The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption
In an era of geopolitical tensions and climate change, AI-driven cyber strategy helps build resilient defenses and ensure continuity.
Date and time
Location
Las Positas College - Building 2400 - Lot E
2400 Campus Loop Livermore, CA 94551Agenda
8:00 AM - 8:50 AM
Breakfast and Registration
8:50 AM - 9:00 AM
Greetings from the ISC2 East Bay Chapter
9:00 AM - 9:30 AM
Session One: The AI Supply Chain: A National Security Imperative
Bob Kolasky, Exiger
9:45 AM - 10:15 AM
Session Two: The Invisible Threat Layer: Harnessing AI and Practical Physics
Yossi Applebaum, Sepio
10:15 AM - 10:45 AM
Session Three: Resilience in the Deep Fake Face of AI Cybercrime
Dr. Alissa Abdullah (Dr. Jay), Mastercard
10:50 AM - 11:25 AM
Session Four: Beyond the Benchmark: AI's Role in Resilient Cybersecurity
Indus Khaitan, Redblock
11:30 AM - 12:00 PM
Session Five: Beyond Tech: Building Resilient Security Culture
Juliet Okafor, JD, RevolutionCyber
12:00 PM - 1:00 PM
Lunch
1:00 PM - 1:45 PM
Keynote - Session Six: Cybersecurity and Privacy Policy
Jim Dempsey, IAPP Cybersecurity Law Center
1:45 PM - 2:30 PM
Session Seven: Investing in the Future of AI-Driven Security
Ali Bouhouch, The Good Data Factory
2:30 PM - 4:30 PM
Cake Break, Socializing, Panels
3:00 PM - 3:45 PM
Session Eight (Panel A): The Intersection of Geopolitics and Cyber
Tolgay Kizilelma, Ph.D.
3:45 PM - 4:30 PM
Session Eight (Panel B): AI vs. AI
Stephen Bartolini, NextPeak
4:30 PM - 5:00 PM
The Wrap Up
Good to know
Highlights
- 9 hours
- In person
Refund Policy
About this event
NOTE: To access discounted rates, you must first register in the ISC2 East Bay member and guest management system. After registering, your email address will be your access code to access tickets according to your membership type. You can become a member or confirm your membership details here: https://app.joinit.com/o/isc2-east-bay/
Welcome to The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption event! Join us at Las Positas College on November 14, 2025, at 8:00 AM (Pacific Time)
About your day: The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption
The ISC2 East Bay Chapter invites cybersecurity professionals, leaders, and enthusiasts to "The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption," a pivotal conference taking place on Friday, November 14th, 2025, at Las Positas College in Livermore, CA. In an escalating global landscape marked by geopolitical tensions and climate change impacts, this event delves into leveraging artificial intelligence to forge resilient, long-term cybersecurity strategies. Attendees will gain actionable insights into navigating complex risks, mitigating climate-related cyber threats, and harnessing AI's power to anticipate and counter evolving challenges, ensuring business continuity and a secure future.
The conference boasts an impressive lineup of thought leaders. Bob Kolasky, SVP Critical Infrastructure Sectors at Exiger, will kick off the day by exploring "The AI Supply Chain: A National Security Imperative," focusing on proactive risk management in an AI-driven world. Following this, Yossi Applebaum, CEO of Sepio, will unveil "The Invisible Threat Layer," demonstrating how AI and practical physics secure hardware for the long game. Dr. Alissa Abdullah (Dr. Jay), SVP, Emerging Corporate Security Solutions and CISO at Mastercard, will address "Resilience in the Deep Fake Face of AI Cybercrime," providing strategies for navigating this emerging threat. Indus Khaitan, Founder and CEO of Redblock, will present "Beyond the Benchmark: AI’s Role in Resilient Cybersecurity," showcasing how AI drives proactive risk management and rapid recovery. Finally, Juliet Okafor, JD, CEO of RevolutionCyber and an accomplished author, will discuss "Beyond Tech: Building Resilient Security Culture and Rapid Response for the AI Era," emphasizing the human element in cyber resilience.
Jim Dempsey, Managing Director of the IAPP Cybersecurity Law Center, will deliver the conference Keynote Address at 1 PM. This highly anticipated address, "Cybersecurity and Privacy Policy: Analysis of Executive Actions and Legislation in the 47th Presidential Term and 119th Congressional Session," provides unparalleled insight into the evolving policy landscape. This session will offer a profound examination of what has changed and what has continued from previous administrations, the influence of competition with China, the development of offensive cyber operations, and emerging regulatory approaches. Attendees will gain a deep understanding of the long-term strategic considerations essential for navigating the complex and rapidly changing cyber and data governance environment, including AI-driven cybersecurity strategies and data privacy regulations.
Our afternoon agenda includes two expert panel conversations, featuring distinguished leaders, some familiar and some new, who are known for steering today's most respected and accomplished cybersecurity enterprises. Tolgay Kizilelma, Ph.D., will moderate "The Intersection of Geopolitics and Cyber: Strategies for Mitigating Global Threats," while Stephen Bartolini from NextPeak will lead "AI vs. AI: The Evolving Landscape of AI-Driven Cyber Warfare," offering diverse perspectives on critical cybersecurity challenges.
The hallmark feature of "The Long Game" conference is the "Cyber Emergency Kit" activity. Attendees with a Full Day Pass, or those who select a Networking Pass option that includes it, will receive a branded backpack, which they fill with essential tools and resources contributed by a diverse array of vendors. This interactive element provides tangible assets for long-term cyber resilience and incident response, creating a personalized collection of actionable insights and practical utilities. Participating vendors represent a broad spectrum of cybersecurity solutions, including:
Platinum Sponsors
- Astrix Security: Specializes in securing non-human identities and SaaS-to-SaaS connectivity, providing comprehensive visibility and enforcement of adaptive policies to prevent data breaches across automated processes.
- Stellar Cyber: Pioneers an Open XDR platform that unifies security operations across the entire attack surface (network, endpoint, cloud, applications). It uses advanced AI to automatically detect sophisticated threats and accelerate incident response from a single, integrated pane of glass.
- Intezer: Leverages proprietary AI and genetic analysis to automate and streamline core SOC tasks. Its platform automatically triages and investigates security alerts, accurately identifies malicious code by comparing it to known code families, and accelerates incident response.
Gold Sponsors
- RevolutionCyber: A boutique firm focused on cybersecurity and resilience consulting that drives cultural transformation and aligns security with core business outcomes, enhancing security culture and rapid incident response.
- Exiger: Provides an AI-powered supply chain and third-party risk management platform that illuminates, analyzes, and mitigates complex risks across the extended enterprise, enabling proactive and resilient risk management.
- Sepio: Offers a Hardware Access Control (HAC) and asset visibility platform that provides actionable insights to continuously manage the risk of all known and shadow assets across IT, OT, and IoT environments, defending against “invisible threat layers.”
- Summit 7: Specializes in DIB cybersecurity compliance, with a core focus on CMMC (Cybersecurity Maturity Model Certification) and robust Microsoft 365 security solutions for the defense industrial base.
Silver Sponsors
- BalkanID provides modular, AI-assisted Identity Security and Access Governance (IGA) solutions for connected and disconnected applications. Their platform streamlines critical tasks like user access reviews, lifecycle automation with just-in-time access, and IAM risk analysis using a Copilot feature. This empowers teams to efficiently enforce least privilege principles and manage complex identity risk.
- Happiest Minds Technologies: A global IT services company leveraging cutting-edge digital transformation technologies (cloud, cybersecurity, analytics, IoT) to drive enterprise success and optimize operational efficiency with human-centric solutions.
- Horizon3.ai provides NodeZero, an autonomous penetration testing platform. It continuously assesses the attack surface, automatically discovers and verifies exploitable weaknesses, and provides actionable remediation steps to proactively strengthen security posture.
- Illumio provides Zero Trust Segmentation to prevent the lateral movement of breaches across complex hybrid environments (data centers, multi-cloud, endpoints), enhancing cyber resilience by reducing the attack surface.
- NetAlly offers portable network testing and analysis solutions essential for troubleshooting connectivity issues, precisely validating network performance, and verifying security configurations in complex wired and wireless infrastructures.
- One Identity offers comprehensive identity and access management (IAM) solutions (IGA, PAM, Access Management) that provide a unified platform for managing identities, governing access, and securing privileged accounts to enforce least privilege principles.
- Redblock’s Agentic AI automates identity and security tasks across disconnected applications. The platform extends SailPoint and other identity systems to achieve full coverage—without relying on APIs, scripts, or tickets. In essence, it transforms manual identity workflows into autonomous, auditable actions.
- StrongDM offers a unified platform for managing and auditing access to all critical infrastructure (servers, databases, applications). It enforces granular, least-privilege policies and meticulously logs every session for comprehensive security and compliance.
- Symmetry Systems specializes in Data Security Posture Management (DSPM). Its platform discovers and classifies sensitive data across cloud and on-premise stores, monitors access patterns, and identifies misconfigurations to reduce exposure and ensure compliance.
- The Good Data Factory enables the transformation of raw security data into actionable intelligence using advanced analytics. Its platform helps identify hidden patterns, predict potential threats, and optimize security operations through data-driven insights.
This hands-on experience, combined with networking opportunities and volunteer time can earn up to 13 CPEs for full participation, ensures attendees leave with both knowledge and practical tools to navigate the complex cybersecurity landscape.
Frequently asked questions
Organized by
Followers
--
Events
--
Hosting
--