Zero Trust in less than 30 minutes: See It. Build It. Secure It. Live.
Watch a network come alive on stage as we simulate an customer infrastructure endpoint, spin up a Cloudflare Tunnel, and expose internal apps live. From secure L7 access with WAAP to clientless Zero Trust via Cloudflare Access and WARP, this highly engaging demo shows how fast it is to combine Cloudflare’s SASE portfolio with our application security and connectivity platform. Whether you’re a CISO or an engineer, you’ll leave with confidence in how quickly, effortlessly, and securely Cloudflare powers modern infrastructure.

Real-Time Data Defense: Remediate Gaps and Stop Exfiltration
Feeling the pressure of modern data protection? Worried sensitive info might leak via malicious attempts or unintentional mistakes? With complex compliance mandates, rampant Generative AI use, and the challenge of distinguishing corporate vs. personal accounts, your concerns are real. This session is your guide to clarity. We’ll demo how Cloudflare One provides you with a clear path to control, showing you how to build robust defenses. See policy examples of securing data, sanctioning apps, and taming GenAI inspired by real customer deployment scenarios. You'll leave with an action plan that empowers you to confidently protect your company's assets and elevate your data protection strategy.

Media: Protection and Monetization for AI Crawling
Site owners and publishers face growing challenges controlling how AI services access and use their content, as well as how to receive fair compensation. This session introduces Cloudflare's "AI Audit" tools, which enable publishers, creators, and site owners to manage which AI crawlers can access their content and under what terms. We'll explore strategies for adopting AI Audit’s consent-to-crawl and monetization features and how it supports faster transitions from legacy providers. Case studies will show how leading publishers are protecting and monetizing content in the AI era. Attendees will gain practical, actionable insights.

Everything Breaks Eventually: Designing for Resiliency Beyond SASE
From expired certs to congested transit providers, even the best infrastructure fails eventually. This session explores how modern enterprises can build for resilience—not just availability—using Cloudflare’s Connectivity Cloud. Learn real-world patterns from high-stakes PoCs and customer environments, and leave with pragmatic strategies for keeping apps online when core components break.

New Features for Cloudflare Network Services
Discover the latest enhancements across Cloudflare Network Services in this insightful session. We will explore how recently launched capabilities unlock new possibilities and help you protect your network infrastructure. Learn to leverage advanced protections with new Magic Transit and Magic Firewall features, gain refined control with enhanced role-based access control, and simplify onboarding to Cloudflare. This session provides practical guidance for evolving your network beyond traditional approaches and securing your infrastructure effectively.

Zero Trust for AI: Securing Model Context Protocol Communications
This presentation delivers a practical framework for implementing zero trust principles in AI model interactions using the Model Context Protocol (MCP). Discover how Cloudflare's zero trust platform secures the critical connections between AI applications, models, and data sources. You'll see real-world implementations for authenticating model access to sensitive data, enforcing least-privilege principles for AI agents, and creating secure boundaries between AI components. The session includes specific configurations for implementing identity-based policies, establishing secure transport for MCP communications, and creating comprehensive audit trails of all AI interactions across your environment.

Building Applications using AI on Cloudflare's Developer Platform
Operating workloads securely at global scale on Cloudflare Workers demands a fusion of proven architecture, stringent data isolation, and effective processes and enforcement—all within the world of edge compute patterns. This session distills two years of frontline experience: modeling data in KV, R2, and Durable Objects; layering defense-in-depth atop a runtime outside direct control; and automating developer pipelines so security is the default, not an accessory. Attendees will leave with patterns proven to mitigate risk, promote resilience, and control cost - all without compromising on velocity and performance.

AutoRAG: Because Building RAG Pipelines is Someone Else's Job
Your RAG (retrieval augmented generation) system is a nightmare of duct tape and broken promises—it probably involves chunking strategies you copied-and-pasted from Stack Overflow (and ChatGPT), embedding models you selected at random (evals who?), and retrieval that breaks whenever someone adds a new PDF.AutoRAG simplifies the RAG process, eliminating that entire mess by providing a fully-managed RAG pipeline that automatically handles ingestion, chunking, embedding, and retrieval. We'll build a production-ready knowledge system that continuously monitors your data sources and keeps your AI fresh without you having to lift a finger. Live demo includes feeding AutoRAG corporate PDFs, transcripts, and scraped web pages and watching it automatically transform chaos into intelligent search.

Building AI Agents for the Future: Get the Blueprint from our Experts
In this session the Customer Support Engineering & Training team offers an inside look at how we’re building the future of Support AI; both for customers and for Cloudflarians built entirely on the Cloudflare Developer Platform. Using Workers, Vectorize, D1, and KV, we’ve created a powerful AI ecosystem that pulls knowledge from Salesforce, our internal Wiki, DevDocs, and Community Accepted Answers. The result? Dramatic improvements in resolution times, streamlined workflows, putting us on the right path to smarter, faster support experience at scale.

Incident Response at Cloudflare Scale: Bots, Bits, Baselines, and Beyond
This session explores how Cloudflare’s Security Response team is building a scalable, systems-driven incident response program - designed to reduce reliance on traditional tiered models. Rather than just staffing up, the team focuses on automating workflows with bots, detecting drift through baselining, and using atomic response actions to improve speed and consistency. While the program is still evolving, attendees will gain a practical blueprint for designing resilient, Cloudflare-integrated response capabilities that scale.This session combines strategic design with real-world examples to show how Cloudflare uses its own platform to secure itself—offering lessons customers can apply directly to their own operations.

Resilience by Design: Ensuring Operational Continuity in the Cloud Era
Senior executives know that downtime can be devastating. A survey found 93% of tech leaders worry about outages’ impact. Building resilience is a strategic imperative to protect the bottom line and maintain customer trust.This panel will explore strategies for building resilience into modern infrastructure so that critical services stay up even during attacks or failures. Expert leaders will discuss designing cloud and network systems that anticipate disruptions (like DDoS attacks, outages or third-party failures) and recover automatically, minimizing downtime. Topics include distributed architectures, automated failover, and incident preparedness that knit security and IT teams together.

Scaling Security from Start-up to Enterprise: Cloudflare's Journey
As companies grow from startup to enterprise scale, security programs must evolve dramatically to match increasing risk exposure and operational complexity. This session reveals Cloudflare's security transformation journey across four growth stages, highlighting the critical pivot points that drove strategic changes—from major VPN attacks that accelerated our Zero Trust adoption to phishing campaigns that mandated FIDO2 implementation. Learn how we identified security breaking points during rapid scaling, the five key principles that guided our evolution, and practical strategies for anticipating and responding to security challenges at each stage.

Inside the Adversary's Mind: Cloudflare's Red Team
Ever wonder what it's like to think like a hacker, but for good? At Cloudflare, our Red Team lives inside the adversary's mind every day - simulating advanced persistent threats against our global infrastructure. We're not just running scans; we're building custom malware, cracking passwords, doing deep-dive penetration tests, and even getting hands-on with physical security, right down to the servers. We simulate real-world attacks, sometimes covertly, to test detection capabilities, and other times collaboratively with our 'Blue Team' in exercises to hone response and find every weak spot. This isn't just about finding bugs; it's how we constantly push Cloudflare's security to be the best it can be and stay resilient for the 20% of the Internet that depends on us.