Schedule

SECURE MIAMI AGENDA 2026

Chief Casas

Conference Welcome

Secure Miami 2026 Speaker Headshots _Robert Grillo-1

Opening Remarks

Secure Miami 2026 Speaker Headshots_Brandon Wales_SentinelOne-1

Beyond the Red Lines: Navigating the 2030 Geopolitical Cyber Horizon

 As global tensions escalate, the traditional "cyber-perimeter" has dissolved into a complex geopolitical battlefield. Drawing on his experience leading national cyber defense and current strategy at SentinelOne, Brandon Wales explores the "2030 Horizon": a world where Russia prepares for multi-front European incursions and China pivots from quiet espionage to active invasion readiness. This session will decode how these macro-shifts—from the renovation of Russian military hospitals to North Korea’s billion-dollar crypto-heists—directly impact the resilience of domestic enterprises. Attendees will leave with a blueprint for preparing their leadership and boards for the 18-24 months of systemic disruption expected if Beijing moves from the shadows into the light. 
Secure Miami_Logomark_Bright Teal and White@4x

Panel: When the Business Ships AI First: Preventing (and Surviving) AI Failures

Many orgs will face business-led AI failures that security and IT are asked to “bail out.” This panel focuses on real operating models: AI intake + inventory, risk tiering, rapid approvals, training data hygiene, and incident playbooks for AI-driven mishaps. 

Panelists: 

Secure Miami 2026 Speaker Headshots_Collin ChapleauCollin Chapleau
Senior Director, Security & AI Strategy, FCISO at Darktrace

Secure Miami 2026 Speaker Headshots_Curt AubleyCurt Aubley
Chief Executive Officer at Sevii.ai

Secure Miami 2026 Speaker Headshots_Jason TrunkJason Trunk
Field CTO at Island

 

Secure Miami_Logomark_Bright Teal and White@4x

Panel: Moving from Detect/Respond to Disrupt with Preemptive Cybersecurity & Exposure Management

What does “preemptive” look like beyond marketing? In this panel we'll discuss predictive threat prevention, deception, moving target defense, and exposure management that measurably reduces risk before alerts fire. How leading teams prioritize by attack paths, business impact, and exploitability. We'll discuss operating rhythms: remediation SLAs, asset ownership, exception governance, and “risk burn-down” reporting that boards understand.

Moderator: 

Secure Miami 2026 Speaker Headshots_Lawrence Embil-1Lawrence Embil
CISSP, CAIO, CCSP, CISM, CISA, PMI-ACP, Manager, Security Architecture, Risk and Compliance, Incident Response at Miami-Dade County 

Panelists: 

Secure Miami 2026 Speaker Headshots_Melissa BischopingMelissa Bischoping
Sr. Director, Security and Product Research at Tanium

 

Secure Miami 2026 Speaker Headshots (1)_KASIMIR SCHULZ

Securing AI Systems: What Can Go Wrong, Why It Matters, and What Comes Next

As AI systems become embedded in everyday tools and automated workflows, securing them has become a real and often misunderstood challenge. This talk examines what can go wrong when AI models are secured using assumptions and controls that do not hold up in real deployments, creating gaps between perceived safety and actual behavior.

Rather than cataloging attacks, the discussion focuses on why common AI security approaches fall short, including brittle safeguards  and limited visibility once systems are in use. As AI systems become more agentic, small failures or exploitations can have outsized impact, allowing models to take actions, influence other systems, or compound mistakes at scale. The talk closes by outlining how security teams can reason more clearly about AI risk today and what needs to change as these systems continue to evolve.
Secure Miami 2026 Speaker Headshots_John Sarantakes BlackFog

Ransomware, Shadow AI, and the Race for Your Data

Data has become the primary currency of modern cybercrime. Today, the vast majority of ransomware attacks involve data exfiltration, transforming ransomware from a disruption tactic into a powerful tool for extortion. Organizations are no longer just facing system downtime, they’re confronting regulatory exposure, reputational damage, and long-term loss of trust.

At the same time, the threat landscape is expanding beyond traditional cybercriminal activity. Insider threats and Shadow AI, unsanctioned AI tools used by employees to process corporate data, are introducing new and often invisible pathways for sensitive information to leave the organization. As AI-driven productivity tools become widespread, data can move beyond corporate controls without security teams realizing it.

In this evolving environment, attackers share a common objective: extract valuable data before defenses react.

This session explores why data exfiltration now sits at the center of cyber risk, how ransomware tactics have evolved, and why organizations must rethink how they protect sensitive information at the endpoint. Attendees will gain insight into emerging data loss risks, the limitations of detection-only strategies, and why prevention-focused approaches are becoming essential in defending against modern cyberthreats.

Attendees will learn:
-How ransomware has evolved from encryption attacks to data exfiltration and extortion
-How Shadow AI is creating new, often invisible, data exposure risks
-Why endpoints and insider activity remain critical vulnerability points
-The limitations of detection-only security strategies
-Why prevention-focused approaches are becoming essential for protecting sensitive data

Secure Miami_Logomark_Bright Teal and White@4x

Keynote Session

Secure Miami_Logomark_Bright Teal and White@4x

Panel: Identity is the Control Plane: Securing Humans, Machines, Vendors, and APIs

Within the modern infrastructure, everything becomes an identity: employees, contractors, service accounts, workloads, agents, APIs. This panel covers modern IAM practice: MFA-resistant phishing, privileged access, identity governance, SaaS sprawl, and third-party access that doesn’t become your next breach headline.

Panelists: 

Secure Miami 2026 Speaker Headshots_Antonio MunozAntonio Muñoz
CEO & Co-Founder at Zepo Intelligence

Secure Miami 2026 Speaker Headshots_Chuck GrindleChuck Grindle, Ph.D. 
Executive Advisor, Public Sector at Proofpoint

Secure Miami_Logomark_Bright Teal and White@4x

Panel: Incident Response 2026: Speed, Ransomware Reality, and Crisis Comms That Don’t Fail

What IR looks like when ransomware crews move fast and public pressure is high. On this panel, participants will share their point of view on operational essentials: tabletop exercises that matter, log readiness, identity containment, immutable backups, third-party breach coordination, and building a comms/legal playbook that reduces chaos. 

Moderator: 

Secure Miami 2026 Speaker Headshots_Kurtis MinderKurtis Minder
Principal at Ping Theory


Panelists: 

Secure Dallas 2025 Speaker Headshots_Chipper Jones_Stellar CyberChipper Jones
Regional Sales Manager at Stellar Cyber

Secure Miami 2026 Speaker Headshots _JUAN ESCOBAR FORTINETJuan Escobar
Channel Sales Account Manager at Fortinet

 

Secure Miami 2026 Speaker Headshots_Lauren Anderson Rubrik

Accelerate Your AI Transformation with Confidence

AI Agents are rapidly reshaping the enterprise landscape, promising unprecedented speed and automation. But true transformation requires more than just adoption—it requires control. How do you empower your organization to innovate without exposing your data and infrastructure to unchecked risks? In this session, we will demonstrate how to safely integrate AI agents into your workflows while maintaining absolute governance. 

You will learn how to: 
Monitor: Gain full visibility into agent actions with deep identity and application context. 
Govern: Enforce custom behavioral policies using simple natural language to block risky tools in real-time. 
Remediate: Instantly undo destructive agent mistakes with one-click rewind capabilities
Secure Miami 2026 Speaker Headshots_Stuart McClure

From Resilience to Prevention: Simulating Success in a Chaotic World

In a landscape defined by chaotic threats—from AI-driven attacks to operational fragility—the industry standard has settled on "resilience": the ability to withstand a hit. But resilience is merely survival. To thrive, we must evolve back to the ultimate power in security and business: Prevention.

Secure Miami 2026 Speaker Headshots_Anthony Seto

Protecting the Prompt (and more)

This session breaks down the three pillars of AI security strategy: Protecting the Prompt (3rd-party apps), The Prompt & Response (1st-party apps), and The Action (Agentic AI). We’ll dive into the emerging risks and defensive strategies every security leader needs to master in the age of generative intelligence.
Secure Dallas 2025 Speaker Headshots - Rachel Wilson

The New Cyberthreat Landscape

Cybersecurity “World Tour”:
Rachel will describe the current cybersecurity threats facing companies and institutions from nation states like Russia, North Korea and Iran, from cyber organized crime syndicates, and from individual hackers looking to make money or create mayhem.

Cybersecurity Threats in 2025:
Rachel will define 2025 cyber threats as "The Three R's - Russia, Ransomware, and Resilience" and will explain the strategic importance and tactical implications of each.

The New Threat - Artificial Intelligence:
Rachel will walk us through the benefits and the detriments of artificial intelligence as it pertains to cybersecurity.

Action Steps:
Drawing from her experience at the NSA and in the financial sector, she will discuss what professionals need to be considering in the current cyber risk environment and describe the aspects of an effective corporate cyber resiliency strategy.
Secure Miami_Logomark_Bright Teal and White@4x

Closing Remarks

Secure Miami_Logomark_Bright Teal and White@4x

Cocktail Reception

Sponsored by: 

SWTG_logo_final-2020-new-font-large-600-0c7b7b