UniCon Sponsors
UniCon Sponsors
TRUSTED BY
TRUSTED BY

Discover the Future of Cybersecurity at UniCon 2026! 🦄

Join us for an unmissable online-streamed event on April 09, 2026, from 11:00 AM ET to 5:30 PM ET, where industry leaders converge to redefine proactive defense strategies. 

Dive deep into how modern adversaries operate across IT, OT, and ICS environments, and how security teams can validate resilience in a world increasingly shaped by AI. UniCon 2026 explores adversary-informed defense, proactive security testing, AI-driven and agentic threats, and the management practices required to keep pace as attack surfaces evolve.

Mark your calendar for UniCon 2026. If your role involves defending real systems against real attackers, this is a conversation worth being part of.

wiley5

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

wiley4-1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Where does it come from

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Where can I get some?

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Where can I get some?

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Powering a Win-Win Ecosystem for All

Nam lacinia orci id leo dignissim vehicula. Sed suscipit, est in suscipit ultrices, magna tortor eleifend nibh,Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum rutrum pharetra

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

Powering a Win-Win Ecosystem for All

Nam lacinia orci id leo dignissim vehicula. Sed suscipit, est in suscipit ultrices, magna tortor eleifend nibh,Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum rutrum pharetra

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

Save the date! 09 September 2026 🦄 Be the first to get agenda updates! 🦄

About SCYTHE's UniCon

UniCon is SCYTHE’s free, virtual conference dedicated to cyber resilience, purple teaming, and proactive security. This fall, it dives into Adversary-Informed IT and OT/ICS Security, Security Resilience, and Cybersecurity Management. Built on SCYTHE’s approach of safely emulating real-world adversaries, UniCon gives security teams the insights they need to understand their exposures, validate defenses, and strengthen collaboration between red and blue teams, all to stay ahead of evolving threats with confidence.

SCYTHE is a leader in Adversarial Emulation & Validation (AEV), helping organizations proactively improve their cybersecurity resilience.

📆 09 April 2026

🕑 11:00 AM - 5:30 PM (ET)

Catch a glimpse of UniCon April 2025 to get a feel for the experience, the expert sessions, and everything you can look forward to this time around!

Niloo Howe

President of The Stratham Group & Member Board of Directors at Tenable

Justin Elze

CTO - TrustedSec

Bryson Bort

Founder and CEO at SCYTHE

Jamie Williams

Senior Red Team Engineer at CrowdStrike

Bill Brenner

SVP, Audience Content Strategy - Cyber Risk Alliance

Gerald Auger

Chief Content Creator - Simply Cyber

Nicole Hoffman

Senior Cyber Threat Intelligence Analyst

Matt Polak

CEO of VanishID

Gabe Diaz

Senior Solutions Architect at Xona

Alex Waintraub

Cybersecurity Leader

Mollie Breen

IANS Faculty and CEO & Founder at Perygee

Marc Brown

Head of Sales, Marketing & Product at SCYTHE

John Strand

Founder and CEO of Black Hills Information Security

Jake Williams

VP of R&D at Hunter Strategy and Faculty Member at IANS

Liam Emmart

Technical Lead at SCYTHE

Chris Cochran

Senior Advisor (AI & SecOps) at SANS Institute & Founder at Commandant AI

Jennifer Minella

Faculty Member at IANS and Founder and Principal Advisor, Network Security at Viszen Security

Steve Martano

Faculty at IANS and Founder at Artico Search

Nick Kakolowski

Senior Research Director - IANS

Raed Albuliwi

Chief Product Officer at Xona

Jason D. Christopher

Senior Vice President of Cybersecurity and Digital Transformation for Research & Innovation at Energy Impact Partners (EIP)

Danielle Schneider

OSINT Expert at VanishID

Steve Carter

Co-founder and CEO, Nucleus

Christopher Peltz

Director of Security Strategy & Architecture - Guidepoint

Leveraging SCYTHE for Continuous Threat Exposure Management (CTEM)-1

AEV Guide

Our guide 'Leveraging SCYTHE for Continuous Threat Exposure Management (CTEM)' explores how CTEM and AEV transform enterprise cybersecurity from reactive to proactive.

Download
Screenshot 2024-11-26 at 8.28.45 PM

Cyber Fitness Guide

This guide is key to a long-term approach to cyber fitness. Much like personal health, cybersecurity is not a one-time effort—it requires ongoing care, attention, and adjustments.

Download
1-Sep-07-2024-07-15-26-2165-PM

CTI eBook

CTI is a cornerstone of modern cybersecurity, enabling organizations to proactively mitigate evolving cyber threats.

Download
4-4

Offensive Security eBook

For security leaders looking to navigate this challenging landscape, developing a comprehensive strategy is essential.

Download
2-Sep-07-2024-07-16-45-8666-PM

Red Team eBook

This eBook serves as a comprehensive roadmap for organizations at any stage of their Red Team maturity.

Download
Screenshot 2024-09-07 at 11.25.13 PM

CISOs Guide

This framework guides organizations in progressing from ad-hoc exercises to a well-functioning team.

Download

Client Testimonials

left-quote

SCYTHE improves our security control efficacy, optimizing budget spend and ROI, while also enhancing talent development, training, and partner relationships.

Ian Anderson
OG&E
left-quote

SCYTHE's precision in adversarial emulation empowers our red team to simulate real-world threats efficiently, providing actionable insights and focus, while also enabling our blue team to rapidly test and validate security controls, significantly elevating our security posture.

Fortune 100 Insurance Company
left-quote

SCYTHE has truly become an indispensable partner in our pursuit of cyber excellence, continuously empowering us to stay ahead of evolving threats and validate our defenses effectively.

Global 500 Telecommunications Company
left-quote

SCYTHE has cut our MITRE ATT&CK testing from days to just moments.

John Strand
Black Hills Information Security
left-quote

You don’t need to have tens or hundreds of analysts, a blue team, a red team, or cyber-intelligence experts to implement a purple team. You just need great security people interested in researching and understanding attacks. To start, you just need one TTP and a tool capable of receiving logs and generating alerts.

Camilo Ruiz
Dupaco Community Credit Union
left-quote

SCYTHE is a technology every enterprise red team should have so they can prepare the blue team for engagements with cutting-edge offensive teams. The average dwell time of undetected compromises is currently measured in months and SCYTHE enables the red team to give the blue team something realistic to hunt.

Ron Gula
Gula Tech Ventures
CERTIFICATIONS & AWARDS
CERTIFICATIONS & AWARDS

Contact Us

Welcome to SCYTHE, your partner in understanding and defending against cyber attacks. We appreciate your interest in enhancing your cybersecurity defenses.

Please fill the form to reach out to our dedicated team.