Below are the confirmed session topics. If you have any questions, please reach out to converge-registration@lists.stanford.edu or post on the #converge Slack channel.
| Session Title | Proposed By | Location |
|---|---|---|
| Opening, Panel Discussion, and Lightning Talks | Christina Gancayco, Anna Chalmers Mayeda, Alex Keller, Cynthia Bailey, Jack Cable, May Wang, and Mirokaï | Paul Berg Hall |
| Session Title | Proposed By | Location |
|---|---|---|
| Fireside Chat | Sec. Condoleezza Rice, Amy Steagall | Paul Berg Hall |
| Session Title | Proposed By | Location |
|---|---|---|
| FBI Cyber-Crime Threat Landscape 2025 | Scott Hellman | Paul Berg Hall (No Zoom) |
| If I Were Targeting Stanford: A Former Attacker’s Take on Today’s Cyber Threats and How to Counter Them | Jim Richberg (Fortinet) | LK120 |
| Re-igniting Our Direction with IT Affinity and Community Groups | Dani Aivazian, Brittany Cripe, Tela Vessa, Ramani Raman | LK130 |
| Research Data Lifecycle, Services, and Best Practices | Xinlei Qiu | Alway M112 |
| The New Impersonation Threat: OSINT, AI Imitation, and Institutional Trust at the Hoover Institution | Tem Ysmael | Alway M114 |
| The U.S. Privacy and AI Policy and Regulation Landscape | Tatiana Rice | LK102 |
| Session Title | Proposed By | Location |
|---|---|---|
| Artificial Intelligence: From Villain to Victor in the Resilient Enterprise | Wendi Whitmore (Palo Alto Networks), Bhavya Gupta (ISO) | Paul Berg Hall |
| Emerging AI Threats: Shared Experiences & Strategies | Max Stoaks, James Han, Sam Abushariefeh | LK308 |
| How to reduce abusive traffic to Apache server? | Henry Kwong | Alway M112 |
| Securing Infrastructure and Service Provisioning through Automation on Proxmox | Xueshan Feng (Enterprise Technology, UIT) | LK208 |
| The Concept of Privacy by Design | Nelson Akinrinade | LK102 |
| The Future of AI-Driven Software Development: Building Production Systems with Kiro and AI Agents | Ali Maaz (AWS) | LK120 |
| The Future of Privacy in a Post-AI World: From Wicked Problems to Wicked Opportunities | Michelle Finneran Dennedy | LK130 |
| Session Title | Proposed By | Location |
|---|---|---|
| 6 Pillars of IT Operations | Andy Miller | LK308 |
| Advancing Clinical Data Harmonization for Standardization and Integrated Analysis | Dinara Bogetic | LK203/204 |
| Data security requirement for inter-health system data sharing: Applications to Quality Clinical Care Delivery and Research | Dr. Maya Yiadom | Paul Berg Hall |
| Gemini from Google: Your New Research Assistant | Tom King (Google) | Alway M106 |
| Honeypot Dreams & Stranger Things | Alex Keller | Alway M112 |
| Perimeter Shift: Governing Non-Human Access and AI | Michael Silva (Astrix Security) | LK120 |
| Securing Proxmox | Satheesan Nayar | LK208 |
| The PDF Whisperer: Finding and Taming Wild Documents | Auston Stamm | LK102 |
| Wiz Capture the Flag Workshop | Mark Buensalido (Wiz), Nehemiah Hernandez (ISO) | LK130 |
| Session Title | Proposed By | Location |
|---|---|---|
| A Practical Workflow for AI Coding Assistants | Jon Green | LK102 |
| AI-Powered App Development Platforms | Jamie Tsui | LK308 |
| Enterprise Proxmox | Joseph Dick | LK208 |
| Multi Factor Authentication - When, Where, Why, and How | Michael Herbert (Cisco Systems) | Alway M112 |
| Risk Management in the Agentic AI Era | Ken Huang, Bhavya Gupta (ISO) | LK130 |
| Streamlining Analytics & Reporting through Administrative Data Governance | Doug Berman | LK203/204 |
| We Need to Talk: Keeping Campus IT Connected and in the Loop | Aditi Risbud | LK120 |
| Session Title | Proposed By | Location |
|---|---|---|
| Music Performance | AyşeDeniz Gökçin | Paul Berg Hall |

