
Thank you for Registering
We look forward to seeing you there.
Vulnerability Lifecycle: From
Misconfig to Mitigation
Discover how vulnerabilities arise, persist, and escalate—and how to reduce risk before attackers exploit them.
Prepare for what’s next in cloud security with insights and strategies straight from the experts.
Ron Eddings - Hacker Valley
Learn how applying advanced frameworks can lead to more proactive cloud risk management.
Sarah Currey - AWS
Discover how to upskill in cloud security, inspire others to champion security, and implement tactics to reduce burnout on your security teams.
John Pease - SentinelOne
See how vulnerabilities and misconfigs emerge, persist, and escalate—and explore tactics to reduce risk before attackers exploit them.
Neil Daswani - Stanford
Insecure cloud infrastructure undermines AI security. See what we can learn from recent AI breaches, leaks, and outages to prevent future failures.
Ramesh Chidirala - AWS
Explore agile incident response strategies to secure the cloud from an experienced enterprise solutions architect.
Joe Dimasi - SentinelOne
Learn to secure LLMs end-to-end and map threats like prompt injection, data poisoning, and exfiltration to layered controls.
We look forward to seeing you there.
Connect 1:1 with a product expert to see how an AI-powered CNAPP from SentinelOne can help you protect your entire cloud estate from build time to runtime.