Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fiat Frustration, Bitcoin Savings And Ether Payments

The discussion attacks fiat currency and argues for open digital money that works across borders without bank packages and profit driven fees. Bitcoin appears as long term store of value, with faster networks such as Ether handling daily transactions and travel friendly payments in a more consistent way.

1Password presents: Phishing prevention

AI-powered scams are making phishing attacks harder to spot than ever. In this demo, see how 1Password’s phishing prevention feature helps stop users before they share credentials with fraudulent websites. When a site’s URL doesn’t match a saved login, 1Password won’t autofill. Now, when a user tries to paste their credentials anyway, a warning prompts them to pause and take a closer look. This added layer of protection acts as a second pair of eyes at the moment it matters most.

Breaking Silos with SCDR: How SOCs & TPRM Teams Drive Integrated Cyber Strategies

Too often, vendor risk management operates in a silo, focused on compliance checkboxes, while the SOC team is on the frontlines of threat intelligence and response. These two groups should be allies, but instead, they’re often working in isolation. That’s a problem because cyber risk isn’t just a compliance issue… it’s a threat issue. Join Steve Cobb for this talk on: SecurityScorecard monitors and scores over 12 million companies worldwide.

Agentic SecOps Workspace demo: AI agents operating inside LimaCharlie

LimaCharlie CEO/Founder, Maxime Lamothe-Brassard, walks through LimaCharlie's Agentic SecOps Workspace in this demo, showing how AI agents can directly operate security infrastructure using the platform's complete API coverage. What you'll see.

The Insights Dashboard

Teramind’s Insights Dashboard transforms how you can monitor productivity and security across your entire organization. Powered by over a decade’s worth of behavioral data, our Insights Dashboard leverages advanced machine learning and AI technology to reveal anomalous employee behavior patterns and critical rule violations automatically, giving you a clear picture of any outlier user behavior in seconds.

How Jit Security Agents Work: Ingestion Correlation Action

This video breaks down the architecture behind Jit security agents and why it’s required for agents that work reliably in real environments. We walk through Jit’s three layers—ingestion, correlation, and action—using concrete examples across code, applications/knowledge bases, and cloud runtime. You’ll see how Jit continuously normalizes and reconciles incompatible security data, materializes it into a Security Context Graph (knowledge graph), and then executes agent workflows safely using graph queries and domain-specific tools.

Daily Zero-Day Exposure Check + Top 10 High-Risk Repositories (Agent Gallery Walkthrough)

In this walkthrough, you’ll see two Agent Gallery workflows in action. The Daily Zero-Day Analyst pulls newly published CVEs from the last 24 hours, classifies them (CVSS, CWE, attack vector), and checks your environment for exposure using SBOM/package data—then can send daily updates to Slack. The Top 10 High-Risk Repositories agent scans your codebase, consolidates findings per repository, and ranks the repos with the most critical risk so you can prioritize remediation. You’ll also see how to review and edit the prompt, set schedules, enable notifications, and browse the Agent Gallery to add more agents.