top of page
Search

The SVCC 2025 Industry Sessions Shaping the Future of Cybersecurity By Silicon Valley Cybersecurity Institute (SVCSI)

  • Writer: Event Manager SVCSI
    Event Manager SVCSI
  • Aug 31
  • 5 min read

The future of cybersecurity isn’t arriving tomorrow; it’s being built today. And this year, at SVCC 2025 supported by IEEE and IEEE Computer Society, that future came alive through a series of powerful, forward-thinking, and deeply collaborative Industry Sessions, hosted by the Silicon Valley Cybersecurity Institute (SVCSI).

With the generous support of industry powerhouses such as Google, Juniper Networks, and Adobe, the Industry Sessions brought together some of the brightest minds in cybersecurity, including engineers, researchers, policy advocates, and product leaders. Together, we posed big questions, shared practical solutions, and sparked conversations that will resonate far beyond the conference walls.

This wasn’t just a gathering of experts; it was a collective movement pushing the boundaries of what’s possible in digital security.


ree


Key Learning From SVCSI Industry Sessions at SVCC 2025


Google: Elevating Security with AI and Cloud

Doug Ko, Head of Cloud & AI Security Product Marketing at Google, opened the sessions with a call to think bigger: to imagine security not as a reactive measure, but as an autonomous, intelligent system deeply embedded into every layer of the cloud.


ree

“Security must be invisible, intelligent, and everywhere. With AI-driven threat detection, we’re moving toward a world where cyber defense is not just reactive, but predictive and autonomous.”




Doug’s session explored how Google’s security model, built on Zero Trust and AI, has reduced incident response time by over 60% across enterprise users. Autonomic Security Operations now combine real-time telemetry, playbooks, and Gemini AI to identify and act within minutes. This is no longer a concept for the future; it’s already in practice within global organizations.



Adobe: Making Threat Intelligence Instant and AccurateOmkar Nimbalkar and Uppu Sai Kiran from Adobe demonstrated how they’re transforming threat intelligence workflows through AI. By automating the extraction and enrichment of indicators of compromise (IOCs), their team enables faster detection and decision-making.


ree

“AI is not just an accelerator; it’s a force multiplier for security teams.” Thanks to these innovations, Adobe has cut IOC triage time from two hours to under ten minutes. Analysts now act on enriched, high-confidence data rather than spending time on repetitive tasks.



Juniper Networks: The Rise of Self-Driving Networks

Juniper introduced a powerful concept — the self-driving network. These AI-native infrastructures are capable of healing, optimizing, and protecting themselves in real time.


ree
ree

“Our vision is a self-driving network—one that adapts, heals, and protects itself in real time so that organizations can focus on innovation, not firefighting.” - Juniper Networks






Organizations that have adopted this model have already seen a 75 percent reduction in downtime in the past year. It’s not science fiction. These adaptive networks are up and running in enterprise environments today. 



Meta and Airbnb: AI Agents for Vulnerability Management

Faizan Ahmad of Meta explained how large language models (LLMs) are being trained to understand code rather than simply scan it. These AI agents simulate attacker logic and detect vulnerabilities early in the software development lifecycle.

“Large language models are not just understanding code—they’re finding flaws before attackers do.”


ree

At Airbnb, Mudita Khurana emphasized how security is constantly evolving. Her team uses red teaming exercises, anomaly detection, and threat modeling to stay ahead of sophisticated attackers.

“Security is a journey, not a destination. At Airbnb, we’re constantly evolving our defenses to match the creativity of attackers.”

Together, their talk highlighted that scalable, intelligent, and continuous security is already taking shape across modern platforms.




Microsoft: Embedding Ethics into Every Layer of Defense

Abhilasha Bhargav-Spantzel from Microsoft offered a fresh and necessary perspective: security must also be ethical. As AI automates more decisions, responsible design becomes critical.

ree

“Ethics is the new firewall. As we build smarter defenses, we must also build fairer systems—security and trust must go hand in hand.”

She outlined how fairness, transparency, and inclusivity can be embedded into everything from access controls to threat scoring.



Salesforce: Keeping Customers Connected Through Any Attack

Salesforce security engineers Simone Mainardi, Kaushal Bansal, and Prabhat Singh focused on defending platform availability during volumetric DDoS attacks. Their approach combines traffic prediction, edge-routing, and coordinated cloud mitigation.

“Availability is security. Our mission is to ensure that even under attack, our customers remain connected and protected.”

With these strategies in place, Salesforce is maintaining 99.99 % uptime for customers, even during peak attack windows.


Braven: Catalyzing Cyber Careers


ree

Braven’s booth at SVCC 2025 highlighted how leadership development and career readiness intersect with cybersecurity, drawing interest from attendees eager to build both technical and professional skills. Featuring "The Braven Experience," hands-on resources, and opportunities for engagement, the table underscored the importance of cultivating future-ready talent in the growing cyber sector. Their presence reinforced the vital role of mentorship and workforce development in strengthening the cybersecurity community.


Keysight Technologies: Simulating Sophisticated Adversaries

Nick Marcuse of Keysight emphasized that defense must be tested against the most advanced attack simulations possible. His team builds realistic emulation environments that mimic adversaries with nation-state sophistication.


ree

“Realistic testing is the only way to know if your defenses will hold. Simulated attacks must be as cunning as real adversaries.”


Organizations using these simulation methods have improved detection and response accuracy by more than 40 percent. Preparation through realism is proving essential.


AI and LLMs: The Double-Edged Sword

Kiarash Ahi highlighted how large language models can serve both attackers and defenders. While they enable faster code review, anomaly detection, and automation for good, they also help bad actors create more effective phishing attacks and malware.

“LLMs are the ultimate double-edged sword: they can empower defenders or supercharge attackers. The difference is how we wield them.”

His session sparked important discussions around governance, monitoring, and ethical deployment.


Cisco and Trace3: Risk-Based Defense and Ransomware Readiness

Hina Gandhi of Cisco advocated for prioritizing vulnerabilities based on true risk. By focusing on what’s exploitable and impactful, teams can reduce patch fatigue while strengthening security.

“Not all vulnerabilities are created equal. Prioritization is the key to effective risk management.”

Boomchi Kumar of Trace3 closed the sessions with a powerful reminder. Ransomware resilience starts with preparation, not negotiation.

“Paying ransom is not a strategy—it’s a setback. Resilience is built on preparation, not negotiation.” 

His recommendations included immutable backups, response rehearsals, and zero-trust isolation—all essential in today’s attack landscape.


A Cybersecurity Movement in Motion

The SVCC 2025 Industry Sessions proved that cybersecurity is no longer a single-player game. It is a community effort rooted in shared knowledge, bold experimentation, and relentless pursuit of innovation.

At SVCSI, we’re proud to bring together thinkers, builders, defenders, and disruptors from across the ecosystem. Together, we are not just keeping up with the future. We are defining it.

To everyone who attended, spoke, supported, and shared - Thank you. You are the future of cybersecurity.



To stay involved with SVCSI, visit www.svcsi.org for updates, initiatives, and upcoming programs. Follow us on LinkedIn to keep the conversation going.




 
 

Silicon Valley Cybersecurity Institute

SVCSI is a 501(c)(3) non-profit organization (Public Charity)

logo.png

Email: event DOT manager AT svcsi.org

Get Monthly Updates

© 2025 SVCSI. All rights reserved.

All content on this website is protected by copyright law and may not be reproduced, distributed, transmitted, displayed, published, or broadcast without the prior written permission of the copyright holder, SVCSI.

Quick Links

© Silicon Valley Cybersecurity Institute 2023 |  Terms of Use  |  Privacy Policy

bottom of page