Agenda
November 17th 2026 // Tampa
November 17th 2026 // Tampa
We are currently working on Florida Cyber Summit agenda. This is a sample of the sessions you will find at the event.
| Day 1 // November 17th, 2026 08:30 – 5:00 CDT |
|
| 08:15Registration & Coffee | |
| 09:05Welcome Speech | |
| 09:15Panel Discussion: Driving Innovation: How Do We Balance Innovation and Cybersecurity Innovation often requires rapid development and experimentation. Yet, this combination often introduces new vulnerabilities and expands the attack surface, making robust cybersecurity more critical than ever. In this expert panel discussion, we explore the delicate yet crucial equilibrium between pushing technological boundaries and maintaining a strong security posture. . ● How can organizations ensure cybersecurity is integrated into fast-paced environments without stifling creativity or speed? ● What role should leadership play in aligning cybersecurity with innovation goals? ● How might collaboration between security and development teams ensure business needs are met? . . |
|
| 09:55Presentation: AI Driven - Securing the Future of IT Management AI has become the new nervous system of modern IT, moving from a brute force ‘look up table’ to a sophisticated learning approach. The science of modern AI is built on Neural Networks with Hidden Layers, inputs, outputs, and parameters. This shift enables the move from reactive to predictive defense. This session explores how AI is redefining IT management by detailing the “Good”—AI strengthening cybersecurity —and the “Ugly”—cybercriminals weaponizing AI with deepfakes and adaptive malware. To prepare, organizations must adopt a focus on Vision & Strategy, People & Skills, and Cybersecurity. ManageEngine’s AI-driven solutions empower IT teams to achieve their mission of improving efficiency, resilience, and compliance. . . |
|
| 10:35Networking Break | |
| 11:15Presentation: Defending Against AI-Driven Threats to Florida’s Critical Infrastructure Florida’s leading industries are accelerating digital transformation, adopting new technologies to drive growth. Today’s threat actors are not just opportunistic; they are strategic, well-resourced, and increasingly leveraging automation and generative AI to disrupt the systems that keep our organizations running. As the attack surface expands, AI-powered threats are becoming more dynamic and harder to detect. This session explores how adversaries exploit vulnerabilities in APIs, access controls, and service availability, and offers actionable strategies for building resilience and defending against evolving risks. Learn how Florida’s security leaders can stay ahead of the next generation of AI-driven threats. . . |
|
| 11:45Presentation: Survival in the Digital Era: What Does a Culture of Cybersecurity Look Like? Building a strong culture of cybersecurity within our organizations is no longer optional; it’s essential for survival. But what does this culture look like? In this session, we hear from an expert security strategist who implemented a cultural change in their company. Join us to hear the results. . ● What do we mean by ‘security culture’, and what does it look like? ● How can we cultivate an environment of communication and collaboration around security matters? ● How should we as security leaders use our voice to champion awareness and responsibility? . . |
|
| 12:15Lunch | |
| 1:15Presentation: Catching the Hand in the Cookie Jar: Canary Session Cookies We all rely on MFA to protect our accounts, but what if the weakest link is the outcome of that authentication? Modern web authentication still relies on an old, insecure technology: the browser cookie. A stolen authentication cookie is a stolen identity, and the rise of information-stealing malware proves hackers are more than aware of this. In 2024, one infostealer alone compromised the data of over 450 million people. In this session, we demonstrate the stark reality that MFA doesn’t protect against stolen session cookies. Our expert speaker will propose a new defense strategy for your organization: canary session cookies to detect and mitigate this attack method. . . |
|
| 1:45Presentation: Protecting the Digital Supply Chain: A Holistic Approach The global supply chain has become increasingly interconnected and reliant on digital technologies. This interconnectedness, while enabling efficiency and innovation, also exposes organizations to a wide range of cyber threats. This session will delve into the critical aspects of securing the digital supply chain, exploring strategies to mitigate risks and ensure business continuity. . ● Identify emerging threats and vulnerabilities that target supply chains ● Enhance visibility into the supply chain to detect and respond to potential threats ● Explore the role of emerging technologies like blockchain and AI in securing the supply chain . |
|
| 2:15Presentation: When Email Threats Are Personalized But Your Defenses Aren't: The Architecture Problem in Modern Email Security Generative AI enables attackers to craft highly personalized email threats in hours, yet most organizations rely on centralized security that treats every company identically. This talk examines why standardized detection fails against context-aware attacks, how uniform defenses struggle when threats evolve faster than systems can adapt, and why the centralized security model may be structurally incompatible with AI-powered threats. . |
|
| 2:25Presentation: Getting Ready for AI: Navigating the Future Understanding the impact of AI on cybersecurity is paramount. In this session, we explore essential insights into preparing for the AI-driven landscape, with a critical focus on cyber resilience. Join to gain a comprehensive understanding of how to navigate the future with AI, ensuring your organization is not just prepared, but fortified against the cybersecurity challenges ahead. . ● Hear how to utilize AI for both defense and offensive security against adversaries ● Identify new cybersecurity vulnerabilities develop strategic advantages with emerging AI integration across industries ● Develop strategies to strengthen cybersecurity frameworks, data governance, and incident response plans in an AI-infused environment . |
|
| 3:00Networking Break | |
| 3:40Presentation: People Power: Leveraging the Human Factor to Mitigate Cyber Risk Cyber threats are constantly evolving, and while technology plays a vital role in our defense, the human factor remains the greatest asset – and source of risk – in our network. In this session, we look at how understanding human strengths and weaknesses can significantly mitigate cyber risk, and how the security leader can leverage this. . ● Empower leaders and employees to make better informed decisions and become the first line of defense ● Moving from awareness to enablement – make your security measures truly user-friendly and promote positive security behavior ● How to build a culture-driven cybersecurity program by transparency, accountability, and empowerment . . |
|
| 4:10Roundtables: Choose 1 of the 5 Following Discussions T1: Security Debt: The Next Tech Debt Crisis No One’s Tracking . T2: Cloud Security: How are Risk, Cost, and Long-Term Value Shaping Your Supplier Choices . T3: How can Organizations Balance the Need for Robust Security with User Convenience and Productivity? . T4: What are the Uses and Applications of Artificial Intelligence in Cybersecurity? . T5: How Should We Govern Data in the Age of AI |
|
| 4:50Closing Remarks | |
| 5:00Drinks Reception | |