Cover Image for Risk Awareness Now: Year in Review β€” Attacks, Breaches & Data Leaks (US & North America)
Cover Image for Risk Awareness Now: Year in Review β€” Attacks, Breaches & Data Leaks (US & North America)
Avatar for GeoCyber Systems LLC
43 Went

Risk Awareness Now: Year in Review β€” Attacks, Breaches & Data Leaks (US & North America)

Virtual
Registration
Past Event
Welcome! To join the event, please register below.
About Event

​Risk Awareness Now: Year in Review β€” Attacks, Breaches & Data Leaks

​US & North America Edition

β€‹πŸ“… Saturday, March 7, 2026
⏰ 10:00 AM – 2:15 PM Pacific Time
πŸ“ YouTube Live
πŸ’° Free
🎯 Hosted by GeoCyber Systems LLC

​This edition is designed for US and North American security, cloud, and risk leaders.


​About This Event

​Cyber risk did not slow down in 2025. It accelerated.

​Across the US and North America, organizations faced AI-enabled scams, identity compromise, SaaS and supply-chain failures, and large-scale data leaks with direct operational, financial, and regulatory impact. Many incidents were not isolated technical failures but compounding breakdowns across identity, cloud access, third-party exposure, and recovery readiness.

​Risk Awareness Now 2026: US & North America Edition brings together security, cloud, and risk leaders to examine what actually happened in 2025 and what must change as teams move into 2026.

​Across five focused sessions, this virtual summit reviews the year’s most consequential incidents, the role of AI and identity in modern attacks, and the defensive practices, playbooks, and continuity strategies that proved effective in real environments.

​You’ll leave with a clear, practical 90-day action framework you can take back to your team, your executives, and your board.

​Who Should Attend

  • ​CISOs and security leaders

  • ​Cloud, SaaS, and identity owners

  • ​Risk, resilience, BCDR, and GRC professionals

  • ​Cybersecurity practitioners focused on modern defense

  • ​Founders and technology leaders accountable for continuity and resilience

​Whether you’re refining your 2026 strategy, responding to board-level pressure, or translating last year’s incidents into action, this event is designed for you.

​What You’ll Learn

  • ​Failure patterns from major 2025 breaches affecting US and global organizations

  • ​How AI, identity abuse, and SaaS reshaped attacker scale and speed

  • ​Which detection, containment, and recovery practices worked in North American environments

  • ​How to build a 90-day action plan aligned with operational and business expectations

​Event Playlist: https://bit.ly/YIR_Playlist

​Agenda

β€‹πŸŸ  Opening Plenary β€” 30 Minutes

​2025: The Year in Attacks, Breaches & Data Leaks
πŸ•™ 10:00 AM PT | 1:00 PM ET

​Philippa Burgess, Sherry Duncan, Dirce Hernandez, John McNicholas, Frank Unpingco III

​Join us on YouTube: https://bit.ly/YIR_Open

  • ​Welcome and meet the speakers

  • ​Establish a shared threat landscape for 2025

  • ​Review the most consequential attacks and breaches

  • ​Examine AI-driven attack scale and identity as a primary failure surface

  • ​Highlight regulatory and insurance pressure

  • ​Frame why 2026 will accelerate and amplify these realities, forcing continued adaptation and upskilling

β€‹πŸ”΅ Session 1 β€” 45 Minutes

​AI-Enabled Attacks: From Novelty to Default Tactic
πŸ•₯ 10:30 AM PT | 1:30 PM ET

​Dirce Hernandez

​Join us on YouTube: https://bit.ly/YIR_1

  • ​2025 AI-generated phishing and deepfake fraud cases

  • ​Automated reconnaissance and scaled targeting

  • ​Where traditional controls failed

  • ​Implications for 2026 threat modeling and monitoring

β€‹πŸŸ’ Session 2 β€” 45 Minutes

​Identity Was the Breach: IAM, Cloud Access, and Privilege Abuse
πŸ•¦ 11:15 AM PT | 2:15 PM ET

​Sherry Duncan

​Join us on YouTube: https://bit.ly/YIR_2

  • ​Identity compromise patterns across cloud and SaaS

  • ​Token theft, OAuth abuse, and privilege escalation

  • ​Why MFA alone failed

  • ​What identity-first security must look like in 2026

β€‹πŸŸ‘ Session 3 β€” 45 Minutes

​When People Became the Breach: Social Engineering, MFA Bypass & Identity Workflow Abuse

β€‹πŸ•› 12:00 PM PT | 3:00 PM ET

​John McNicholas

​Join us on YouTube: https://bit.ly/YIR_3

  • ​2025 incidents where attackers abused help desks, support portals, and identity reset workflows to log in instead of break in

  • ​AI-generated voice and video impersonation, MFA fatigue attacks, and device-code/OAuth tricks that bypassed strong technical controls

  • ​How privacy gaps and oversharing amplified identity compromise and account takeover risk across regions

  • ​Practical 2026 upgrades to verification, identity reset, approval, and recovery workflows for global security and IAM teams

β€‹πŸŸ  Session 4 β€” 45 Minutes

​Defense That Worked: Detection, Containment, and Recovery Wins

β€‹πŸ•§ 12:45 PM PT | 3:45 PM ET

​Frank Unpingco III

​Join Us on YouTube: https://bit.ly/YIR_4

  • ​Early detection and reduced blast radius examples

  • ​SOC workflows that cut dwell time

  • ​Identity containment, segmentation, and recovery in practice

  • ​Repeatable playbooks and tabletop approaches

β€‹πŸŸ£ Session 5 β€” 45 Minutes

​Preparing for 2026: Threat Forecasts and the First 90 Days

β€‹πŸ•œ 1:30 PM PT | 4:30 PM ET

​Philippa Burgess

​Join us on YouTube: https://bit.ly/YIR_5

  • ​Likely attacker behavior and pressure points in 2026

  • ​Continued evolution of AI-enabled threats and SaaS blast radius

  • ​What to stop, start, and reinforce immediately

  • ​A concrete 90-day action frame for security and risk leaders

​

​Event Playlist: https://bit.ly/YIR_Playlist

Avatar for GeoCyber Systems LLC
43 Went