DEEP608v10 | Back to Back to Basics

April 8, 2026

8 AM - 5 PM

Monona Terrace | 1 John Nolen Dr, Madison, WI 53703

Event Details

We invite security professionals, leaders, and practitioners to take a purposeful step back and reassess the foundations of cybersecurity in an increasingly complex threat landscape. Over the past decade, cyber threats, technologies, and defenses have evolved rapidly—but many of the most impactful breaches still trace back to familiar root causes. This year's Deep608 will reflect on the last ten years of cybersecurity, examining what has truly changed, what has remained surprisingly consistent, and how lessons from the past can better inform today’s security strategies.

 

Through expert-led discussions and practical insights, the symposium will emphasize the importance of revisiting core cybersecurity principles and hygiene. Topics will include fundamentals such as asset visibility, patching, identity management, and user awareness—areas that are often overlooked as organizations chase the latest tools and trends. By returning “back to back to basics,” attendees will gain a clearer understanding of how strengthening foundational practices can significantly improve resilience, reduce risk, and prepare organizations for the threats ahead.

Button Text
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
8:00 am
-
9:00 am
-
Main Hall
Registration & Exhibits
No items found.
9:00 am
-
9:15 am
-
Main Hall
DEEP608v10 Welcome
No items found.
9:15 am
-
10:15 am
-
Main Hall
Josh Yost, Palo Alto Networks | Beyond the Playbook: Reclaiming the SOC through Agentic Intelligence
Keynote

Beyond the Playbook: Reclaiming the SOC through Agentic Intelligence

Josh Yost | Vice President - Technical Product Engineering, Palo Alto Networks

Standard automation has hit a plateau. While traditional SOAR reduced some manual toil, it often traded one type of "busy work" for another: playbook maintenance. To get back to the basics of effective defense, we need automation that understands intent, not just instructions. This presentation dives into the architecture of Agentic Automation within the Cortex ecosystem. We’ll demonstrate how Agentix functions as a digital force multiplier, handling the investigative heavy lifting so analysts can focus on high-context decision-making. Learn how to simplify your operations by automating the sophisticated, not just the mundane.

10:15 am
-
10:25 am
-
Break - 1
Break
10:25 am
-
10:55 am
-
Hall of Ideas E
Nick Krueger - What I Thought Security Was vs What Actually Worked 15 Years of Lessons That Brought Me Back to the Basics
AEBS Breakout Session

What I Thought Security Was vs What Actually Worked 15 Years of Lessons That Brought Me Back to the Basics

Nick Krueger | Security Solutions Architect, AE Business Solutions

After 15 years on the customer side of security, I’ve learned that effectiveness often looks very different in practice than it does on paper. This talk focuses on the fundamental practices that consistently work in real environments, and why returning to basics still matters.

10:25 am
-
10:55 am
-
Hall of Ideas G
The 47 Day Imperative: Modernizing Certificate Management for an Automated Future | CyberArk
Sponsor

The 47 Day Imperative: Modernizing Certificate Management for an Automated Future

Kevin Jacque | Strategic Channel Solution Engineer, CyberArk

The shift to 47 day TLS certificate validity is redefining operational expectations for every organization, changing certificate management from a nice to have to a must have.  This presentation highlights why manual processes can no longer keep pace, how shortened lifecycles increase outage and compliance risks, and what leading teams are doing to prepare. It introduces a practical maturity model and automation playbook designed to restore visibility, accountability, and resilience. Ultimately, the session equips organizations to transition from reactive firefighting to proactive, scalable certificate automation.

10:25 am
-
10:55 am
-
Hall of Ideas J
Zac Wolter - Structuring Security Policy for Automation Readiness
AEBS Breakout Session

Structuring Security Policy for Automation Readiness

Zac Wolter | Senior Solutions Engineer, AE Business Solutions

As automation begins influencing firewall rule cleanup and optimization, many environments remain dependent on undocumented intent and tribal knowledge. This breakout explores how structured policy design and disciplined rule modeling determine whether automation strengthens security — or scales architectural blind spots.

10:55 am
-
11:05 am
-
Break - 2
Break
11:05 am
-
11:35 am
-
Hall of Ideas E
Josh Havlik & Michelle Sprague - Don’t be a Meanie Pants When Catapulting Security at Your Users' Faces
Client

Don’t be a Meanie Pants When Catapulting Security at Your Users' Faces

Josh Havlik & Michelle Sprague | Senior Information Security Engineer & Information Security Engineer, CapSpecialty

Too often security gets launched at people like a trebuchet of rules; we chose a different path. Security only works when people feel safe engaging with it. This talk shows how approachability and empathy turn everyday interactions into trust. We will explain how we are using fun, rewards, and a cool head to reduce anxiety and build lasting habits. We will share how these principles became the core of our program and why that shift changed outcomes across the company.

11:05 am
-
11:35 am
-
Hall of Ideas F
John Urbanek - Not Your Daddy’s DNS: Part Deux — DNS, ECH, HTTPS Oh My
AEBS Breakout Session

Not Your Daddy’s DNS: Part Deux — DNS, ECH, HTTPS Oh My

John Urbanek | Senior Director of Solution Architecture & Engineering, AE Business Solutions

A follow up to DEEP608v9 "Not Your Daddy's DNS" highlighting how DNS is being used in new ways. DNS now plays a critical role in TLS 1.3 Encrypted Client Hello (ECH) with Type 64 SVCB and Type 65 HTTPS records. Wait, what is ECH? Let's find out. We'll also revisit DNS over HTTPS (DoH) and a few other topics.

11:05 am
-
11:35 am
-
Hall of Ideas G
Phil Henrickson - Get Better at Software Development - By Playing a Video Game
AEBS Breakout Session

Get Better at Software Development - By Playing a Video Game

Phil Henrickson| Senior Data Scientist Service Delivery, AE Business Solutions

Session description TBD

11:05 am
-
11:35 am
-
Hall of Ideas J
Defending M365 Against the Next Wave of Email Threats | Proofpoint
Sponsor

Defending M365 Against the Next Wave of Email Threats

Andrew Goodman | Director of Product Marketing, Proofpoint

AI is now executing 80-90% of email threats. These campaigns are no longer “spray-and-pray.”  They’re precision operations with automated reconnaissance and tailored narratives delivered faster, cheaper, and at massive scale.  This session cuts through the “AI vs. AI” noise to give security buyers a practical roadmap for protecting M365. Attendees will leave with a clear threat model for AI-driven email campaigns targeting M365 and a concise understanding of the must-have defenses needed to stop the next wave of AI-powered email attacks.

11:45 am
-
12:45 pm
-
Main Hall
Client Panel
No items found.

Information to come.

12:45 pm
-
1:30 pm
-
Main Hall
Lunch
Break

Enjoy lunch in the main hall while networking with your peers. Be sure to walk through the sponsor exhibits if you have the time. If you are gluten free, please find a Monona Terrace wait staff member to assist you.

1:30 pm
-
2:00 pm
-
Hall of Ideas E
Robert Chuvala - If We Had a Time Machine: 10 Years of Security We Should Have Learned From.
AEBS Breakout Session

If We Had a Time Machine: 10 Years of Security We Should Have Learned From.

Robert Chuvala | Security Solutions Architect, AE Business Solutions

In 2015 we were worried about phishing, ransomware, Active Directory abuse, exposed RDP, and alert fatigue. In 2026… we’re worried about phishing, ransomware, Active Directory abuse, exposed management planes, and alert fatigue.

1:30 pm
-
2:00 pm
-
Hall of Ideas J
Jestin Moe - Segmentation That Doesn’t Suck: A 2026 Reimagination
AEBS Breakout Session

Segmentation That Doesn’t Suck: A 2026 Reimagination

Jestin Moe | Security Solutions Architect, AE Business Solutions

Over the last decade, we’ve been told that “zero trust” and “segmentation everywhere” will fix all our problem when in reality, many organizations still live on flat networks, half baked segmentation projects, and security policies nobody wants to touch. This session goes back to basics on segmentation where we can clearly define boundaries, reduce blast radius, and keep the design boring in the best way possible. We’ll walk through how to segment your environment with identity at the core, instead of relying on traditional static controls.

2:00 pm
-
2:15 pm
-
Break - 4
Break
2:15 pm
-
2:45 pm
-
Hall of Ideas E
Griffin Cass - CMDB or It Didn't Happen: Why Modern Tech Demands Yesterday's Fundamentals
Client

CMDB or It Didn't Happen: Why Modern Tech Demands Yesterday's Fundamentals

Griffin Cass | Information Security Architect, UW Credit Union

Here's an uncomfortable question: if a zero-day dropped right now, could you query your inventory and know every affected asset within the hour? If you hesitated, this talk is for you. We're living in an era of non-human identity sprawl, agentic workflows with broad permissions, and copilots indexing data you haven't classified yet. The tools are moving faster than our foundations, and we can't keep stacking advanced capabilities on top of asset inventories held together by institutional knowledge and a spreadsheet from 2019. This session walks through why the CIS 18 Controls are numbered the way they are (hint: it's a dependency chain, not a buffet), dives into the controls where most orgs are quietly struggling, and lands on the part leadership actually wants to hear: how to measure maturity with simple math, crosswalk one framework to many, and start the whole thing for the low price of zero dollars.

2:15 pm
-
2:45 pm
-
Hall of Ideas G
Jonathan Lampe - Can AIs be Trusted to Secure Vibe-Coded Apps?
Client

Can AIs be Trusted to Secure Vibe-Coded Apps?

Jonathan Lampe| Group Manager, Milwaukee Tool

Vibe-coding with AI assistants has changed the development landscape.  LLMs now propose architectures, generate implementations, and even help debug and extend applications. The result is dramatically increased development velocity — and a fundamentally different security landscape.

This talk walks through real observations from building and securing multiple LLM-generated applications. We’ll examine how traditional risks reappear in new forms: implicit trust boundaries, over-permissive defaults, and deferred security controls hidden behind TODO comments. We’ll then explore risks unique to AI-integrated systems, including prompt injection, plausibility-over-truth behavior, multi-LLM authority confusion, and security assumptions expressed only in natural language.

However, AI-driven development does not simply increase risk — it changes how security must be applied. We’ll demonstrate how traditional controls such as threat modeling, RBAC, SAST, and software composition analysis still matter, but must be paired with new practices: scoped LLM roles, prompt-aware testing, and using the model itself to identify and validate security weaknesses.

Attendees will leave with a practical framework for securing applications where the developer is no longer the sole author — and where the fastest path to secure software may involve collaborating with the same AI that created it.

2:15 pm
-
2:45 pm
-
Hall of Ideas J
Cutting Through the Noise: Lessons from a Decade of Electronic Warfare | Firemon
Sponsor

Cutting Through the Noise: Lessons from a Decade of Electronic Warfare

Rob Rodriguez | Senior Director of Engineering, Firemon

What do radio jamming, signal interception, and direction finding have to do with modern cybersecurity? More than you think. Drawing from a decade in Marine Corps signals intelligence and electronic warfare, Rob connects battlefield concepts like signal dominance and spectrum control to today’s security challenges. The tools have changed. The fundamentals have not.

2:15 pm
-
2:45 pm
-
Hall of Ideas F
Patrick Ruffino - No Identity, No Recovery: The New Priority in Data Protection
AEBS Breakout Session

No Identity, No Recovery: The New Priority in Data Protection

Patrick Ruffino | Infrastructure Solutions Architect, AE Business Solutions

This session positions data protection for identity platforms as the primary focus of your recovery strategy, not an afterthought. Learn how to build resilient backup and recovery for your identity stores, minimize recovery time during breaches or outages, and integrate automated testing so you can prove — not just hope — that you can bring your identity platform back online under pressure.

2:45 pm
-
3:00 pm
-
Break - 5
Break
4:00 pm
-
4:15 pm
-
Main Hall
DEEP608v10 Closing
No items found.
4:15 pm
-
5:30 pm
-
Main Hall
Happy Hour
No items found.
11:35 am
-
11:45 am
-
Break - 3
Break

Platinum Sponsors

Gold Sponsors

Silver Sponsors

Bronze Sponsors