The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption, 14 November | Event in Livermore | AllEvents

The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption

ISC2 East Bay Chapter

Highlights

Fri, 14 Nov, 2025 at 08:00 am

9 hours

Las Positas College

Advertisement

Date & Location

Fri, 14 Nov, 2025 at 08:00 am to 05:00 pm (GMT-08:00)

Las Positas College

3000 Campus Hill Drive, Livermore, United States

Save location for easier access

Only get lost while having fun, not on the road!

About the event

The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption
In an era of geopolitical tensions and climate change, AI-driven cyber strategy helps build resilient defenses and ensure continuity.

About this Event

Welcome to The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption event! Join us at Las Positas College on November 14, 2025, at 8:00 AM (Pacific Time)

NOTE: To access tickets, you must first register in the ISC2 East Bay member and guest management system. After registering, your email address will be your access code to access tickets according to your membership type. You can view your confirm your membership details here: https://app.joinit.com/o/isc2-east-bay/members

About your day: The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption

The ISC2 East Bay Chapter invites cybersecurity professionals, leaders, and enthusiasts to "The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption," a pivotal conference taking place on Friday, November 14th, 2025, at Las Positas College in Livermore, CA. In an escalating global landscape marked by geopolitical tensions and climate change impacts, this event delves into leveraging artificial intelligence to forge resilient, long-term cybersecurity strategies. Attendees will gain actionable insights into navigating complex risks, mitigating climate-related cyber threats, and harnessing AI's power to anticipate and counter evolving challenges, ensuring business continuity and a secure future.

The conference boasts an impressive lineup of thought leaders. Bob Kolasky, SVP Critical Infrastructure Sectors at Exiger, will kick off the day by exploring "The AI Supply Chain: A National Security Imperative," focusing on proactive risk management in an AI-driven world. Following this, Yossi Applebaum, CEO of Sepio, will unveil "The Invisible Threat Layer," demonstrating how AI and practical physics secure hardware for the long game. Dr. Alissa Abdullah (Dr. Jay), SVP, Emerging Corporate Security Solutions and CISO at Mastercard, will address "Resilience in the Deep Fake Face of AI Cybercrime," providing strategies for navigating this emerging threat. Indus Khaitan, Founder and CEO of Redblock, will present "Beyond the Benchmark: AI’s Role in Resilient Cybersecurity," showcasing how AI drives proactive risk management and rapid recovery. Finally, Juliet Okafor, JD, CEO of RevolutionCyber and an accomplished author, will discuss "Beyond Tech: Building Resilient Security Culture and Rapid Response for the AI Era," emphasizing the human element in cyber resilience.

Jim Dempsey, Managing Director of the IAPP Cybersecurity Law Center, will deliver the conference Keynote Address at 1 PM. This highly anticipated address, "Cybersecurity and Privacy Policy: Analysis of Executive Actions and Legislation in the 47th Presidential Term and 119th Congressional Session," provides unparalleled insight into the evolving policy landscape. This session will offer a profound examination of what has changed and what has continued from previous administrations, the influence of competition with China, the development of offensive cyber operations, and emerging regulatory approaches. Attendees will gain a deep understanding of the long-term strategic considerations essential for navigating the complex and rapidly changing cyber and data governance environment, including AI-driven cybersecurity strategies and data privacy regulations.

Our afternoon agenda includes two expert panel conversations, featuring distinguished leaders, some familiar and some new, who are known for steering today's most respected and accomplished cybersecurity enterprises. Tolgay Kizilelma, Ph.D., will moderate "The Intersection of Geopolitics and Cyber: Strategies for Mitigating Global Threats," while Stephen Bartolini from NextPeak will lead "AI vs. AI: The Evolving Landscape of AI-Driven Cyber Warfare," offering diverse perspectives on critical cybersecurity challenges.

The hallmark feature of "The Long Game" conference is the "Cyber Emergency Kit" activity. Attendees with a Full Day Pass, or those who select a Networking Pass option that includes it, will receive a branded backpack, which they fill with essential tools and resources contributed by a diverse array of vendors. This interactive element provides tangible assets for long-term cyber resilience and incident response, creating a personalized collection of actionable insights and practical utilities. Participating vendors represent a broad spectrum of cybersecurity solutions, including: Astrix Security (securing non-human identities and SaaS connectivity), BigID (AI-powered data discovery, classification, and privacy), BreachRX (AI-powered incident response management), Exiger (AI-powered supply chain and third-party risk management), Horizon3.ai (autonomous penetration testing), Illumio (Zero Trust Segmentation), Intezer (automating threat triage and investigation), NetAlly (portable network testing and analysis), One Identity (comprehensive identity and access management), Redblock (AI-driven data backup and recovery), RevolutionCyber (human risk management and security culture transformation), Semperis (Active Directory protection and recovery), Sepio (Hardware Access Control and asset visibility), StellarCyber (Open XDR platform for unified security operations), StrongDM (unified infrastructure access management and auditing), Summit 7 (DIB cybersecurity compliance and Microsoft 365 security), Symmetry Systems (Data Security Posture Management - DSPM), The Good Data Factory (data analytics for rapid cyber incident assessment), and Trace3 (IT solutions and consulting for cloud, security, and data intelligence). This hands-on experience, combined with networking opportunities and up to 13 CPEs for full participation, ensures attendees leave with both knowledge and practical tools to navigate the complex cybersecurity landscape.




Agenda


🕑: 08:00 AM - 08:50 AM
Breakfast and Registration

Info: Pick up your badge, ribbons, and optional pre-ordered “Long Game: Cyber Emergency Kit Backpack.” Throughout the day, as you visit each vendor, your bag gets a variety of books, tools, and swag. At the end of the day, events and further awards will focus on your key takeaways. Earn additional CPE and distinction by sharing how you might or already leverage what you now have “in the bag.”


Coffee throughout the day is sponsored by One Identity. All meals are paid for by the entire list of sponsors and by a portion of each registration. Thank you to our sponsor and our members. Please visit the list of sponsoring vendors below.



🕑: 08:50 AM - 09:00 AM
Greetings from the ISC2 East Bay Chapter

Info: Welcome Students, Entrepreneurs, Civic, Business, and Education Leaders, Cyber Professionals, Job Seekers. We are pleased to share a brief discussion of the ISC2 East Bay Chapter Mission, Rules for our day at Las Positas, expectations for the “In The Bag” activity, and a reminder about your mandatory feedback requirement.



🕑: 09:00 AM - 09:30 AM
Session One: The AI Supply Chain: A National Security Imperative
Host: Bob Kolasky, Exiger

Info: Navigating escalating cyber threats and complex global interdependencies, this session will delve into proactively managing pervasive supply chain risks. Bob Kolasky will explore the pivotal role of artificial intelligence and data-driven strategies, leveraging platforms like Exiger, to identify, assess, and mitigate vulnerabilities across the digital ecosystem. Attendees will gain insights into building resilient supply chains, strengthening third-party risk management, and fostering robust public-private partnerships vital for national and economic security. He will highlight actionable strategies for anticipating and addressing security needs, ensuring critical functions remain operational against cyber warfare and systemic disruptions, and demonstrating how advanced technology facilitates better risk outcomes. This discussion is vital for cybersecurity professionals and industry leaders, enhancing organizational cyber resilience.



🕑: 09:45 AM - 10:15 AM
Session Two: The Invisible Threat Layer: Harnessing AI and Practical Physics
Host: Yossi Applebaum, Sepio

Info: This session delves into the often overlooked physical layer of cybersecurity, learning how advanced AI and novel approaches rooted in practical physics transform the way organizations identify, manage, and mitigate hidden hardware device risks. Explore how IT, OT, and IoT environments are crucial for building enduring resilience and developing a true “Long Game” cyber strategy against systemic disruptions.



🕑: 10:15 AM - 10:45 AM
Session Three: Resilience in the Deep Fake Face of AI Cybercrime
Host: Dr. Alissa Abdullah (Dr. Jay), Mastercard

Info: Dr. Alissa Abdullah (Dr. Jay), is Mastercard’s deputy chief security officer. In this role, she leads the Emerging Corporate Security Solutions team and is responsible for protecting Mastercard’s information assets as well as driving the future of security.


Dr. Jay joined Mastercard in 2019 after serving as the chief information security officer of Xerox, where she established and led a corporate-wide information risk management program. She also served as the deputy chief information officer of the White House, where she helped modernize the Executive Office of the President’s IT systems with cloud services and virtualization. She currently hosts Cybercrime Magazine’s Mastering Cyber and CISO 500 podcasts. Dr. Jay is a member of Smartsheet’s Board of Directors and Girls in Tech’s Board of Directors. She also serves as vice chair of BITS, the technology policy division of the Bank Policy Institute (BPI). Dr. Jay holds a PhD in Information Technology Management from Capella University,



🕑: 10:50 AM - 11:25 AM
Session Four: Beyond the Benchmark: AI's Role in Resilient Cybersecurity
Host: Indus Khaitan, Redblock

Info: In a landscape where traditional security measures are often insufficient against sophisticated threats, building truly resilient cybersecurity requires moving “beyond the benchmark.” Indus Khaitan, a recognized leader in AI and data resilience and the founder of Redblock, will explore how advanced AI is critical to achieving this next level of security. This session will delve into how AI-driven platforms, much like modern instantiations of computational intelligence, enable proactive risk management, intelligent data backup, and rapid recovery, minimizing downtime and ensuring business continuity. By harnessing AI’s power to automate complex tasks and illuminate unseen risks, organizations can develop a truly “Long Game” cyber strategy, transforming their approach to resilience and operations in an era of global disruption.



🕑: 11:30 AM - 12:00 PM
Session Five: Beyond Tech: Building Resilient Security Culture
Host: Juliet Okafor, JD, RevolutionCyber

Info: In today’s dynamic threat landscape, effective cybersecurity extends beyond technology alone. This session, led by Juliet Okafor, CEO of RevolutionCyber, will explore the critical role of human-centric security in building organizational resilience. Juliet will delve into strategies for cultivating a robust security culture across an enterprise, emphasizing how to increase user engagement, minimize friction during technology rollouts, and improve overall security program performance. The discussion will also cover key approaches to rapid incident response, empowering organizations to proactively prepare for and effectively navigate large-scale cyberattacks and disruptions, ultimately playing “The Long Game” in an AI-driven world.



🕑: 12:00 PM - 01:00 PM
Lunch

🕑: 01:00 PM - 01:45 PM
Keynote - Session Six: Cybersecurity and Privacy Policy
Host: Jim Dempsey, IAPP Cybersecurity Law Center

Info: This keynote address will analyze the evolving cybersecurity and privacy policy landscape, focusing on potential executive actions and legislative initiatives within the 47th Presidential Term and the 119th Congressional Session. By November 2025, we will have an emerging picture of cybersecurity policy in this term. This session will compare and contrast with the Biden administration, exploring what has changed and what has continued. Which unfinished initiatives are moving forward and which seem to have been abandoned? How does competition with China shape U.S. cybersecurity policy? How is the promised emphasis on offensive operations developing? What approaches are emerging from the regulatory agencies (FTC, FCC, SEC, HHS)? Are the states stepping up their enforcement actions? He will provide insights into the long-term strategic considerations necessary for navigating the complex and rapidly changing cyber and data governance environment.



🕑: 01:45 PM - 02:30 PM
Session Seven: Investing in the Future of AI-Driven Security
Host: Ali Bouhouch, The Good Data Factory

Info: The cybersecurity landscape is at an AI inflection point, driven by the convergence of large language models (LLMs), agentic-event-driven security automation, and API-first architectures, making real-time, autonomous cybersecurity operations finally possible. This session will explore how these powerful advancements represent a multi-billion-dollar market opportunity, poised to become an inevitable industry shift as global cybersecurity spending is projected to reach $267 billion by 2027, with AI-driven security automation as a key growth area.


Ali Bouhouch, CTO of The Good Data Factory, will discuss how enterprises, grappling with critical security staffing shortages (3.5 million unfilled cybersecurity jobs globally), can strategically invest in next-generation human-centric cybersecurity assistants.



🕑: 02:30 PM - 04:30 PM
Cake Break, Socializing, Panels

🕑: 03:00 PM - 03:45 PM
Session Eight (Panel A): The Intersection of Geopolitics and Cyber
Host: Tolgay Kizilelma, Ph.D.

Info: Tolgay Kizilelma, Ph.D. is a business-driven IT/Cybersecurity GRC leader and trusted business partner with three decades of experience in education, healthcare, distribution, and government sectors. He is the founding Director of the MS in Cybersecurity program and teaches online Cybersecurity GRC courses as an Associate Professor of Cybersecurity in the Barowsky School of Business at Dominican University of California. Tolgay has also served as the CISO for multiple University of California campuses. Early in his career, he managed the U.S. IT operations for a leading national fuel systems integrator and distributor. He has more than 50 industry certifications, a B.S. degree in computer engineering, an MBA, and a Ph.D. focusing on information security. He also volunteers for various non-profit organizations as a board member, and frequently participates at cybersecurity conferences as a presenter. His contribution to the cybersecurity community was recognized with the 2022 C100 Award



🕑: 03:45 PM - 04:30 PM
Session Eight (Panel B): AI vs. AI
Host: Stephen Bartolini, NextPeak

Info: Stephen Bartolini is an outcome-driven technology-risk management leader and Partner at NextPeak, adept at driving business transformation through reengineering and embracing cutting-edge technologies. With over two decades of experience, including significant leadership roles as Executive Director of Cybersecurity & Technology at JPMorgan Chase & Co. (10 years) and Senior Director positions at CA Technologies (9 years), Stephen is a trusted advisor to executive leadership on cybersecurity risks and response strategies. His expertise spans building global, diverse, cross-functional teams that deliver value by understanding client needs and engineering innovative solutions within rapidly changing, highly regulated environments across Financial Services, Technology, and Telecommunications industries. Stephen holds a Bachelor of Science in Chemical Engineering from Cornell University and is a Certified Information Security Manager (CISM) and Lean Six Sigma Black Belt.



🕑: 04:30 PM - 05:00 PM
Session Eight (Panel C): The Wrap Up

Info: What You Placed in Your Bag, “The Long Game, Cyber Emergency Kit.” Conference Feedback Forms and Sharing What’s In The Bag




Also check out other Business events in Livermore, Conferences in Livermore, Contests in Livermore.

interested
Stay in the loop for updates and never miss a thing. Are you interested?
Yes
No

Ticket Info

Tickets for The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption can be booked here.

Advertisement

Nearby Hotels

Las Positas College, 3000 Campus Hill Drive, Livermore, United States

Just a heads up!

We have gathered all the information for you in one convenient spot, but please keep in mind that these are subject to change. We do our best to keep everything updated, but something might be out of sync. For the latest updates, always check the official event details by clicking the "Find Tickets" button.

Reserve your spot

Host Details

ISC2 East Bay Chapter

ISC2 East Bay Chapter

Are you the host? Claim Event

Advertisement
The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption, 14 November | Event in Livermore | AllEvents
The Long Game: AI-Driven Cyber Strategy in an Era of Global Disruption
Fri, 14 Nov, 2025 at 08:00 am