Co-hosted by
Co-hosted by
UniCon Sponsors
UniCon Sponsors
TRUSTED BY
TRUSTED BY

Discover the Future of Cybersecurity at UniCon 2025 - Fall Edition! 🦄

Join us for an unmissable online streamed event on September 17, 2025, from 11:00 AM ET to 5:30 PM ET, where industry leaders converge to redefine proactive defense strategies. Hosted by SCYTHE and co-hosted by IANS (featuring a dedicated management track), this edition is proudly sponsored by IANS, VanishID, Nucleus, and Xona.

Dive deep into cutting-edge topics like Adversary-Informed IT and OT/ICS Proactive Security, Security Resilience, and Cybersecurity Management. Gain actionable insights from top experts to fortify your organization's defenses against evolving threats.

Don't wait, mark your calendar today for UniCon 2025 - Fall Edition. This is the cybersecurity event you can't afford to miss! 

wiley5

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

wiley4-1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut vitae sem nunc. Aliquam non lorem dolor. Mauris malesuada risus at maximus. Proin placerat justo in facilisis fermentum sagittis Cras aliquet in quam Praesent bibendumnec iaculis auctor, mauris turpis dapibus tellus, vel molestie mi leo sit amet diam praesent at.

Where does it come from

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Where can I get some?

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Where can I get some?

There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form

Powering a Win-Win Ecosystem for All

Nam lacinia orci id leo dignissim vehicula. Sed suscipit, est in suscipit ultrices, magna tortor eleifend nibh,Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum rutrum pharetra

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

Powering a Win-Win Ecosystem for All

Nam lacinia orci id leo dignissim vehicula. Sed suscipit, est in suscipit ultrices, magna tortor eleifend nibh,Lorem ipsum dolor sit amet, consectetur adipiscing elit. Vestibulum rutrum pharetra

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

200%

Successful Projects

Save the date! 17 September 2025 🦄

About SCYTHE's UniCon

UniCon is SCYTHE’s free, virtual conference dedicated to cyber resilience, purple teaming, and proactive security. This fall, it dives into Adversary-Informed IT and OT/ICS Security, Security Resilience, and Cybersecurity Management. Built on SCYTHE’s approach of safely emulating real-world adversaries, UniCon gives security teams the insights they need to understand their exposures, validate defenses, and strengthen collaboration between red and blue teams, all to stay ahead of evolving threats with confidence.

SCYTHE is a leader in Adversarial Emulation & Validation (AEV), helping organizations proactively improve their cybersecurity resilience.

📆 17 September 2025

🕑 11:00 AM - 5:30 PM (ET)

Catch a glimpse of UniCon April 2025 to get a feel for the experience, the expert sessions, and everything you can look forward to this time around!

Time
Speaker
Session
Talk Description
Track
11:00 - 11.05 AM
Bryson Bort & Marc Brown
UniCon Kick-off
Intro and welcome
Intro and welcome
11:05 - 11:30 AM
Niloo Howe
Fireside Chat
Further details coming
Unicorn
11:30 AM - 12:00 PM
Stay tuned
Further exciting information
To be revealed
Unicorn
12:00 - 12:30 PM
Mea Clift
Back to Basics: why we get it wrong and how to get it right
To be revealed
Unicorn
12:30 - 1:00 PM
Justin Elze & Jamie Williams
Red Teaming
To be revealed
Unicorn
1:00 - 1:15 PM
Sponsor Demo: Vanish ID
Special Demo
Get to know more about VanishID.
Unicorn
1:15 - 1:30 PM
Sponsor Demo: Nucleus
Special Demo
Get to know more about Nucleus.
Unicorn
1:30 - 2:00 PM
Nicole Hoffman & Trey Bilbrey
Threat Emulation & Hunting
Stop Hunting Ghosts and Clickbait. Every week, a new scary headline pops up: a zero-day, nation-state threat, or flashy malware name. The result? Organizations hit the panic button, leadership loses sleep, and teams chase ghosts that never show up. In this Ghostbusters-themed talk, we’ll unpack why these fear cycles haunt security teams, how panic spreads faster than phishing emails, and what it really takes to separate shadows from real specters. If you’re tired of ghost stories running your threat response, it’s time to call in a new crew.
Unicorn
2:00 - 2:30 PM
John Strand & Bryson Bort
The Annual Discussion
Stay tuned for more
Unicorn
2:30 - 3:00 PM
Alex Waintraub
Defending Healthcare
Stay tuned for more
Unicorn
3:00 - 3:15 PM
Gabe Diaz, Senior Solutions Architect, Xona
Sponsor Demo: Xona
Stay tuned for more
Unicorn
3:15 - 3:45 PM
Jake Williams & Liam Emmart
AI and LLMs in Cybersecurity: Offensive and Defensive Applications
AI and LLMs in Cybersecurity: Offensive and Defensive Applications”Explore how AI is reshaping cybersecurity—enhancing red team emulation with automated, adaptive attack generation and strengthening blue team detection—while also introducing risks like AI-powered phishing and adversarial ML attacks. This session will highlight how AI can dynamically create test scenarios aligned to an organization’s test strategy and objectives, optimizing for its unique network architecture, threat landscape, adversary profiles, and security stack. Attendees will also learn about practical validation frameworks for IT and OT environments to separate hype from reality and deliver measurable resilience.
Unicorn
3:45 - 4:15 PM
Bill Brenner
Continuous Threat Exposure Management (CTEM) Programs
“Continuous Threat Exposure Management (CTEM) Programs”Learn how to build effective CTEM cycles—scoping, discovery, prioritization, validation, and mobilization—to deliver continuous insight into vulnerabilities. This session explores integrating red/blue team exercises across IT/OT environments, with a focus on automated testing in industrial settings to strengthen resilience.
Unicorn
4:15 - 4:45 PM
Stay tuned
Further information coming
-
Unicorn
4:45 - 5:00 PM
SCYTHE Demo
Further information coming
-
Unicorn
5:00 - 5:25 PM
Chris Cochran
Closing Keynote
Stay tuned
Unicorn
Time
Speaker
Session
Talk Description
Track
11:30 AM - 01:00 PM
Jennifer Minella
Regulations, Frameworks & Gaps: What’s New in OT/ICS Cybersecurity
As industrial systems become more connected, regulatory momentum is catching up. In this session, we’ll walk through the latest cross-sector regulations and frameworks shaping OT/ICS cybersecurity in 2025, from NIS2 and CISA CPGs to pending zero-trust overlays and ISA/IEC 62443 evolutions. We’ll explore what these initiatives get right, where they fall short, and the common themes emerging across sectors. Expect candid insights on implementation challenges, coverage gaps, and what security architects, operators, and integrators need to prepare for next.
IANS
1:00 - 1:15 PM
Sponsor Demo
SCYTHE
-
IANS
1:15 - 1:30 PM
Gabe Diaz
Sponsor Demo: Xona
-
IANS
1:30 - 3:00 PM
Mollie Breen
Further details coming
Further details coming
IANS
3:00 - 3:15 PM
Sponsor Demo
Vanish ID
Further details coming
IANS
3:15 - 4:45 PM
Steve Martano & Nick Kakolowski
OT Complexity Changing the CISO Role in Manufacturing
The manufacturing sector has long been viewed as a laggard in infosec — dependent on specialized technologies, focused on production and slow to adopt digital capabilities but the threat environment has only become more challenging to defend against. The industry has been going through a digital revolution in recent years, and the rapid adoption of connected operational technologies is changing the CISO role in manufacturing. In this session, IANS Faculty Steve Martano and Senior Research Director Nick Kakolowski will use data from the IANS and Artico CISO Compensation and Budget Survey to discuss the manufacturing sector's ongoing evolution, particularly as it related to IoT and OT challenges. They'll provide a blend of benchmarking data and real-time market perspective to better help unpack this complex and highly-dynamic threat environment. They will help you benchmark against your peer group within the sector and offer guidance on how to advance your program in a shifting marketplace.
IANS
4:45 - 5:00 PM
Sponsor Demo
Nucleus
-
IANS
Time
Speaker
Session
Talk Description
Track
11:30 AM - 01:00 PM
Sponsors & Partners
Further details coming
-
Partner
01:00 - 01:15 PM
Gabe Diaz
Sponsor Demo: Xona
-
Partner
1:15 - 1:30 PM
SCYTHE
Sponsor Demo
-
Partner
1:30 - 3:00 PM
Raed Albuliwi
Session #1: Disconnected Access — Closing OT’s #1 Threat Vector
Session #2: Customer Spotlight: Securing Vendor and OEM Access in Critical Infrastructure
Remote services such as VPN, RDP, and TeamViewer remain the top initial access vector for ransomware and other cyberattacks against operational technology (OT) environments. Despite years of investment in firewalls, segmentation, and monitoring, attackers continue to exploit these legacy connections as a direct pathway into critical infrastructure. This session will explore how Disconnected Access, an approach that removes direct network connectivity between user endpoints and OT systems, represents a shift in industrial cybersecurity. We will discuss why traditional remote access technologies have failed OT, how attackers exploit insecure vendor and OEM connections, and what leading organizations are doing differently to protect uptime while reducing costs. Attendees will gain a pragmatic framework for transitioning away from legacy access tools, while maintaining compliance with NERC CIP, IEC 62443, TSA SD2, and other mandates. And we'll present a customer example and how they transformed third-party access into a secure, auditable, and cost-efficient process.
Partner
3:00 - 3:15 PM
Nucleus
Sponsor Demo
-
Partner

Niloo Howe

President of The Stratham Group & Member Board of Directors at Tenable

Justin Elze

CTO - TrustedSec

Bryson Bort

Founder and CEO at SCYTHE

Jamie Williams

Senior Red Team Engineer at CrowdStrike

Bill Brenner

SVP, Audience Content Strategy - Cyber Risk Alliance

Nicole Hoffman

Senior Cyber Threat Intelligence Analyst

Gabe Diaz

Senior Solutions Architect at Xona

Alex Waintraub

Senior Director of Cybersecurity at Morae

Mollie Breen

IANS Faculty and CEO & Founder at Perygee

Marc Brown

Head of Sales, Marketing & Product at SCYTHE

John Strand

Founder and CEO of Black Hills Information Security

Jake Williams

VP of R&D at Hunter Strategy and Faculty Member at IANS

Liam Emmart

Technical Lead at SCYTHE

Chris Cochran

Senior Advisor (AI & SecOps) at SANS Institute & Founder at Commandant AI

Jennifer Minella

Faculty Member at IANS and Founder and Principal Advisor, Network Security at Viszen Security

Steve Martano

Faculty at IANS and Founder at Artico Search

Nick Kakolowski

Senior Research Director - IANS

Raed Albuliwi

Chief Product Officer at Xona

Leveraging SCYTHE for Continuous Threat Exposure Management (CTEM)-1

AEV Guide

Our guide 'Leveraging SCYTHE for Continuous Threat Exposure Management (CTEM)' explores how CTEM and AEV transform enterprise cybersecurity from reactive to proactive.

Download
Screenshot 2024-11-26 at 8.28.45 PM

Cyber Fitness Guide

This guide is key to a long-term approach to cyber fitness. Much like personal health, cybersecurity is not a one-time effort—it requires ongoing care, attention, and adjustments.

Download
1-Sep-07-2024-07-15-26-2165-PM

CTI eBook

CTI is a cornerstone of modern cybersecurity, enabling organizations to proactively mitigate evolving cyber threats.

Download
4-4

Offensive Security eBook

For security leaders looking to navigate this challenging landscape, developing a comprehensive strategy is essential.

Download
2-Sep-07-2024-07-16-45-8666-PM

Red Team eBook

This eBook serves as a comprehensive roadmap for organizations at any stage of their Red Team maturity.

Download
Screenshot 2024-09-07 at 11.25.13 PM

CISOs Guide

This framework guides organizations in progressing from ad-hoc exercises to a well-functioning team.

Download

Client Testimonials

left-quote

SCYTHE improves our security control efficacy, optimizing budget spend and ROI, while also enhancing talent development, training, and partner relationships.

Ian Anderson
OG&E
left-quote

SCYTHE's precision in adversarial emulation empowers our red team to simulate real-world threats efficiently, providing actionable insights and focus, while also enabling our blue team to rapidly test and validate security controls, significantly elevating our security posture.

Fortune 100 Insurance Company
left-quote

SCYTHE has truly become an indispensable partner in our pursuit of cyber excellence, continuously empowering us to stay ahead of evolving threats and validate our defenses effectively.

Global 500 Telecommunications Company
left-quote

SCYTHE has cut our MITRE ATT&CK testing from days to just moments.

John Strand
Black Hills Information Security
left-quote

You don’t need to have tens or hundreds of analysts, a blue team, a red team, or cyber-intelligence experts to implement a purple team. You just need great security people interested in researching and understanding attacks. To start, you just need one TTP and a tool capable of receiving logs and generating alerts.

Camilo Ruiz
Dupaco Community Credit Union
left-quote

SCYTHE is a technology every enterprise red team should have so they can prepare the blue team for engagements with cutting-edge offensive teams. The average dwell time of undetected compromises is currently measured in months and SCYTHE enables the red team to give the blue team something realistic to hunt.

Ron Gula
Gula Tech Ventures
CERTIFICATIONS & AWARDS
CERTIFICATIONS & AWARDS

Contact Us

Welcome to SCYTHE, your partner in understanding and defending against cyber attacks. We appreciate your interest in enhancing your cybersecurity defenses.

Please fill the form to reach out to our dedicated team.