SCYTHE 5.1 Released  Read More
TRUSTED BY
TRUSTED BY

Discover the Future of Cybersecurity at UniCon 2026! 🦄

Join us for an unmissable online-streamed event on April 09, 2026, from 11:00 AM ET to 5:30 PM ET, where industry leaders converge to redefine proactive defense strategies. 

Dive deep into how modern adversaries operate across IT, OT, and ICS environments, and how security teams can validate resilience in a world increasingly shaped by AI. UniCon 2026 explores adversary-informed defense, proactive security testing, AI-driven and agentic threats, and the management practices required to keep pace as attack surfaces evolve.

Themes and topics for this year 👉

  • Agentic AI as an Attack Surface

  • CTEM That Works: Turning “Findings” into Validated Fixes

  • Living-Off-the-Land + SaaS Control Plane Abuse

  • Ransomware Readiness Beyond Backups

  • Detection Engineering at Scale

  • & much more!

Mark your calendar for UniCon 2026. If your role involves defending real systems against real attackers, this is a conversation worth being part of.

wiley5

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

wiley4-1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Where does it come from

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Where can I get some?

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Where can I get some?

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Powering a Win-Win Ecosystem for All

Nam lacinia orci id leo dignissim vehicula. Sed suscipit, est in suscipit ultrices, magna tortor eleifend nibh,Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum rutrum pharetra

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

Powering a Win-Win Ecosystem for All

Nam lacinia orci id leo dignissim vehicula. Sed suscipit, est in suscipit ultrices, magna tortor eleifend nibh,Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum rutrum pharetra

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

Save the date!  09 April 2026 🦄          Be the first to get agenda updates! 🦄

About SCYTHE's UniCon

UniCon is SCYTHE’s free, virtual conference dedicated to cyber resilience, purple teaming, and proactive security. It dives into Adversary-Informed IT and OT/ICS Security, Security Resilience, and Cybersecurity Management. Built on SCYTHE’s approach of safely emulating real-world adversaries, UniCon gives security teams the insights they need to understand their exposures, validate defenses, and strengthen collaboration between red and blue teams, all to stay ahead of evolving threats with confidence.

SCYTHE is a leader in Adversarial Emulation & Validation (AEV), helping organizations proactively improve their cybersecurity resilience.

📆 09 April 2026

🕑 11:00 AM - 5:30 PM (ET)

Catch a glimpse of UniCon April 2025 to get a feel for the experience, the expert sessions, and everything you can look forward to this time around!


Time Topic Speaker

11:00 – 11:15 AM

Opening Remark Bryson Bort, Founder & CEO of SCYTHE

11:15 – 12:00 PM

Keynote: Cybersecurity in the AI Age

Caroline Wong, Chief Strategy Officer at Axari and author of The AI Cybersecurity Handbook.

12:00 – 12:45 PM

 

Living-Off-the-Land + SaaS Control Plane Abuse

TBC

12:45 – 12:55 PM

Morning Break (10 Minutes)

12:55 – 1:40 PM

Ransomware Readiness Beyond Backups

Michael Rogers, Managing Director, Moxfive

1:40 – 2:25 PM

Detection Engineering at Scale

Tyler Casey, Detection Engineer and Deputy at SCYTHE Labs

2:25 – 2:35 PM

Early Afternoon Break (10 Minutes)

2:35 – 3:15 PM

 

The Status of ICS/OT Cybersecurity

Jason Christopher,  

3:15 - 3:55 PM

IT/OT Convergence: Detecting the Cross-Zone Kill Chain

Alex Waitkus (Southern), OT Cybersecurity Architect, Southern Company

3:55 – 4:05 PM

Late Afternoon Break (10 Minutes)

4:05 – 4:35 PM

Security Ops Automation: Where AI Helps and Where It Breaks

TBC

4:35 – 5:05 PM

An Executive View on Purple Teaming: Turning Adversary Testing into Measurable Defense

Scott Hamilton, Senior Director, Defense Operations and Global Solutions Digital Modernization Defensive Cyber Practice at Leidos

5:05 – 5:30 PM

Closing Panel: The 2026 Validation Blueprint

 

 

Bryson Bort

Founder and CEO at SCYTHE

Caroline Wong

Chief Strategy Officer at Axari

Michael Rogers

Managing Director, Moxfive Focus

Jason Christopher

Senior Vice President, AI, Cybersecurity & Resilience at Energy Impact Partners

Alex Waitkus

OT Cybersecurity Architect, Southern Company

Scott Hamilton

Senior Director, Defense Operations and Global Solutions Digital Modernization Defensive Cyber Practice at Leidos

Tyler Casey

Detection Engineer and Deputy at SCYTHE Labs

Leveraging SCYTHE for Continuous Threat Exposure Management (CTEM)-1

AEV Guide

Our guide 'Leveraging SCYTHE for Continuous Threat Exposure Management (CTEM)' explores how CTEM and AEV transform enterprise cybersecurity from reactive to proactive.

Download
Screenshot 2024-11-26 at 8.28.45 PM

Cyber Fitness Guide

This guide is key to a long-term approach to cyber fitness. Much like personal health, cybersecurity is not a one-time effort—it requires ongoing care, attention, and adjustments.

Download
1-Sep-07-2024-07-15-26-2165-PM

CTI eBook

CTI is a cornerstone of modern cybersecurity, enabling organizations to proactively mitigate evolving cyber threats.

Download
4-4

Offensive Security eBook

For security leaders looking to navigate this challenging landscape, developing a comprehensive strategy is essential.

Download
2-Sep-07-2024-07-16-45-8666-PM

Red Team eBook

This eBook serves as a comprehensive roadmap for organizations at any stage of their Red Team maturity.

Download
Screenshot 2024-09-07 at 11.25.13 PM

CISOs Guide

This framework guides organizations in progressing from ad-hoc exercises to a well-functioning team.

Download

Client Testimonials

left-quote

SCYTHE improves our security control efficacy, optimizing budget spend and ROI, while also enhancing talent development, training, and partner relationships.

Ian Anderson
OG&E
left-quote

SCYTHE's precision in adversarial emulation empowers our red team to simulate real-world threats efficiently, providing actionable insights and focus, while also enabling our blue team to rapidly test and validate security controls, significantly elevating our security posture.

Fortune 100 Insurance Company
left-quote

SCYTHE has truly become an indispensable partner in our pursuit of cyber excellence, continuously empowering us to stay ahead of evolving threats and validate our defenses effectively.

Global 500 Telecommunications Company
left-quote

SCYTHE has cut our MITRE ATT&CK testing from days to just moments.

John Strand
Black Hills Information Security
left-quote

You don’t need to have tens or hundreds of analysts, a blue team, a red team, or cyber-intelligence experts to implement a purple team. You just need great security people interested in researching and understanding attacks. To start, you just need one TTP and a tool capable of receiving logs and generating alerts.

Camilo Ruiz
Dupaco Community Credit Union
left-quote

SCYTHE is a technology every enterprise red team should have so they can prepare the blue team for engagements with cutting-edge offensive teams. The average dwell time of undetected compromises is currently measured in months and SCYTHE enables the red team to give the blue team something realistic to hunt.

Ron Gula
Gula Tech Ventures
CERTIFICATIONS & AWARDS
CERTIFICATIONS & AWARDS

Contact Us

Welcome to SCYTHE, your partner in understanding and defending against cyber attacks. We appreciate your interest in enhancing your cybersecurity defenses.

Please fill the form to reach out to our dedicated team.