic look at attacker psychology, behavioral mapping, and predictive defense. 

Attackers think in patterns. Defenders think in tools.

This asymmetry creates exposure.

In this talk, we’ll break down how understanding attacker psychology—motives, models, and mental maps—can radically shift how we manage cyber exposure. Moving beyond the clichés of human error, this session explores the psychological architecture of threat actors, how they perceive targets, and how security teams can apply behavioral modeling and cognitive frameworks to forecast, prioritize, and mitigate exposure across the kill chain.

You’ll leave with a new lens: one that views exposure not just as a tech stack flaw, but as a psychological opportunity space attackers are trained to exploit—and defenders can outthink.

The Evolution of Cyber War

Cyber warfare has evolved over the years from simple espionage attempts to extremely versatile campaigns that can change the course of wars, hurt civilians, and sow global chaos. In this talk, we will focus on the use of ransomware and how nation-states have helped build, support, and supply the criminal ransomware economy to sidestep attribution. Ransomware groups with ties to APT groups have increased their targeting on healthcare operations, state and local governments, and critical infrastructure that has a direct impact on the population. Unfortunately, the attackers continue to evolve their tactics, techniques, and procedures to stay ahead of the defenders. In this session we’ll showcase some of the latest advances that attackers are using, how they’re getting in despite the increased spend on security, and what can we do to stop them.

Lunch & Expo Hall

                                                                                                      

Panel: The Future of Cybersecurity: Workforce, Emerging Technologies, and the Skills of Tomorrow

Moderator: Donavon Johnson, Ph.D. / Assistant Professor of Public Policy & Administration, Jack D. Gordon Institute for Public Policy at Florida International University

As we look to the future of cybersecurity, the convergence of emerging technologies, evolving threats, and a rapidly changing digital landscape presents both challenges and opportunities. This panel will explore the next-generation skill sets required in the cybersecurity workforce, with a particular focus on emerging areas such as quantum computing and cloud-native applications. The panel will discuss the evolving role of higher education, boot camps, and self-guided learning in shaping skilled cybersecurity professionals. It will also examine the increasing importance of soft skills like communication, leadership, and problem-solving, and how these will complement technical expertise in tackling tomorrow's complex cybersecurity challenges. The discussion will offer insights into how collaboration can create a holistic, adaptive cybersecurity workforce capable of securing the technologies of the future.

 

Panelists: 

Helvetiella Longoria - Chief Information Security Officer at Florida International University - SM

 

Helvetiella Longoria / Chief Information Security Officer at Florida International University
Archor Amon Tech Policy Analyst and FIU student, at Florida International University - SM

 

Archor Amon / Tech Policy Analyst and FIU student, at Florida International University
person-placeholder-5

 

TBC

 

The Entire Cybersecurity Industry and What Makes it Tick

Long time industry analyst Richard Stiennon present never-before seen data on the entire cybersecurity industry comprised of 4,080+ vendors, 11,300+ products, and 7,000+ investors. The state of the industry is presented with up-to-date data on the first third of 2025.

Which sectors are growing? Which are shrinking? What is driving these changes?

Coffee Break / Vendor Meet & Greet

                                                                                                                                                                     

Operationalizing SBOMs within the Enterprise

Software supply chain security has emerged as a critical issue for CISOs over the last five years and alongside it has come the emergence of a key artifact supporting software transparency, a Software Bill of Materials (SBOM). 

The State of the Hack: Under Attack in the Digital Domain

Former NSA Cybersecurity Director and White House cyber advisor Rob Joyce delivers a sharp and timely analysis of today’s rapidly evolving cyber threat landscape. In this session, Joyce explains the increasingly sophisticated tactics used by nation-state hackers—from Russia and Iran to North Korea and China—while exploring the new intelligence on PRC prepositioning attacks targeting critical infrastructure.  He also examines how artificial intelligence has become a double-edged sword in cybersecurity. While AI enhances defensive capabilities, it is now being weaponized by adversaries to automate attacks, evade detection, and exploit industry vulnerabilities. Attendees will gain insights into the latest threat trends, practical strategies for strengthening cyber defenses, and proactive measures to mitigate risks in a digital environment that faces relentless and evolving threats.

Closing Remarks