Day Zero Threat Research Summit will debut this year as a specialized research-focused gathering inside Fal.Con 2026, bringing together some of the cybersecurity industry’s leading threat intelligence researchers, adversary tracking teams, and vulnerability analysts.
Hosted by CrowdStrike, the summit will take place at the Virgin Hotels Las Vegas from August 30 through September 1, 2026. The invite-only event is positioned as a high-level technical forum focused on emerging adversary tradecraft, AI-enabled offensive operations, cyberespionage campaigns, and the accelerating pace of vulnerability exploitation.
According to organizers, Day Zero will feature sessions covering agentic AI weaponization, evolving China-linked intrusion techniques, DPRK cyber operations, underground criminal ecosystems, multinational takedowns, and cross-domain intrusion research. The event reflects a growing reality inside cybersecurity: threat actors are operationalizing AI, automation, and scalable exploitation techniques faster than many enterprise defenses are adapting.
Featured keynote speakers include Martin Wendiggensen, whose presentation “Mine the Gap” will examine structural asymmetries between offensive and defensive AI implementation, and Chi-en Shen alongside Julian-Ferdinand Vögele, who will present new research into the threat actor known as Silent Lynx and its operations targeting diplomatic and governmental infrastructure across Central Asia.
The summit will also include a featured intelligence session with John Hultquist and Sherrod DeGrippo, two of the industry’s most recognizable voices in nation-state threat analysis and adversary tracking.
Additional research contributors are expected from organizations including Amazon, Chainalysis, Proofpoint, Mimecast, and other security research teams focused on cybercrime, espionage infrastructure, vulnerability discovery, and AI-assisted attack methodologies.
Adam Meyers, head of counter adversary operations at CrowdStrike, described the summit as an effort to accelerate defender collaboration at a time when adversaries are moving with increasing speed and operational scale. That emphasis on early intelligence sharing has become increasingly central to modern cyber defense strategy, especially as AI-assisted reconnaissance, automated exploitation chains, and adaptive malware techniques compress the window between vulnerability disclosure and real-world attacks.
What makes the timing notable is that Day Zero arrives during a broader industry transition from reactive cybersecurity toward intelligence-led operational defense. Increasingly, security teams are not just monitoring malware samples or intrusion alerts — they are tracking ecosystems, infrastructure relationships, automation pipelines, and adversarial behavior patterns that evolve almost continuously. Events like this are becoming less about conference marketing and more about maintaining collective situational awareness across a threat landscape that changes week to week.
Leave a Reply