Roopak Patel
10:00 am - 10:50 am
As artificial intelligence reshapes both cybersecurity defenses and attack strategies, identity security has become the last stronghold against breaches. With stolen credentials playing a role in nearly one-third of cyberattacks, organizations must rethink how they secure human and machine identities. This presentation explores the evolving threat landscape, where AI is not only a tool for defenders but also an asset for adversaries. We'll examine how AI-driven cyber threats are increasing in sophistication and how organizations can leverage AI-powered identity security solutions—including Privileged Access Management (PAM), Cloud Infrastructure Entitlement Management (CIEM), and Identity Threat Detection & Response (ITDR)—to mitigate risk. Key topics include AI's role in risk scoring, dynamic policy enforcement, and real-time anomaly detection in privileged access.
Roopak Patel has over a decade of experience in IT Security, with a focus on delivering security, identity, and networking solutions to enterprises, mid-market, and SMBs. He has led product management teams across domains including advanced malware detection, identity and access management, application performance, networking optimization, and security analytics. Before entering the industry, Roopak served as a naval officer in the U.S. submarine force. He holds a B.S. in Mechanical Engineering from the University of Michigan, an MBA from Santa Clara University, and maintains CISSP and SAFE certifications. At Delinea, Roopak advances the Privileged Access Management portfolio to protect servers, workstations, and cloud assets, while shaping broader strategies around identity and data security. Outside of work, he enjoys exploring coastal trails, lighthouses, and historic sites with his spouse, 16-year-old twins, and two Havanese dogs.
Kevin Reardon
11:00 am - 11:50 am
Stolen credentials are one of the most common ways attackers break into organizations—and often through partners or vendors. This session explores the real risks behind compromised usernames and passwords, how attackers steal them, and why identity is often the weakest link. We’ll look at common attack methods like phishing, MFA fatigue, and supply chain breaches where one compromised partner account can open the door to many. We will share how the Enterprise Browser can help protect against compromised credential exploitation.
Kevin Reardon is the Vice President of Advisory and Architecture at Island. His 25+ year career features diverse roles, including those as a cyber security operator, consultant, and executive (both CISO and COO). Kevin was most recently the COO of ZeroFox where, over four and a half years, he built and scaled the company and operational environment through their recent acquisition. Prior to ZeroFox, Kevin held roles at McAfee, Intel, Blue Coat, and Symantec.
1:00 pm - 1:50 pm
Ben Wilcox
2:00 pm - 2:50 pm
You can’t stop AI adoption. But unchecked AI usage puts your data, identities, and compliance at risk. In this session, you will see a Microsoft-centric roadmap that makes safe AI adoption possible and manageable. IT and security leaders will leave with practical steps they can apply right away to reduce risk and get more value from their Microsoft investments. You will learn how to:
Ben Wilcox is Chief Technology Officer and Chief Information Security Officer at ProArch. Ben brings over 25 years of leadership in technology strategy and cybersecurity with a focus on Microsoft. In his dual roles, Ben drives innovation and resilience by architecting solutions that advance business outcomes and embedding cybersecurity into organizational culture.