Troels Emil Hojlund-Rasmussen
10:00 am - 10:50 am
Step into a chilling, interactive cybersecurity experience where every decision could mean the difference between containment and catastrophe. In this session, attendees will follow the journey of Sarah, a junior security analyst, as she uncovers a vulnerability that spirals into a full-blown ransomware attack. Through branching decision points, participants will explore the consequences of common security choices — from quarantine protocols and ticketing delays to backup misconfigurations and BYOD risks. This immersive “choose-your-own-adventure” format highlights how small missteps can compound into major breaches, and how layered security, policy enforcement, and incident response readiness are critical to survival. Attendees will encounter a rogues’ gallery of IT monsters — from unmanaged devices and shadow IT to credential abuse and backup sabotage — and learn how to hunt them before they strike. Whether you're an MSP, IT leader, or security professional, this session will challenge your instincts, expose hidden gaps in your security stack, and offer practical strategies to build resilience against modern threats. Are you ready to enter the nightmare?
Troels is tenured software executive having worked at companies such as Dentsu International and held various roles at Microsoft centered around growing and the Microsoft Cloud suite predominately Azure. He's been with N-able for the past 7+ years and is currently the general manager of N-able security business and heads up corporate development. Getting companies above the security poverty line and ensuring they're better armored for facing the ever evolving threat landscape is his primary focus.
Randal T. Rioux
11:00 am - 11:50 am
Traditional perimeter-based defenses can’t keep pace in today’s cloud-native, AI-driven landscape. This session introduces Cyber Risk Exposure Management (CREM) and its role in transforming how organizations identify, quantify, and prioritize threats. Learn how Trend Micro Vision One integrates AI not only for detection, but also for risk scoring, prediction, and proactive response. We’ll explore how CREM translates technical exposure into business impact, guiding smarter resource allocation and executive-level decision making. See how AI-driven forecasting of likely attack paths enables security teams to stay ahead of adversaries, strengthen resilience, and demonstrate measurable value to the business.
Randal is a seasoned security practitioner and Solutions Engineer at Trend Micro, with a career spanning high-visibility roles at NASA, the U.S. Department of Defense, Tenable, Splunk, NVIDIA, and Red Hat. His expertise ranges from hacking pacemakers to cryptography, and from securing unconventional systems to driving strategic security architecture. Randal has led initiatives across SOC, PSIRT, CSIRT, DFIR, Threat Intelligence, and Vulnerability Management, while advancing the use of GPU and high-core-count CPU acceleration for anomaly detection, password cracking, and predictive analytics. As both advisor and engineer, he is dedicated to strengthening organizational resilience through innovative, data-driven security practices.
Scott Bryant
1:00 pm - 1:50 pm
The browser has become the new enterprise perimeter. It’s where employees access cloud apps, move data, and get work done — yet it remains one of the most under-defended layers in security. Traditional tools weren’t built to see or control what happens inside the browser, creating a blind spot attackers are actively exploiting. Today’s adversaries aren’t hacking in — they’re logging in. By phishing credentials, stealing tokens, or hijacking sessions, attackers can slip into apps through the browser and move quickly to sensitive systems, admin panels, and data stores — no malware required. AI-driven phishing and shadow SaaS adoption only expand the attack surface, while real-time attacks often finish before legacy monitoring tools can even react. This session will explore how defenders can reframe their approach, treating the browser as the new endpoint, to detect and stop identity-driven attacks before they become costly breaches.
Scott Bryant is a seasoned security engineer with nearly a decade in the computer software and cybersecurity industries, specializing in identity security as well as endpoint and extended detection and response (XDR). As the lead senior solutions engineer at Push Security, he provides pre-sales technical support to sales teams and customers, assisting with proof-of-concepts, deployment planning, and technical consulting engagements.
2:00 pm - 2:50 pm