Cyburgh 2026 painted a clear picture of a cybersecurity landscape that is faster, messier and more interconnected than ever. Across the keynote and four panel discussions, one theme kept surfacing: organizations are no longer dealing with isolated cyber risks. AI, identity, third-party dependencies and ransomware are now tangled together into one operational challenge where visibility, speed, accountability and preparedness determine who recovers and who spirals.
The keynote conversation featuring Richard Evanchec of the FBI Pittsburgh Field Office, Kelly Locher of the U.S. Attorney’s Office for the Western District of Pennsylvania and David Kane of Ethical Intruder set the tone by grounding the day in ransomware reality. Evanchec noted that ransomware has shifted from classic encryption events toward straight data theft and extortion, where attackers steal information, evaluate its value and pressure organizations to pay. He also warned that AI is helping attackers better understand stolen data and sharpen social engineering, while Locher emphasized that early engagement with law enforcement is critical because the window between intrusion and data exfiltration continues to shrink. Their message was practical and direct: build FBI relationships before a crisis, preserve evidence, validate backups and treat cybersecurity investment as a core business necessity, not overhead.
The AI Security in Production panel showed how quickly AI has escaped the boundaries of formal policy. Panelists made it clear that AI is already being used across enterprises through tools like Copilot, ChatGPT, Claude, Perplexity and countless embedded vendor platforms. The risk is not simply that AI exists, but that security teams may not know where it is being used, what data it touches or whether controls are actually being enforced. A major trend revealed here was the rise of “agentic” AI as a new identity and insider-risk problem. AI agents are beginning to act on behalf of users, interact with systems and automate work, which means organizations must manage them through identity controls, least privilege, logging, monitoring and shutdown procedures.
The Practical Security that Works panel dug deeper into identity as the new battleground. MFA, once treated as a milestone, is now only a baseline. Panelists discussed session hijacking, token theft, adversary-in-the-middle attacks, over-permissioned users and unmanaged service accounts as today’s practical identity risks. The trend line is clear: organizations must move toward phishing-resistant authentication, continuous validation, conditional access, device posture checks and stronger lifecycle management. The panel also raised a growing concern around non-human identities, including service accounts, bots and AI agents. These identities can become invisible pools of privilege unless someone owns them, audits them and limits what they can do.
Third-party risk emerged as another major pressure point. The Third Party Risk panel challenged the old model of static questionnaires and annual vendor reviews, with panelists arguing that endless forms often create more paperwork than risk reduction. The new direction is continuous monitoring, simplified risk tiering, stronger contracts, better vendor inventories and more meaningful relationships with critical suppliers. One particularly useful takeaway was treating vendor relationships like assets: know what data is shared, what systems are connected, what business function depends on the vendor and what happens if that vendor goes down. The panel also pointed to tabletop exercises with key vendors as a practical way to reveal gaps that no questionnaire will uncover.
The closing ransomware panel reinforced that resilience is not theoretical. Organizations that recover quickly have practiced decision-making, containment, restoration and communications before the crisis. Panelists emphasized that good backups are not enough unless they are tested under realistic conditions and restored in the right order based on business priorities. Network segmentation, endpoint detection, administrative access control, proper MFA configuration, asset inventory and rehearsed playbooks all remain essential. The panel also warned that compliance does not equal security. Having a control on paper means little if it fails under real attack conditions.
Ransomware is becoming more about data extortion than encryption. Attackers increasingly skip the noisy lockout and go straight for sensitive data theft, creating legal, reputational and operational pressure.
AI security is now an operational control problem. The conversation has moved beyond writing AI policies. Organizations need inventory, logging, monitoring, evaluation, training and clear ownership for AI tools already in production.
AI agents are becoming a new class of insider. Agentic systems introduce new questions around identity, privilege, access, monitoring and accountability.
Identity has become the practical perimeter. MFA alone is no longer enough. Token theft, session hijacking and over-permissioned accounts are pushing organizations toward phishing-resistant authentication and continuous verification.
Third-party risk is shifting from questionnaires to relationships and monitoring. The strongest programs are moving toward continuous visibility, vendor tiering, contractual teeth and shared operating models with critical suppliers.
Cyber resilience is now a board-level operational discipline. Fast recovery depends on tested backups, rehearsed playbooks, business-driven prioritization and executives who already know how decisions will be made under pressure.
Overall, Cyburgh 2026 captured a cybersecurity field entering a more demanding phase. The buzzwords are giving way to muscle memory. AI is real. Identity is under siege. Vendors are part of the attack surface. Ransomware is forcing executive decisions faster than ever. The organizations that fare best will be the ones that know their environments, practice their response, build trusted relationships and turn cybersecurity from a policy binder into a living operating system for resilience.