Date & Time:
Tuesday, October 14
08:30 - 17:00

Venue:
Altar
230 Pine Avenue
Long Beach, CA
90802

A Different Kind of Security Event

The Infosec Anti-Summit challenges the status quo by creating a space for CISOs and security leaders to engage, collaborate, and share real-world experience.

Through series of hands-on workshops, tabletop exercises, mock scenarios, and peer-led discussions, the Anti-Summit encourages maximum exchange of ideas in a setting built for trust, candor, and community.

This is not about watching from the sidelines, it is about being part of the conversation. It's not about people on stage talking at the audience, it's about getting people around the table talking with each other.

Identify the challenges. Understand how others are solving them. Develop a strategy to safeguard.

Welcome to the Anti-Summit.

Agenda


Registration & Breakfast

08:30 - 09:30

Opening Remarks

09:30 - 09:40

Tabletop Exercise

09:40 - 10:40

Omni-channel threat response: A Tabletop Exercise for Business Resilience

Workshops (Choose Your Own Adventure)

10:50 - 11:20

Workshop #1: Outsmarting the Hackers’ Playbook
The age of big data was supposed to help us bring order to digital chaos. Instead, it’s become a double-edged sword—empowering hackers to exploit human behavior at scale. While traditional cybersecurity has focused on locking down systems, attackers have shifted their focus to the one vulnerability tech can’t patch: people.

This session explores the emotional drivers—curiosity, fear, trust—that make social engineering so effective, and why hardened infrastructure alone isn’t enough. Learn how reducing the number of decisions employees need to make can lower risk, and how to build defenses that account for the human operating system.

Because the future of security isn't just technical—it's psychological.

Workshop #2: Untangling SaaS & Identity Risk
SaaS sprawl is exploding—so are the hidden risks that come with it. From unsanctioned apps to unmanaged accounts, security teams are struggling to keep up with the shifting SaaS-Identity landscape.

This session dives into how modern security teams can regain visibility and control. Learn how to uncover risk-prone identities, close critical gaps, and prioritize access controls across your SaaS stack. It's not just about discovering risk—it’s about making it actionable.

Because you can’t protect what you can’t see.

Anti-Roundtable

11:35 - 12:20

Taming the Chaos of Identity Sprawl
Enterprises today are overwhelmed by identity sprawl—accounts and access scattered across SaaS tools, infrastructure, and legacy systems. Orphaned users, excessive permissions, and manual access reviews aren’t just inconvenient—they’re major security risks.

This session unpacks why identity compromise remains the leading cause of data breaches, and why old-school governance models can’t keep up. Explore how a modern, automated approach to managing access can reduce risk, cut through complexity, and finally bring order to the chaos.

Access shouldn't be the weakest link.

Workshops (Choose Your Own Adventure)

12:30 - 13:00

Workshop #1: Smarter Telemetry, Faster Response
Security and DevOps teams are drowning in data—and paying the price. As telemetry volumes grow, so do costs, noise, and time-to-resolution. Throwing more money at SIEM and log tools isn't sustainable.

This session explores how applying AI to your observability and security data can cut costs by over 50% and speed up incident resolution by 40% or more. Learn how to optimize your data streams to surface only what matters—making insights clearer, response times faster, and budgets more manageable.

More data shouldn't mean more problems.

Workshop #2: Securing Data in the the Age of AI
As organizations race to adopt AI, the volume and sprawl of sensitive data have exploded—bringing new challenges for security teams tasked with keeping it all in check. Traditional tools weren’t built for this scale, speed, or complexity.

This session looks at how precise data visibility paired with automated remediation can help organizations stay ahead of risk. Learn how to proactively manage data across platforms, reduce exposure, and unlock the full potential of AI—without compromising security.

Because in the AI era, data is power—and risk.

Lunch

13:00 - 14:00

Anti-Roundtable

14:05 - 14:50

Deepfakes, Scams, & the Human Firewall
AI-powered scams are escalating fast—voice cloning, video deepfakes, and identity spoofing are now tools of choice for targeting executives and employees alike. With just seconds of online content, attackers can convincingly impersonate almost anyone.

This session explores why traditional security training isn’t built for this reality—and what a modern, adaptive approach looks like. Learn how personalized, real-time education can help your team recognize and respond to emerging threats, before they turn into breaches.

It’s not just about awareness anymore—it’s about resilience.

Workshops (Choose Your Own Adventure)

15:00 - 15:30

To Be Announced

Vendor Arcade

15:30 - 16:30

Step into the Vendor Arcade - a casual, come-and-go space where you can explore tools and self-test-drive the latest products that actually solve problems. Play with it. Break it. Start again. And just like any normal arcade, there will be tickets and prizes up for grabs!

In association with:

Anti-Keynote

16:30 - 17:00

To Be Announced

After-Summit Dinner

17:30 - 21:00

Time to unwind and enjoy some great company after a successful day. No more work related discussions, just good food and good people. Perfect.

Past Voices From The Anti-Summit


Steve Hindle

Larry Whiteside

Aaron Katz

Yabing Wang

Renee Guttmann-Stark

Evelin Biro

Conor Sherman

Faisal Ansari

Justin Merhoff

Nick Leghorn

Lead Sponsors

Supporting Sponsors

Are you ready to flip the summit script?