Date & Time:
Tuesday, June 16, 2026
08:30 - 17:00

Venue:
TBA

A Different Kind of Security Event

The Infosec Anti-Summit challenges the status quo by creating a space for CISOs and security leaders to engage, collaborate, and share real-world experience.

Through a series of hands-on workshops, tabletop exercises, mock scenarios, and peer-led discussions, the Anti-Summit encourages maximum exchange of ideas in a setting built for trust, candor, and community.

This is not about watching from the sidelines, it is about being part of the conversation. It's not about people on stage talking at the audience, it's about getting people around the table talking with each other.

Identify the challenges. Understand how others are solving them. Develop a strategy to safeguard.

Welcome to the Anti-Summit.

What to Expect at the
Anti-Summit

CISO-Led Agenda

Step into the action with a collaborative TTX simulation designed to test response, resilience, and teamwork. Continue your day with hands-on sessions built around real-world challenges, led by peers who’ve been in the hot seat.

The Cyber Arcade

A live, interactive space where emerging founders, security innovators, and practitioners collide. Test-drive new ideas, swap feedback, and see what’s next without the sales pitch.

Connection Over Convention

Honest, peer-drive discussions about what’s working and what’s not in today’s security landscape. From hallway chats to post-session conversations, it’s all about the people at the InfoSec Anti-Summit.

Full Agenda Coming Soon!


Registration & Breakfast

08:30 - 09:30

Opening Remarks

09:30 - 09:40

Tabletop Exercise

09:40 - 10:40

Ghost in the Machine: AI Threat Response
This interactive tabletop exercise challenges participants to respond to a sophisticated, multi-vector incident that targets their AI infrastructure through unexpected attack surfaces. Your customers look to you to lead in times of disruption and crisis. This exercise will challenge traditional thinking and disrupt the approach to incident and crisis management.

Workshops (Choose Your Adventure)

10:50 - 11:20

Workshop #1: Offensive Security: Red Team as a Strategy in the Age of Weaponized AI
Point-in-time testing was built for a slower threat landscape. Today's adversaries don't wait for your annual engagement window - AI has given them speed, scale, and automation that most red team programs weren't designed to match. This workshop challenges security leaders to stop treating offensive security as a calendar event and start running it as a continuous strategic function. We'll work through how AI is changing the attack surface, where traditional red team models are leaving you exposed, and what it takes to build a program that finds every exploitable path before someone else does. Come ready to rethink the model — and leave with a clear view of what relentless, cross-domain offensive security actually looks like in practice.

Workshop #2: Is Your Brand Protected In The Era of The Agentic Internet?
Bad bots now make up 37% of all internet traffic. AI bot activity has surged 300% in the past year. Adversaries are no longer just human, they are coordinated, autonomous agent networks impersonating your brand, targeting your executives, and harvesting your customers' credentials at machine speed. This workshop challenges CISOs to honestly assess whether their threat intelligence and digital risk protection capabilities can detect, prioritize, and dismantle these attacks, before people get hurt.

Anti-Roundtable

11:35 - 12:20

When the Network Becomes the Security Model: Rethinking How Teams Control the Edge
Legacy security architectures were built for a world where traffic flowed through predictable paths. AI workloads, shadow SaaS, and distributed teams are rapidly breaking those assumptions. In this roundtable, we'll work through real uses such as discovering when controls are blind to a category of AI-generated data movement. Where are the gaps most organizations aren't measuring? And what does a realistic modernization path look like, given the budget, staffing, and political constraints most CISOs are navigating right now? Come ready to work through the problem with your peers.

CISO-Led Workshops (Choose Your Adventure)

12:30 - 13:00

Workshop #1: Next-Gen Talent and the Human Risk Shift
A lot of people are told to “step up” in security, but no one shows them how. This session is built for the folks who didn’t grow up in big enterprises, don’t sit in boardrooms, and want to learn directly from CISOs who have the scars to prove what works.

We’ll talk about influencing senior leadership when you’re early in your career, finding talent in unconventional places, and building relationships with local schools to grow a wider, more diverse pipeline. We’ll also dig into the shift away from old-school security awareness toward human risk management, and what that means for teams of every size. If you’re looking for real examples instead of theory, this is your room.

Workshop #2: The People Are Still The Point. Talent, Trust, and Leadership in An AI-Driven World
Tech gets most of the attention, but people are doing the real work. As AI changes the shape of entry-level roles and automates the tasks many teams used to rely on for training, security leaders are asking a new set of questions: How do we grow talent now? What should the first years of a security career look like? And how do we build programs that rely more on partnership with the business than deep technical specialization?
This session digs into the leadership challenges ahead, including how to develop employees when early tasks are automated, how to find talent in unconventional places, how to shape a security program around human strengths such as creativity and empathy, and how to guide responsible AI use without slowing the business down. If you prioritize the “people side” of cyber, this is your room.

Lunch

13:00 - 14:00

Anti-Roundtable

14:05 - 14:50

The Week-Old Pen Test: Are We Exposed?
Your penetration test wrapped one week ago. No critical findings. Then a critical CVE drops in a third-party component sitting in your environment, and suddenly that clean report means nothing. This roundtable puts participants across security, engineering, risk, and communications in the hot seat. Visibility gaps, incomplete coverage, post-assessment config changes — the scenario gets messier as the clock runs out and external pressure builds. Decisions have to be made before the answers are in. The lesson isn't about the vulnerability. It's about the dangerous comfort of a recent assessment. Participants leave with a sharper understanding of where point-in-time testing creates false confidence — and what a more defensible validation posture actually looks like.

Workshops (Choose Your Adventure)

15:00 - 15:30

Workshop #1: Rethinking GRC with Actionable Data
GRC programs are often weighed down by disjointed tools and outdated workflows. Static reports and manual processes make it difficult to keep pace with today’s dynamic risk environment. This session explores how a modern Compliance OS can bring structure and clarity to your GRC strategy. Learn how continuous monitoring, integrated applications, and real-time data can streamline audits, improve decision-making, and unlock greater value from your compliance investments. Walk away with a clearer path to building a GRC program that works with your tech stack, not against it.

Workshop #1: Identity Security in Practice: Moving Beyond Visibility to Control
Many organizations have strong visibility into identity and access, but far less confidence in their ability to actually control it. This workshop will focus on how security teams are managing access in practice across SaaS, non-human identities, and constantly changing environments. We will compare what is working, where traditional approaches fall short, and how teams are evolving beyond static roles and periodic reviews to achieve more reliable control over access.

CISO-Led Workshops (Choose Your Adventure)

15:45 - 16:15

Workshop #1: Kill the Dashboard: Managing Risk by the Dollar, Not the Color
The Board is officially deaf to "Red/Yellow/Green" heat maps and 1,000-page vulnerability reports that offer no business context. This session is a masterclass in the brutal translation of cyber risk into financial exposure. Move beyond the jargon to see how top-tier CISOs use risk quantification to win budget battles and force the business to own the decisions they make. It’s time to stop reporting on activity and start driving the ROI of enterprise resilience.

Workshop #2: Agentic AI and the Death of the SOC Playbook
Traditional security operations centers are drowning in the sheer speed of AI-orchestrated attacks that move faster than a human can track. The shift from "Human-in-the-loop" to "Human-on-the-loop" security is no longer optional; it is a survival requirement. Explore the high-stakes reality of deploying autonomous defense agents and the governance gaps created when machines start making tactical decisions. Stop trying to out-hire the problem and start architecting a system that out-thinks the adversary.

Cyber Arcade & Happy Hour

16:20 - 17:30

After-Summit Dinner

17:30 - 21:00

Time to unwind and enjoy some great company after a successful day. No more work related discussions, just good food and good people. Perfect.

Past Voices Of The Anti-Summit


Parrish Gunnels

Tazin Khan

Nate Vanderheyden

Josh Copeland

Terry O’Daniel

Davin Darnt

Michael Madero

Christina Morillo

Jameeka Aaron Green

Cyrus Tibbs

Lead Sponsors

Supporting Sponsors

Are you ready to flip the summit script?