Brian Epstein, Institute for Advanced Study
This talk reviews the history of Cryptography leading up to the necessity of Post-Quantum Cryptography. It reviews where we are and what we need to do going forward as practitioners. It will also review a more immediate, but somewhat mundane, risk associated with certificate automation. Certificate lifetimes are being reduced, which requires us to deploy them more frequently. Certificate automation is the only way forward, but it requires significant effort and ongoing auditing for our teams.
Register for Session
Vishal Singh Bhardvaj, OmniSOC
Why this matters now: Rapid adoption of Docker/Kubernetes is accelerating digital transformation, but it also expands attack surface and raises the stakes for securing container environments.
Key container security challenges: Containers introduce distinct risks such as vulnerable images, runtime threats, misconfigurations, weak access controls, and complex network segmentation.
What attendees will learn: Container security fundamentals and best practices (e.g., image scanning, lifecycle security, segmentation) plus practical approaches to deploying honeypots across containers, VMs, and edge devices (e.g., Raspberry Pi).
Real-world value: Case studies and deployment lessons—including common attack patterns—and how honeypot telemetry can directly inform security policies and incident response.
Integrated defense strategy: Methods for combining honeypots with container security controls to build adaptive, proactive defenses in cloud-native/hybrid environments.
Demo & impact: Live demonstrations (including a simulated container escape) to show consequences of weak security and reinforce practical mitigation steps.
Register for Session
Kendra Ketchum, CIO at Indiana University; Upendra Mardikar, Chief Information Security Officer at TIAA
In an era of rapidly evolving cyber threats, institutional leaders face unprecedented challenges in protecting their organizations' digital assets and maintaining stakeholder trust. This candid dialogue brings together two seasoned executives navigating these complexities at major institutions: Upendra Mardikar, Chief Information Security Officer at TIAA, and Kendra Ketchum, Chief Information Officer at Indiana University. Through an interactive conversation, these leaders will share their most pressing cybersecurity concerns in the current threat landscape, from ransomware and supply chain vulnerabilities to insider threats and the security implications of emerging technologies. More importantly, they'll discuss the strategic approaches, organizational changes, and cultural shifts they're implementing to address these challenges within their respective sectors—financial services and higher education. Attendees will gain insight into how executive leaders balance competing priorities, allocate limited resources, and build security-aware cultures. This session is ideal for security leaders, IT executives, and anyone interested in understanding how organizational leadership approaches cybersecurity in an increasingly complex digital environment.
Register for session (RZ)
Open Spaces give attendees the opportunity to talk about anything they’d like in small break out groups. You might suggest a topic you want to learn about, or one you feel like you can help others with.
Register for Session