The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption

The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption

In an era of geopolitical tensions and climate change, AI-driven cyber strategy helps build resilient defenses and ensure continuity.

By ISC2 East Bay Chapter

Date and time

Location

Las Positas College

3000 Campus Hill Drive Livermore, CA 94551

Refund Policy

Refunds up to 7 days before event

Agenda

8:00 AM - 8:50 AM

Breakfast and Registration


Pick up your badge, ribbons, and optional pre-ordered “Long Game: Cyber Emergency Kit Backpack.” Throughout the day, as you visit each vendor, your bag gets a variety of books, tools, and swag. At th...

8:50 AM - 9:00 AM

Greetings from the ISC2 East Bay Chapter


Welcome Students, Entrepreneurs, Civic, Business, and Education Leaders, Cyber Professionals, Job Seekers. We are pleased to share a brief discussion of the ISC2 East Bay Chapter Mission, Rules for o...

9:00 AM - 9:30 AM

Session One: The AI Supply Chain: A National Security Imperative

Bob Kolasky, Exiger


Navigating escalating cyber threats and complex global interdependencies, this session will delve into proactively managing pervasive supply chain risks. Bob Kolasky will explore the pivotal role of ...

9:45 AM - 10:15 AM

Session Two: The Invisible Threat Layer: Harnessing AI and Practical Physics

Yossi Applebaum, Sepio


This session delves into the often overlooked physical layer of cybersecurity, learning how advanced AI and novel approaches rooted in practical physics transform the way organizations identify, mana...

10:15 AM - 10:45 AM

Session Three: Resilience in the Deep Fake Face of AI Cybercrime

Dr. Alissa Abdullah (Dr. Jay), Mastercard


Dr. Alissa Abdullah (Dr. Jay), is Mastercard’s deputy chief security officer. In this role, she leads the Emerging Corporate Security Solutions team and is responsible for protecting Mastercard’s inf...

10:50 AM - 11:25 AM

Session Four: Beyond the Benchmark: AI's Role in Resilient Cybersecurity

Indus Khaitan, Redblock


In a landscape where traditional security measures are often insufficient against sophisticated threats, building truly resilient cybersecurity requires moving “beyond the benchmark.” Indus Khaitan, ...

11:30 AM - 12:00 PM

Session Five: Beyond Tech: Building Resilient Security Culture

Juliet Okafor, JD, RevolutionCyber


In today’s dynamic threat landscape, effective cybersecurity extends beyond technology alone. This session, led by Juliet Okafor, CEO of RevolutionCyber, will explore the critical role of human-centr...

12:00 PM - 1:00 PM

Lunch

1:00 PM - 1:45 PM

Keynote - Session Six: Cybersecurity and Privacy Policy

Jim Dempsey, IAPP Cybersecurity Law Center


This keynote address will analyze the evolving cybersecurity and privacy policy landscape, focusing on potential executive actions and legislative initiatives within the 47th Presidential Term and th...

1:45 PM - 2:30 PM

Session Seven: Investing in the Future of AI-Driven Security

Ali Bouhouch, The Good Data Factory


The cybersecurity landscape is at an AI inflection point, driven by the convergence of large language models (LLMs), agentic-event-driven security automation, and API-first architectures, making real...

2:30 PM - 4:30 PM

Cake Break, Socializing, Panels

3:00 PM - 3:45 PM

Session Eight (Panel A): The Intersection of Geopolitics and Cyber

Tolgay Kizilelma, Ph.D.


Tolgay Kizilelma, Ph.D. is a business-driven IT/Cybersecurity GRC leader and trusted business partner with three decades of experience in education, healthcare, distribution, and government sectors. ...

3:45 PM - 4:30 PM

Session Eight (Panel B): AI vs. AI

Stephen Bartolini, NextPeak


Stephen Bartolini is an outcome-driven technology-risk management leader and Partner at NextPeak, adept at driving business transformation through reengineering and embracing cutting-edge technologie...

4:30 PM - 5:00 PM

Session Eight (Panel C): The Wrap Up


What You Placed in Your Bag, “The Long Game, Cyber Emergency Kit.” Conference Feedback Forms and Sharing What’s In The Bag

About this event

  • Event lasts 9 hours

Welcome to The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption event! Join us at Las Positas College on November 14, 2025, at 8:00 AM (Pacific Time)

NOTE: To access tickets, you must first register in the ISC2 East Bay member and guest management system. After registering, your email address will be your access code to access tickets according to your membership type. You can view your confirm your membership details here: https://app.joinit.com/o/isc2-east-bay/members

About your day: The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption

The ISC2 East Bay Chapter invites cybersecurity professionals, leaders, and enthusiasts to "The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption," a pivotal conference taking place on Friday, November 14th, 2025, at Las Positas College in Livermore, CA. In an escalating global landscape marked by geopolitical tensions and climate change impacts, this event delves into leveraging artificial intelligence to forge resilient, long-term cybersecurity strategies. Attendees will gain actionable insights into navigating complex risks, mitigating climate-related cyber threats, and harnessing AI's power to anticipate and counter evolving challenges, ensuring business continuity and a secure future.

The conference boasts an impressive lineup of thought leaders. Bob Kolasky, SVP Critical Infrastructure Sectors at Exiger, will kick off the day by exploring "The AI Supply Chain: A National Security Imperative," focusing on proactive risk management in an AI-driven world. Following this, Yossi Applebaum, CEO of Sepio, will unveil "The Invisible Threat Layer," demonstrating how AI and practical physics secure hardware for the long game. Dr. Alissa Abdullah (Dr. Jay), SVP, Emerging Corporate Security Solutions and CISO at Mastercard, will address "Resilience in the Deep Fake Face of AI Cybercrime," providing strategies for navigating this emerging threat. Indus Khaitan, Founder and CEO of Redblock, will present "Beyond the Benchmark: AI’s Role in Resilient Cybersecurity," showcasing how AI drives proactive risk management and rapid recovery. Finally, Juliet Okafor, JD, CEO of RevolutionCyber and an accomplished author, will discuss "Beyond Tech: Building Resilient Security Culture and Rapid Response for the AI Era," emphasizing the human element in cyber resilience.

Jim Dempsey, Managing Director of the IAPP Cybersecurity Law Center, will deliver the conference Keynote Address at 1 PM. This highly anticipated address, "Cybersecurity and Privacy Policy: Analysis of Executive Actions and Legislation in the 47th Presidential Term and 119th Congressional Session," provides unparalleled insight into the evolving policy landscape. This session will offer a profound examination of what has changed and what has continued from previous administrations, the influence of competition with China, the development of offensive cyber operations, and emerging regulatory approaches. Attendees will gain a deep understanding of the long-term strategic considerations essential for navigating the complex and rapidly changing cyber and data governance environment, including AI-driven cybersecurity strategies and data privacy regulations.

Our afternoon agenda includes two expert panel conversations, featuring distinguished leaders, some familiar and some new, who are known for steering today's most respected and accomplished cybersecurity enterprises. Tolgay Kizilelma, Ph.D., will moderate "The Intersection of Geopolitics and Cyber: Strategies for Mitigating Global Threats," while Stephen Bartolini from NextPeak will lead "AI vs. AI: The Evolving Landscape of AI-Driven Cyber Warfare," offering diverse perspectives on critical cybersecurity challenges.

The hallmark feature of "The Long Game" conference is the "Cyber Emergency Kit" activity. Attendees with a Full Day Pass, or those who select a Networking Pass option that includes it, will receive a branded backpack, which they fill with essential tools and resources contributed by a diverse array of vendors. This interactive element provides tangible assets for long-term cyber resilience and incident response, creating a personalized collection of actionable insights and practical utilities. Participating vendors represent a broad spectrum of cybersecurity solutions, including: Astrix Security (securing non-human identities and SaaS connectivity), BigID (AI-powered data discovery, classification, and privacy), BreachRX (AI-powered incident response management), Exiger (AI-powered supply chain and third-party risk management), Horizon3.ai (autonomous penetration testing), Illumio (Zero Trust Segmentation), Intezer (automating threat triage and investigation), NetAlly (portable network testing and analysis), One Identity (comprehensive identity and access management), Redblock (AI-driven data backup and recovery), RevolutionCyber (human risk management and security culture transformation), Semperis (Active Directory protection and recovery), Sepio (Hardware Access Control and asset visibility), StellarCyber (Open XDR platform for unified security operations), StrongDM (unified infrastructure access management and auditing), Summit 7 (DIB cybersecurity compliance and Microsoft 365 security), Symmetry Systems (Data Security Posture Management - DSPM), The Good Data Factory (data analytics for rapid cyber incident assessment), and Trace3 (IT solutions and consulting for cloud, security, and data intelligence). This hands-on experience, combined with networking opportunities and up to 13 CPEs for full participation, ensures attendees leave with both knowledge and practical tools to navigate the complex cybersecurity landscape.

Frequently asked questions

Where is parking located?

Park in Lot B, facing Building 1000. Follow ISC2 Event signs to Room 1011. Parking is free.

What room is the event located?

Room 1011 and the surrounding lobbies and classrooms at Las Positas College.

Will food be provided?

Full pass tickets include breakfast, lunch, and a cake break snacks throughout the afternoon. Networking passes are only eligible for the afternoon snacks.

Organized by