This September, Scottsdale will once again become the center of gravity for the global cybersecurity research community as SentinelOne hosts LABScon 2025 at the Omni Scottsdale Resort & Spa at Montelucia. Running from September 17–20, the event promises to be more than a conference; it is positioned as a crucible where the most pressing issues of digital defense meet the brightest minds working to solve them. Now in its fourth year, LABScon has earned a reputation as a proving ground for new research, technical revelations, and serious debate on the evolving nature of cyber conflict and defense. Organized by SentinelLABS, whose discoveries of vulnerabilities, exploits, and novel threat actor techniques have reshaped industry practice, the conference serves as a forum where intelligence practitioners, academics, and private-sector innovators align around the future of security.
The keynote roster reflects LABScon’s global scope and cross-disciplinary depth. Lindsay Freeman, Director of the Technology, Law & Policy program at UC Berkeley’s Human Rights Center, will present an investigation on how OSINT and AI tools are being leveraged to document the Wagner Group’s atrocities in Africa—showcasing the convergence of open-source intelligence, digital forensics, and international law in building cases for prosecution at the ICC. Thomas Rid, a leading voice in the history of cyber and intelligence, will share insights from “MERION ZETA,” an exploration of the so-called Golden Age of signals intelligence, bridging the lessons of history with the realities of today’s hyperconnected battlespace. Mei Danowski of Natto Thoughts will offer a rare glimpse inside China’s cyber ranges, where private firms collaborate with the state in live-fire digital exercises that sharpen offensive capabilities—an exposé that underscores how national strategy and commercial ecosystems intertwine to accelerate Beijing’s cyber reach.
Beyond these headline sessions, LABScon will bring together top researchers from SentinelLABS, Sophos, ESET, Recorded Future, Margin Research, and Check Point. The themes range from dissecting the operations of nation-state threat groups and the geopolitical dynamics of cyberwarfare to technical analyses of high-profile ransomware campaigns, large language model (LLM)–driven malware, and the growth of private sector offensive security operations. These discussions are not theoretical. They cut to the heart of the questions CISOs, governments, and enterprises are grappling with: how to defend against adversaries wielding both AI-powered tools and state backing, how to anticipate vulnerabilities in rapidly evolving infrastructures, and how to build resilience in an environment where attacks are global, constant, and increasingly indistinguishable from acts of war.
The design of LABScon 2025 balances intellectual rigor with practical collaboration. Deep-dive sessions will allow participants to explore new exploit methodologies, detection strategies, and defense frameworks, while networking opportunities will foster alliances between sectors that rarely interact with such intensity. For SentinelOne, the event also underscores its positioning as more than just a vendor: it is positioning itself as a hub for global research exchange, advancing not only its own technology but the collective intelligence of the community. By convening academics, policymakers, technologists, and frontline analysts in a single forum, LABScon makes the case that cybersecurity cannot be siloed; it is an ecosystem problem demanding an ecosystem response.
As the cyber threat landscape expands—shaped by AI’s dual-use potential, contested geopolitical spheres, and the blurred lines between criminal and state-backed actors—conferences like LABScon are becoming essential. They provide the scaffolding where research is validated, knowledge is disseminated, and strategies are collectively forged. Scottsdale may be the host city, but the stage is unmistakably global, and the stakes of the conversations extend well beyond the resort grounds. This year’s LABScon is not just another entry in the cybersecurity calendar; it is a deliberate attempt to reset the dialogue around digital defense, equipping the research community with the tools and insights necessary for the battles ahead.
Leave a Reply