PREEMPTIVE SECURITY OPERATIONS. BUILT FOR RESILIENCE.

Modern security leaders are facing unprecedented challenges: attackers using AI in new and novel ways, consistent resource constraints, and the ever-expanding attack surface. Defenders must do more than keep pace, they must disrupt threats before they can have an impact. This moment demands a new paradigm. One where preemptive defense delivers continued cybersecurity resilience and teams escape from the cycle of reactive security with security programs that take away attacker advantages.

Rapid7’s 2026 Global Cybersecurity Summit brought together CISOs, security leaders, customers, and preemptive security experts to examine how modern teams shift away from reactive security operations and create a path toward cyber resilience. These sessions follow a dual track designed to speak to the unique needs of security leaders and practitioners.

WATCH RAPID7’S GLOBAL CYBERSECURITY SUMMIT ON-DEMAND

KEYNOTES AND CORE SESSIONS

KEYNOTE: DEFENSE STARTS EARLIER THAN YOU THINK

Play

Something went wrong. Please try again.

The security market is consolidating, yet security environments are more fragmented than ever. CISOs and SOC teams are drowning in alerts, tools, and disconnected data – without greater confidence or control. In this keynote, we’ll examine why complexity, not a lack of technology, has become the primary barrier to effective security.

We’ll introduce Preemptive Security as a new operating model – one that brings together exposure management, MDR, AI, and human judgment to reduce noise, create clarity, and act before risk becomes impact. This session sets the foundation for the summit by reframing how modern organizations must think about defense, resilience, and outcomes.

Craig Adams
SVP, Chief Product Officer
Rapid7

Brian Castagna
SVP, Chief Security Officer
Rapid7

Craig Robinson
Research Vice President, Security Services
IDC

KEYNOTE PANEL: THE REALITY OF RUNNING A SOC IN 2026

Play

Something went wrong. Please try again.

How Modern Attacks Actually Start – and Why Defenders Are Under Pressure

Modern attacks don’t unfold the way most defenders expect. In this session, we unpack how today’s threat landscape is evolving – and how attackers are adapting faster than traditional defenses.

The discussion will explore initial access vectors, identity misuse, cloud misconfigurations, and how AI is accelerating attacker speed and scale. Rather than focusing on how attackers think, this panel shifts the conversation to how attackers adapt – and how defenders fall behind.

Raj Samani
SVP, Chief Scientist
Rapid7

Graham Cluley
Cybersecurity Speaker and Podcast Host

Rachel Tobac
CEO of SocialProof Security
Friendly Hacker

Brian Honan
CEO & Principal Consultant
BH Consulting

CUSTOMER PANEL: HOW CLARITY BEATS COMPLEXITY

Play

Something went wrong. Please try again.

Security leaders are being asked to reduce risk, simplify environments, and improve resilience – often without adding more tools or headcount. In this customer panel session, security leaders share how they’ve navigated complexity, validated MDR and platform consolidation decisions, and shifted their focus from activity to outcomes.

This panel normalizes the reality of modern security operations and highlights what actually works at scale: clearer risk ownership, smarter prioritization, and operational models that support resilience. Expect honest lessons learned, not feature checklists.

Debby Briggs
VP – CISO
Netscout Systems

Raheem Daya
Chief Technology Officer
Target RWE

Will Lambert
Information Security Manager – EMEA
Culligan International

Thom Langford
Regional CTO
Rapid7

INSIDE THE MODERN SOC: WHO CARRIES YOU THROUGH AN INCIDENT

Play

Something went wrong. Please try again.

Noah Hemker
Lead Incident Responder
Rapid7

Caleb Musco
Detection & Response Analyst
Rapid7

Karl Lankford
Senior Director, Sales Engineering
Rapid7

Learn more

This signature session takes attendees inside a real-world incident to show how modern MDR and incident response teams actually operate under pressure. Led by an MDR analyst, incident responder, the session walks step by step through an investigation – from the first alert to final outcome.

Along the way, we’ll explore the tradeoffs, decision points, and moments where context and judgment matter most. This is not a demo or a panel – it’s an unfiltered look at how threats are detected, prioritized, and stopped in practice, and what outcomes truly define success.

THE AI DILEMMA: AUTOMATING DEFENSE WITHOUT SURRENDERING JUDGMENT

Play

Something went wrong. Please try again.

Dave Gruber
Principal Analyst, Cybersecurity
Omdia

Juraj Čief
Lead Product Manager
Rapid7

Karl Lankford
Senior Director, Sales Engineering
Rapid7

Learn more

AI is now a core component of modern MDR services – accelerating investigations, reducing alert fatigue, and helping teams respond at machine speed. But as adoption increases, so do questions around trust, transparency, and accountability.

In this session, industry experts explore how AI is actually being used in the SOC today, where it can deliver real value, and how the “black-box”use of AI & automation can undermine analyst confidence and decision-making. Grounded in real-world MDR workflows and supported by exclusive research from Omdia, the discussion examines why transparency and explain ability are critical to the effective adoption and widespread use of AI in the SOC.

We’ll unpack how transparent AI improves analyst trust, enables better human judgment, and drives measurable security impact – while also examining how attackers are leveraging AI to scale and evade defenses. The session reinforces a simple truth: AI delivers its greatest value in MDR when it augments human expertise with clarity, not obscurity.

BEYOND THE VULNERABILITY LIST

Play

Something went wrong. Please try again.

Chris Neely
Strategic Solutions Architect
Rapid7

Jamie Douglas
Senior Manager
Rapid7

Joel Alcon
Senior Product Marketing Manager – Exposure Management
Rapid7

Learn more

Using Exposure Management as an Early Threat Warning System

One of the most important shifts in modern security is the move from vulnerability management to exposure-driven risk reduction. This session explores how organizations are expanding their view of the attack surface to achieve a broader, more continuous view of exposures and drive proactive detection, validation, and response.

We’ll leverage the CTEM framework to drive a discussion on proven ways to implement practical workflows for connecting exposures, threat context, and operational response for improved prioritization and resilience. Attendees will gain a clearer understanding of how exposure management supports preemptive security operations.

USING RED TEAMING TO POWER PREEMPTIVE MDR

Play

Something went wrong. Please try again.

Aaron Herndon
Principal Security Consultant
Rapid7

Nadia Hassaan
Lead Threat Intelligence & Detection Engineer
Rapid7

Mikayla Wyman
Senior Manager, Product Marketing – MDR and Services
Rapid7

Learn more

Effective detection and response can’t be built on assumptions – it must be continuously validated against how attackers actually operate.

In this session, Rapid7 practitioners explore how continuous red teaming fundamentally strengthens modern MDR by proving detections before they’re tested in a real incident. By safely emulating real-world adversary techniques, Red Teaming continuously validates detection coverage, exposes blind spots, and feeds actionable insights directly into MDR operations.

Attendees will see how this creates a true purple team feedback loop – where detections are tuned, response playbooks evolve, and analysts focus on what matters most. The result is a more preemptive security posture: fewer surprises, faster confidence, and stronger outcomes when threats emerge.

RAPID7: WHAT’S NEW AND WHAT’S NEXT

Play

Something went wrong. Please try again.

Craig Adams
SVP, Chief Product Officer
Rapid7

Learn more

In this lightning talk, Rapid7 highlights how recent innovations across exposure management, MDR, and AI are helping security teams act before impact. We’ll explore how these capabilities come together to reduce noise, close visibility gaps, and support faster, more confident decision-making in complex environments.

Explore Rapid7’s latest innovations, future roadmap, and key capabilities that empower security teams to take command of their environments and mitigate risk effectively.

CLOSING KEYNOTE: PERSISTENCE UNDER PRESSURE

Play

Something went wrong. Please try again.

Join former Special Forces Operator Jason Fox as he reveals how an elite military mindset translates seamlessly into preemptive cybersecurity. Drawing on real world operational experience, he explores mission preparation, understanding the adversary, and leading decisively under pressure. This session delivers practical insights on composure, resilience, and clarity in crisis, showing how tier one principles can empower security teams to act with confidence when every second counts.

Prepare → Detect → Respond → Recover.

Jason Fox
Broadcaster & Former Special Forces Sergeant

Karl Lankford
Senior Director, Sales Engineering
Rapid7

SECURITY LEADERS TRACK

KEYNOTE: THE CISO’s ROLE IN ENTERPRISE TRANSFORMATION

Play

Something went wrong. Please try again.

The role of the CISO has expanded far beyond protecting systems and responding to incidents. Today’s security leaders are expected to influence culture, guide enterprise-wide change, and align security strategy with evolving business priorities – often without direct authority.

In this keynote, senior security leaders and industry experts explore how modern CISOs operate as transformation leaders. The discussion examines how effective CISOs drive change across complex organizations, manage resistance without relying on fear or technical mandates, and build durable partnerships across IT, cloud, and engineering teams.

Rather than focusing on tools or frameworks, this session offers candid leadership perspectives on navigating uncertainty, balancing progress with operational reality, and embedding security into the fabric of the business. Attendees will leave with practical insight into what it takes to lead security transformation that lasts.

Brian Castagna
SVP, Chief Security Officer
Rapid7

Horst Moll
CISO, Information Technology Security, Risk & Compliance
Miltenyi Biotec

Craig Robinson
Research Vice President, Security Services
IDC

HOW EXPOSURE INSIGHTS HELP ESTABLISH ACTIONABLE RISK AND SECURITY GOALS

Play

Something went wrong. Please try again.

Jane Man
Senior Director, Product Management
Rapid7

Jamie Cowper
Director, Product Marketing
Rapid7

Learn more

Security leaders rarely fail due to lack of visibility. They fail when decisions made under pressure can’t be explained, defended, or sustained across the organization.

This exposure management session examines the ways that security leaders collaborate with their cross-functional partners to set security and risk goals across the business, and how they use SLAs/SLOs as a governance mechanism to bridge the gap between identifying exposures and remediating them. Using real-world scenarios and industry research, including IDC findings on cross-functional accountability and cloud responsibility models, we explore the ways that modern security programs prioritize action to known exposures, build formal processes for managing risk exceptions, and accelerate their time to respond to active threats.

A CISO’s GUIDE TO MDR ACCOUNTABILITY AND OUTCOMES

Play

Something went wrong. Please try again.

Alan Simpson
Field CISO
Rapid7

Jamie Ridge
VP, Sales Engineering
Rapid7

Mikayla Wyman
Senior Manager, Product Marketing – MDR and Services
Rapid7

Learn more

Security leaders can no longer rely on activity to demonstrate effectiveness – they’re held accountable for outcomes. As attackers move faster and complexity increases, CISOs must decide what actually matters, what can be ignored, and how much risk is acceptable in real time.

Through a candid discussion, CISOs and industry experts explore what “good” MDR actually looks like in practice, how leaders measure effectiveness beyond alert volume, and where responsibility truly sits. Attendees will gain practical insight into how MDR supports faster, more confident decision-making, enables risk tolerance in the face of attacker speed, and helps organizations focus on outcomes rather than activity.

CUSTOMER PANEL: WHAT CISOs WOULD DO DIFFERENTLY IF STARTING TODAY

Play

Something went wrong. Please try again.

If today’s CISOs could start over, what would they change first?

In this closing panel, experienced CISOs and security leaders reflect candidly on the lessons they’ve learned running security programs through rapid change, growing complexity, and escalating threats. Rather than revisiting tools or roadmaps, the conversation focuses on what actually matters in 2026 – where leaders would simplify, what they would stop doing immediately, and which decisions had the greatest impact on reducing risk and building resilience.

This session offers practical perspective for security leaders at any stage, grounding the summit’s themes in real experience and leaving attendees with clarity, confidence, and a sharper sense of where to focus next.

Jonathan Chow
Chief Information Security Officer
Genesys

Gregory Pickett
Cybersecurity Expert
Hellfire Security

Chris Hippensteel
Director of Information Technology
New Resources Consulting

Tony Arnold
CISO
TSB Bank Limited

SECURITY PRACTITIONERS TRACK

HUNT OR BE HUNTED: FRONTLINE TALES OF DETECTION

Play

Something went wrong. Please try again.

Steve Erwin
Senior Incident Responder
Rapid7

Olivia Cate
Incident Responder
Rapid7

Mikayla Wyman
Senior Manager, Product Marketing – MDR and Services
Rapid7

Learn more

Security incidents don’t unfold in clean, linear steps – and neither do the decisions that stop them. In this session, we walk through a real-world incident to show how SOC teams actually operate under pressure.

From the first signal to the final outcome, attendees will see what gets ignored, what gets investigated, and why. The session explores how analysts correlate signals across endpoint, identity, and cloud, how trust and handoffs work between teams, and where exposure context influences escalation. This is an unfiltered look at the pace, pressure, and judgment required to defend modern environments – focused on outcomes, not alerts.

THE NEW RULES OF DETECTION ENGINEERING

Play

Something went wrong. Please try again.

Steve Edwards
Director, Threat Intelligence Detection Engineering
Rapid7

Marco Botros
Senior Product Manager
Rapid7

Learn more

Detection engineering is no longer about coverage, volume, or catching everything. As environments become more dynamic and attackers more targeted, the value of a detection is defined by whether it drives the right action at the right time.

In this session, experienced practitioners break down the new rules of modern detection engineering – grounded in real-world SOC and MDR environments. We’ll explore how detection-as-code changes the way teams build, test, and maintain detections; why risk-driven detection strategies outperform volume-based approaches; and what “high-fidelity” actually means as we head into 2026.

This session is designed for security ICs who live in the gap between theory and reality. Attendees will leave with practical guidance on what to prioritize, what to stop doing, and how to design detections that reduce noise, support SLAs, and improve security outcomes under real operational pressure.

FROM CLOUD EXPOSURE TO RUNTIME ATTACK

Play

Something went wrong. Please try again.

Shauli Rozen
CEO and co-founder
ARMO

Ben Hirschberg
CTO and co-founder
ARMO

Nidhi Sharma
Lead Product Manager
Rapid7

Learn more

Most cloud incidents don’t begin with a critical alert – they begin with overlooked exposure. A misconfiguration, an over-permissive identity, a vulnerable container running in production. By the time an alert fires, escalation is already underway.

In this session, ARMO and Rapid7 walk through how modern cloud attacks unfold – from initial exposure to runtime exploitation and lateral movement. ARMO will set the stage with a strategic perspective on why runtime security has become essential in cloud-native environments. And will demonstrate a real-world cloud application attack scenario, showing how Rapid7 and ARMO together detect, validate, and stop the attack before it becomes a full-scale incident.

Attendees will gain a practical understanding of how exposure connects to runtime behavior, how cloud context reshapes prioritization mid-incident, and how combining exposure insights with detection and response improves signal fidelity without increasing noise. This session delivers both strategic clarity and hands-on insight into how cloud attacks really escalate – and how to interrupt them earlier.

IR IN PRACTICE: TOOLS, TRADECRAFT, AND ADVERSARY-INFORMED INVESTIGATION

Play

Something went wrong. Please try again.

Shanna Battaglia
Senior Product Manager
Rapid7

Michael Cohen
Senior Principal Engineer
Rapid7

Learn more

In this session, practitioners walk through real-world incident response workflows, highlighting how open-source tools and investigative tradecraft come together during active incidents.

Attendees will see practical Velociraptor use cases, learn how adversary techniques (often uncovered through red team exercises) inform defensive investigations, and understand how experienced responders approach evidence collection, validation, and decision-making.

Designed for hands-on practitioners, this session sharpens blue team skills and provides a clearer view into how attacks are investigated, contained, and learned from in practice.

Preemptive security built for resilience.

Rapid7’s 2026 Global Cybersecurity Summit arms every security practitioner and leader with the tools to apply preemptive security in their own security environments with the conviction that every team can predict, disrupt, and defeat attackers, building a program with security resilience at its core.