UniCon 2025: Key Insights from Cyber Experts on Evolving Threats and Strategies

UniCon 2025 brought together some of the brightest minds in cybersecurity to tackle the most pressing issues and innovations shaping the future of digital defense. From the role of AI in security to building autonomous systems for breach and attack simulations, the conference covered a wide range of topics that will leave you thinking about your organization’s cybersecurity strategy in new ways. Here’s a breakdown of the key insights shared by the experts.

 

1. Ron Gula’s Keynote: The Evolving Cyber Threat Landscape

Key Takeaways:

Cybersecurity is Still Catching Up to Attackers: Ron Gula, President and Co-Founder of Gula Tech Adventures, emphasized that while we’ve seen improvements in tools like EDR, sandboxing, and AI, cybersecurity is still playing catch-up with increasingly sophisticated attackers.

AI in Cybersecurity: AI is more of an incremental improvement rather than a transformative force in cybersecurity. While it can help improve the efficiency of security analysts, it’s not yet a game-changer.

Why Cyber Needs to Be Professionalized: The future of cybersecurity should be about professionalizing the field, much like healthcare and finance. It’s not just about fighting hackers anymore—it's about creating resilient systems, managing data privacy, and developing a culture of trust and governance.

AI Governance: As AI tools become more integrated into cybersecurity, there’s an urgent need for governance to ensure compliance, protect intellectual property, and ensure organizations are using these tools responsibly.

Speaker: Ron Gula, President and Co-Founder of Gula Tech Adventures

2. Sunil Yu on AI in Cybersecurity: Separating Hype from Reality

Key Takeaways:

AI for Security: Useful, But Not a Superhero Yet: Sunil Yu, CTO of Knostic, highlighted that while AI tools like Microsoft’s Security Copilot show potential, they are not yet revolutionary. For seasoned security professionals, the value is limited, but for newcomers to cybersecurity, these tools can significantly improve outcomes.

Tools for Doing, Tools for Thinking: Yu stressed that AI needs both tools for execution and tools for analysis to evolve into something more than just a buzzword. By equipping AI with the right tools to think critically, we can unlock its true potential in cybersecurity.

AI Models and Their Limitations: Many AI systems still fall short of addressing the nuanced needs of cybersecurity. Yu pointed out that while AI can process vast amounts of data, it lacks the ability to understand complex contexts, which is crucial for effective cybersecurity.

Speaker: Sunil Yu, CTO at Knostic

3. Jackson Wells: Building an Automating Breach and Attack Simulation (BAS) Process

Key Takeaways:

Automate the Test, Don’t Just Run It: Jackson Wells, Breach and Attack Simulation Lead at Toyota, shared insights on building autonomous BAS programs. Automation is key to testing security systems without disrupting day-to-day operations. By automating simulations, organizations can identify vulnerabilities in real-time and ensure continuous improvement.

Continuous Improvement Through Data: With automated BAS, organizations can effectively gather data on how their systems react to simulated attacks. This helps security teams prioritize gaps based on real-world scenarios and better protect against future breaches.

Data-Driven Decisions: Wells emphasized that automated systems allow security teams to make data-driven decisions, using insights from ongoing tests to refine security strategies.

Speaker: Jackson Wells, Breach and Attack Simulation Lead at Toyota

4. Ian Anderson on Cyber Resilience: More Than Detection

Key Takeaways:

Cyber Resilience is Key: Ian Anderson, Director of Enterprise Security at OG&E, explained that true cyber resilience goes beyond simply detecting attacks. Organizations must be ready to recover quickly when breaches occur. Resilience involves not only having the right tools but also building a culture of preparedness.


Red-Blue Hybrid Exercises: Anderson advocated for hybrid red-blue team exercises to enhance organizational resilience. These exercises help teams practice how to respond to live attacks and improve the overall security posture.

Ready for Anything: Building resilience means expecting the unexpected. The ability to adapt and recover quickly is just as important as preventing attacks.

Speaker: Ian Anderson, Director of Enterprise Security at OG&E 

5. Bryson Bort: Continuous Threat Exposure Management (CTEM)

Key Takeaways:

It’s About More Than Testing: Bryson Bort, Founder and CEO of SCYTHE, introduced Continuous Threat Exposure Management (CTEM). He emphasized that CTEM is about ongoing validation of your security systems, continuously assessing and improving defenses. It's not just about running tests—it's about using those tests to learn and adapt.

Test, Validate, and Remediate: A successful CTEM program doesn't stop at validation. It also provides actionable remediation steps to close exposures and strengthen defenses, ensuring systems are prepared for a wide range of attacks.

Professional Transparency: Bort discussed how transparency in testing, validation, and remediation is critical to building trust and ensuring organizations remain secure in the face of evolving threats.

Speaker: Bryson Bort, Founder and CEO of SCYTHE

6. Panel on Cybersecurity’s Future: Trust, Privacy, and the Power of AI

Key Takeaways:

AI’s Role in Security: The panel discussed how AI is being used to enhance threat detection and response but also warned of the privacy challenges it brings. As AI becomes more integrated into security operations, organizations must ensure they are using these tools responsibly and protecting sensitive data.

The Growing Importance of Privacy: With the increasing use of AI tools, the need for strong privacy controls has never been greater. The panel emphasized the importance of separating sensitive data from the open internet and ensuring compliance with data protection regulations.

Building Trust Through Governance: Trust in AI and cybersecurity tools can only be built through solid governance frameworks. Organizations must stay vigilant in how they adopt new technologies, ensuring they align with their privacy and security policies.

Speakers: Panelists from various cybersecurity organizations, including Olivia Rose (CISO & Founder of Rose CISO Group), Phil Gardner (CEO of IANS), and Jim Webster (CISO at SCYTHE)

7. Danny’s Cybersecurity Game: Learning Through Fun

Key Takeaways:

Engagement Through Gamification: To end the conference on a fun note, Danny ran a cybersecurity game that helped participants learn while having fun. The game emphasized that cybersecurity doesn’t have to be a dry, technical field. Engaging employees and stakeholders through interactive activities can be a great way to foster a culture of learning.

Collaborative Learning: The game also highlighted the importance of teamwork in cybersecurity. By working together, teams can improve their understanding of security challenges and develop better responses to potential threats.

Speaker: Danny Akacki, Client Security Strategy Director at Coalfire

Wrapping Up: The Road Ahead for Cybersecurity Professionals

UniCon 2025 reinforced the idea that cybersecurity is more than just a set of tools or technologies; it's about continuous learning, adapting to new threats, and fostering a culture of resilience. From AI-driven tools to continuous threat validation, the future of cybersecurity lies in staying one step ahead of attackers by embracing both technological innovations and strategic improvements.

The key takeaway? Whether you're a seasoned expert or just starting, cybersecurity is an ever-evolving field that requires constant attention, collaboration, and adaptation. The journey to a safer digital world starts now.