GConferenceGridThe Conference Catalogue · Vol. 2026Folio № CB82FC
Of the Field

Threat Detection and Incident Response Summit 2026

T

he Threat Detection and Incident Response (TDIR) Summit, organized by SecurityWeek, brings together security practitioners from around the world to share insights and best practices for combating cyberattacks. The event delves into strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and explore modern tools and a…

Visit the official site
11Voices
6Underwriters
0Exhibitors
7On the bill · sessions
11Companies · in total
§I

The Voices

Programmed at Threat, in alphabetical order.
Darrell Geusz
Product Lead, Neo · Ping Identity
David Moulton
Director, Content Marketing · Palo Alto Networks
Johnathan Campos
Senior Product Marketing Manager · Okta
John Smith
Integration Solutions Architect · CrowdStrike
Lauren Place
Sr. Product Marketing Manager · Wiz
Maya Ogranovitch Scott
Senior Solution Manager, Fraud · Ping Identity
Michael Sikorski
Chief Technology Officer and VP of Engineering · Palo Alto Networks
Sam Rubin
VP Global Head of Operations · Palo Alto Networks
Sanjoy Ghosh
Head of Digital Business & Engineering, BFSI · Apexon
Sergio Albea
Cloud Security Expert/Architect addicted to Threat Hunting
Steve Cobb
CISO · SecurityScorecard
§II

Underwritten By

The houses behind the program. Tiers as disclosed.
AbnormalPlatinum
Dropzone AIPlatinum
SnykPlatinum
Digital ElementGold
OktaGold
WizGold
§III

The Programme

Selected from 7 sessions on the bill.
  • May 21, 2025 11:00

    Insights from the 2025 Unit 42 Global Incident Response Report

    In a world where cyberattacks are intensifying daily, AI-driven techniques and calculated disruptions from adversaries are redefining how organizations must approach cybersecurity.…

  • May 21, 2025 11:30

    A Security Imperative: Identity Threat Visibility and Remediation

    In today’s evolving threat landscape, staying ahead of Identity-related risks is critical to maintaining business continuity. Join us for an insightful session where we will share …

  • May 21, 2025 12:00

    Living Off the Cloud: How to Move Faster Than Attackers with CDR

    Living off the cloud attacks are on the rise. Executing rapid, cloud-native techniques to escalate privileges, move laterally between environments, and access critical assets, atta…

  • May 21, 2025 12:30

    A CISO's Guide to Mastering Cyber Incident Response: Are Your Vendors Your Weakest Link?

    With 98% of organizations experiencing vendor breaches, preparedness is critical. This webinar equips CISOs and security leaders with strategies to effectively manage third-party c…

  • May 21, 2025 13:00

    Fighting Deepfakes: Transformative Approaches to Protect Your Business

    Deepfake-related incidents worldwide increased over 245% in 2024, with some regions seeing alarming growth rates of over 3,000%. When it comes to identity crime, organizations are …

  • May 21, 2025 13:30

    Leveraging ISP and ASN as New Indicators of Compromise (IOC) in Cyber Threat Intelligence

    Traditional threat intelligence often relies on identifying malicious IPs individually, which can be reactive and slow. This session explores different KQL Queries to show how ISPs…

  • May 21, 2025 14:00

    Agentic AI: The Next Frontier of Adversarial Threats and Incident Response

    Agentic AI-AI systems capable of autonomous decision-making-are rapidly being integrated into enterprise workflows. This session explores how agentic AI blurs the lines between tra…

Intermission
Part the Second · For the Buyer

What does it mean when 11 companies show up — and 2 bet on three roles at once?

Eleven companies. two are betting more than once.

The numbers below are derived from the speakers, sponsors, and exhibitors on this page — cross-referenced into one ledger. They are the only thing here that 10times.com cannot tell you.

01Fig. 01 — Composition of the House
2All threespeak · spons · exh
4Sponsoringsponsor only
0Exhibitingexhibitor only
5Speakingspeaker only

The Triple-Threat

Okta·Wiz

02Fig. 02 — The Voices, by Seniority

45% of the speakers carry senior titles — C-suite, Founder, VP, or Director-level.

  • C-suite218%
  • VP-level19%
  • Director / Head of218%
  • Manager / Lead19%
  • Product19%
  • Engineer · IC218%
  • Marketing / Brand218%

Of 11 on the bill · classified by free-text title

03Fig. 03 — The Heaviest in the Room
  1. 01OktaSp·G1V
  2. 02WizSp·G1V
  3. 03AbnormalSp·P
  4. 04Digital ElementSp·G
  5. 05Dropzone AISp·P
  6. 06Palo Alto Networks3V
  7. 07SnykSp·P
  8. 08Ping Identity2V
  9. 09Apexon1V
  10. 10CrowdStrike1V
  11. 11SecurityScorecard1V
04Fig. 04 — By Tier
platinum3
50% of 6
gold3
50% of 6
05Fig. 05 — The Missing · who's at peer events but not here

These companies sponsored two or more peer events recently, but aren't on this program. For an organizer, that's a list of warm prospects.

06Fig. 06 — Adjacent Convocations · by shared underwriters