The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption
Overview
NOTE: To access discounted rates, you must first register in the ISC2 East Bay member and guest management system. After registering, your email address will be your access code to access tickets according to your membership type. You can become a member or confirm your membership details here: https://app.joinit.com/o/isc2-east-bay/
Welcome to The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption event! Join us at Las Positas College on November 14, 2025, at 8:00 AM (Pacific Time)
About your day: The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption
The ISC2 East Bay Chapter invites cybersecurity professionals, leaders, and enthusiasts to "The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption," a pivotal conference taking place on Friday, November 14th, 2025, at Las Positas College in Livermore, CA. In an escalating global landscape marked by geopolitical tensions and climate change impacts, this event delves into leveraging artificial intelligence to forge resilient, long-term cybersecurity strategies. Attendees will gain actionable insights into navigating complex risks, mitigating climate-related cyber threats, and harnessing AI's power to anticipate and counter evolving challenges, ensuring business continuity and a secure future.
The conference boasts an impressive lineup of thought leaders. Bob Kolasky, SVP Critical Infrastructure Sectors at Exiger, will kick off the day by exploring "The AI Supply Chain: A National Security Imperative," focusing on proactive risk management in an AI-driven world. Following this, Yossi Applebaum, CEO of Sepio, will unveil "The Invisible Threat Layer," demonstrating how AI and practical physics secure hardware for the long game. Dr. Alissa Abdullah (Dr. Jay), SVP, Emerging Corporate Security Solutions and CISO at Mastercard, will address "Resilience in the Deep Fake Face of AI Cybercrime," providing strategies for navigating this emerging threat. Indus Khaitan, Founder and CEO of Redblock, will present "Beyond the Benchmark: AI’s Role in Resilient Cybersecurity," showcasing how AI drives proactive risk management and rapid recovery. Finally, Juliet Okafor, JD, CEO of RevolutionCyber and an accomplished author, will discuss "Beyond Tech: Building Resilient Security Culture and Rapid Response for the AI Era," emphasizing the human element in cyber resilience.
Jim Dempsey, Managing Director of the IAPP Cybersecurity Law Center, will deliver the conference Keynote Address at 1 PM. This highly anticipated address, "Cybersecurity and Privacy Policy: Analysis of Executive Actions and Legislation in the 47th Presidential Term and 119th Congressional Session," provides unparalleled insight into the evolving policy landscape. This session will offer a profound examination of what has changed and what has continued from previous administrations, the influence of competition with China, the development of offensive cyber operations, and emerging regulatory approaches. Attendees will gain a deep understanding of the long-term strategic considerations essential for navigating the complex and rapidly changing cyber and data governance environment, including AI-driven cybersecurity strategies and data privacy regulations.
Our afternoon agenda includes two expert panel conversations, featuring distinguished leaders, some familiar and some new, who are known for steering today's most respected and accomplished cybersecurity enterprises. Tolgay Kizilelma, Ph.D., will moderate "The Intersection of Geopolitics and Cyber: Strategies for Mitigating Global Threats," while Stephen Bartolini from NextPeak will lead "AI vs. AI: The Evolving Landscape of AI-Driven Cyber Warfare," offering diverse perspectives on critical cybersecurity challenges.
The hallmark feature of "The Long Game" conference is the "Cyber Emergency Kit" activity. Attendees with a Full Day Pass, or those who select a Networking Pass option that includes it, will receive a branded backpack, which they fill with essential tools and resources contributed by a diverse array of vendors. This interactive element provides tangible assets for long-term cyber resilience and incident response, creating a personalized collection of actionable insights and practical utilities. Participating vendors represent a broad spectrum of cybersecurity solutions, including:
Platinum Sponsors
- Astrix Security: Specializes in securing non-human identities and SaaS-to-SaaS connectivity, providing comprehensive visibility and enforcement of adaptive policies to prevent data breaches across automated processes.
- Stellar Cyber: Pioneers an Open XDR platform that unifies security operations across the entire attack surface (network, endpoint, cloud, applications). It uses advanced AI to automatically detect sophisticated threats and accelerate incident response from a single, integrated pane of glass.
- Intezer: Leverages proprietary AI and genetic analysis to automate and streamline core SOC tasks. Its platform automatically triages and investigates security alerts, accurately identifies malicious code by comparing it to known code families, and accelerates incident response.
Gold Sponsors
- RevolutionCyber: A boutique firm focused on cybersecurity and resilience consulting that drives cultural transformation and aligns security with core business outcomes, enhancing security culture and rapid incident response.
- Exiger: Provides an AI-powered supply chain and third-party risk management platform that illuminates, analyzes, and mitigates complex risks across the extended enterprise, enabling proactive and resilient risk management.
- Sepio: Offers a Hardware Access Control (HAC) and asset visibility platform that provides actionable insights to continuously manage the risk of all known and shadow assets across IT, OT, and IoT environments, defending against “invisible threat layers.”
- Summit 7: Specializes in DIB cybersecurity compliance, with a core focus on CMMC (Cybersecurity Maturity Model Certification) and robust Microsoft 365 security solutions for the defense industrial base.
Silver Sponsors
- BalkanID provides modular, AI-assisted Identity Security and Access Governance (IGA) solutions for connected and disconnected applications. Their platform streamlines critical tasks like user access reviews, lifecycle automation with just-in-time access, and IAM risk analysis using a Copilot feature. This empowers teams to efficiently enforce least privilege principles and manage complex identity risk.
- Happiest Minds Technologies: A global IT services company leveraging cutting-edge digital transformation technologies (cloud, cybersecurity, analytics, IoT) to drive enterprise success and optimize operational efficiency with human-centric solutions.
- Horizon3.ai provides NodeZero, an autonomous penetration testing platform. It continuously assesses the attack surface, automatically discovers and verifies exploitable weaknesses, and provides actionable remediation steps to proactively strengthen security posture.
- Illumio provides Zero Trust Segmentation to prevent the lateral movement of breaches across complex hybrid environments (data centers, multi-cloud, endpoints), enhancing cyber resilience by reducing the attack surface.
- NetAlly offers portable network testing and analysis solutions essential for troubleshooting connectivity issues, precisely validating network performance, and verifying security configurations in complex wired and wireless infrastructures.
- One Identity offers comprehensive identity and access management (IAM) solutions (IGA, PAM, Access Management) that provide a unified platform for managing identities, governing access, and securing privileged accounts to enforce least privilege principles.
- Redblock’s Agentic AI automates identity and security tasks across disconnected applications. The platform extends SailPoint and other identity systems to achieve full coverage—without relying on APIs, scripts, or tickets. In essence, it transforms manual identity workflows into autonomous, auditable actions.
- StrongDM offers a unified platform for managing and auditing access to all critical infrastructure (servers, databases, applications). It enforces granular, least-privilege policies and meticulously logs every session for comprehensive security and compliance.
- Symmetry Systems specializes in Data Security Posture Management (DSPM). Its platform discovers and classifies sensitive data across cloud and on-premise stores, monitors access patterns, and identifies misconfigurations to reduce exposure and ensure compliance.
- The Good Data Factory enables the transformation of raw security data into actionable intelligence using advanced analytics. Its platform helps identify hidden patterns, predict potential threats, and optimize security operations through data-driven insights.
This hands-on experience, combined with networking opportunities and volunteer time can earn up to 13 CPEs for full participation, ensures attendees leave with both knowledge and practical tools to navigate the complex cybersecurity landscape.
Good to know
Highlights
- 9 hours
- In person
Refund Policy
Location
Las Positas College - Building 2400 - Lot E
2400 Campus Loop
Livermore, CA 94551
How do you want to get there?
Breakfast and Registration
Pick up your badge, ribbons, and optional pre-ordered “Long Game: Cyber Emergency Kit Backpack.” Throughout the day, as you visit each vendor, your bag gets a variety of books, tools, and swag. At the end of the day, events and further awards will focus on your key takeaways. Earn additional CPE and distinction by sharing how you might or already leverage what you now have “in the bag.” Coffee throughout the day is sponsored by One Identity. All meals are paid for by the entire list of sponsors and by a portion of each registration. Thank you to our sponsor and our members. Please visit the list of sponsoring vendors below.
Greetings from the ISC2 East Bay Chapter
Welcome Students, Entrepreneurs, Civic, Business, and Education Leaders, Cyber Professionals, Job Seekers. We are pleased to share a brief discussion of the ISC2 East Bay Chapter Mission, Rules for our day at Las Positas, expectations for the “In The Bag” activity, and a reminder about your mandatory feedback requirement.
Session One: The AI Supply Chain: A National Security Imperative
Navigating escalating cyber threats and complex global interdependencies, this session will delve into proactively managing pervasive supply chain risks. Bob Kolasky will explore the pivotal role of artificial intelligence and data-driven strategies, leveraging platforms like Exiger, to identify, assess, and mitigate vulnerabilities across the digital ecosystem. Attendees will gain insights into building resilient supply chains, strengthening third-party risk management, and fostering robust public-private partnerships vital for national and economic security. He will highlight actionable strategies for anticipating and addressing security needs, ensuring critical functions remain operational against cyber warfare and systemic disruptions, and demonstrating how advanced technology facilitates better risk outcomes. This discussion is vital for cybersecurity professionals and industry leaders, enhancing organizational cyber resilience.
Frequently asked questions
Organized by
Followers
--
Events
--
Hosting
--