googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, September 27, 2023
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 4:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    Safeguarding Ethical Development in AI and Other LLMs
    • session level icon
    A Comprehensive Approach to Integrating Security, Psychological Considerations, and Governance
    speaker photo
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Session description coming soon.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Risk and Rewards of Deploying AI/ML Technologies in Your Organization
    • session level icon
    speaker photo
    Member, Data Privacy & Cybersecurity, Clark Hill Law
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    12:00 pm
    Examining the Impact of AI on Your Cybersecurity Program
    • session level icon
    speaker photo
    vCISO & CEO, Cyber Sherpas
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Protecting High-Value AI Assets: A Comprehensive Security Framework for In-Use Protection, Ownership, and Data Privacy Across Diverse Domains
    • session level icon
    speaker photo
    Cloud Security, Confidential Computing, Intel
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    High value AI/ML models are being increasingly used in various use cases (surveillance, industrial, retail, medical, financial, etc.). The cost of training these AI models is very high due to the high-quality training data sets and time required to train and optimize these models. Once deployed, these assets are subject to various attacks including tampering and theft. Additionally, the data used for performance inference is sensitive not only to business value (industrial, retail) but also subject to regulations such as GDPR and HIPPA (surveillance, medical, financial).

    AI/ML models must be protected from tampering and theft while at rest, while in use (run time), and while in transit. Additionally, functionality to provide control to the Model Developer over the use of the model, along similar lines to traditional SW licensing is an added bonus and could deliver critical functionality such as Model Revocation if required.

    This AI/ML Security Framework is designed to be used by AI/ML domain specialists (data scientists, etc.), who have limited security expertise. The framework ensures model protection at rest, during transit, and run time. It also introduces the concept of model ‘ownership’ and thereby, licensing of the model. Controls are in place to allow the model developer to track model deployment and potentially revoke the use of a model that is found to be misbehaving or has some other critical flaw. A license to an improved version of the model can then be issued to the customer.

    Cryptographic techniques are used to ensure the integrity and confidentiality of the model, which protects it while in transit and at rest. Intel Trusted Execution Environments (TEEs) of varying strengths (VT-x, SGX, Containers) are used to protect the model at run time. Attestation is used to report the run time environment via a Licensing Protocol that determines if the model can be used in that environment or not. This forms the basis of providing the model developer with a level of control over the usage of the model.

    From a Data Protection standpoint, the cryptographic and run-time protections are extended to data streams that are used as input to various AI/ML based analytics use cases. The output analytics results are also protected using the same scheme. Data is processed by a model within one of the aforementioned TEEs. Like AI/ML models, data is protected at rest, while in transit, and when used for inference operations.

    Intel TEE attestation during licensing relies on a combination of Secure Boot and Intel Platform Trust Technology (firmware TPM) or SGX based DCAP. The framework also provides a transparent key-store mechanism for securely generating and using cryptographic keys for identity, confidentiality, and integrity. The key store mechanism is also bound to hardware via TPM/PTT based sealing or SGX sealing.

    All the above-mentioned functionality is wrapped in a set of easy-to-use tools for asset protection, a reference license server implementation, and a TEE based run-time inference environment currently based on, but not limited to Intel’s OpenVINO framework. The entire suite of tools and components is currently open-sourced and available for the Linux KVM (VT-x), Intel SGX (with Gramine), and Kubernetes Containers.

    1:00 pm
    I Can See Clearly Now, the Threats Are Gone
    • session level icon
    speaker photo
    Executive Director, Americas Region, CREST
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Zero Trust is considered by many to be a marketing buzzword, but what it really alludes to is having good, basic cybersecurity hygiene. It’s what any cybersecurity professional worth their salt has been doing, and does, daily. Ransomware, phishing, and BEC grab the headlines, but your run-of-the-mill cyberattacks can’t be ignored because of the shiny new thing garnering all the attention.

    The CISO is like a musical conductor that must pay attention to all the resources at his or her disposal—be it people, tools, technologies, systems, and more. How is the organization handling security awareness training? What about staffing shortages affecting the organization, or even the vendors with which CISOs and their teams work?

    Join this session to hear insights and takeaways on the state of the information security profession today, including tips for seeing clearly and staying ahead of threats.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Believe the Hype: The Robots Are Coming!
    • session level icon
    speaker photo
    CISO, Whistic
    speaker photo
    CTO & Founder, Whistic
    speaker photo
    Sr. Director, Cyber Solutions, SureCloud
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    2:00 pm
    AI Confidential: Behind the Scenes of Legal Ethics in the Digital Age
    • session level icon
    speaker photo
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Rapid advancements in AI technology have spurred its integration into the legal landscape, raising the imperative to establish ethical guidelines. This abstract explores the symbiotic relationship between AI and law, emphasizing ethical dimensions. It defines AI in a legal context, showcasing its potential in tasks like research and predictions while addressing challenges like bias and accountability. Urgency in AI ethics is discussed alongside real-world ethical dilemmas. Principles for AI and legal ethics are outlined, including transparency, fairness, accountability, and human-AI collaboration. The abstract emphasizes translating ethics into practice through standards, technological safeguards, and continuous learning. Case studies delve into AI’s role in legal advice, sentencing, and policing. Stakeholder collaboration involving legal communities and the public is stressed, as is the enduring significance of AI ethics in an ever-evolving technological and legal landscape.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Strengthening Cybersecurity with Generative AI: A Guide for Improving Team Effectiveness
    • session level icon
    speaker photo
    Executive Director of Innovation, Grand Canyon University
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Join us for this session on how generative AI can be used to improve the workforce of cybersecurity professionals. Robert Loy will discuss the latest trends in generative AI and how it can generate realistic cybersecurity scenarios, incident response plans, and policies and maximize your team’s potential. Take advantage of this opportunity to learn how to leverage generative AI to make cybersecurity even more of a strategic asset through education and training.

    3:00 pm
    Cyber-Enabled Fraud and Business Email Compromise in 2023
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    The presentation will cover the Secret Service’s view on current cybercrime trends to include the emergence of AI/ML in the cybercrime world. Investigator Dougherty will frame it in the lens of BEC (Business Email Compromise) and discuss the new and emerging advancements cybercriminals are using to victimize businesses in 2023 and beyond. Investigator Dougherty may even share a a deepfake of himself.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    Cyber Intel Briefing: Artificial Intelligence
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Session description to come.

Exhibitors
  • Whistic
    Booth:

    Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education.

  • SecureWorld Media
    Booth:

    Learn more about SecureWorld News and our digital content channels.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Data Privacy & Cybersecurity, Clark Hill Law

    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.

  • speaker photo
    Thomas Scott
    vCISO & CEO, Cyber Sherpas

    Thomas Scott (Tom) is the Executive Director of the South Carolina Cybersecurity Association and Foundation. As the inaugural Director of the SC Cyber Consortium, he has been a key leader in the cyber education, cyber workforce development, and cyber protection efforts in both South Carolina and across the Nation. He is the CEO of CyberSherpas, a premier cybersecurity consulting firm.

    With over 30 years of cybersecurity experience in both Florida and South Carolina, Tom has developed a wealth of knowledge and experience in protecting critical infrastructure and cyber assets. He currently holds certifications in information security, information auditing, security leadership, critical infrastructure protection, and project management – he is also recognized a FEMA Continuity of Operations Planning (COOP) Practitioner.

    Tom is a member of the FBI’s InfraGard program and serves as an advisory board member for the Dutch Fork High School Cyber program. He has actively participated as a member of the MS-ISAC’s Executive Committee as well as the USC School of Law Cybersecurity Task Force. Tom currently serves the academic community through board service to the Industry Advisory Board for the USC Integrated IT program, and at Florence-Darlington Tech and Aiken Tech

  • speaker photo
    Jay Chetty
    Cloud Security, Confidential Computing, Intel

    Jay Chetty is a seasoned Cloud Security Architect, responsible for overseeing the end-to-end security of the Intel Developer Cloud, a service offering from Intel. His experience spans multiple projects, where he has skillfully navigated the complexities of cloud-based systems to optimize security. His unwavering dedication and insightful strategies have been pivotal to their strong security architecture. Jay is an accomplished endurance athlete, reveling in the serenity offered by long-distance running, cycling, and hiking. His passion for pushing physical boundaries mirrors his tenacity in securing complex digital landscapes.

  • speaker photo
    Tom Brennan
    Executive Director, Americas Region, CREST

    Tom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrastructure Security Agency’s 16 critical infrastructure sectors which are vital to U.S. security, national economy, and public health and safety. As CREST USA Chairman, Brennan spearheads strategic plans for CREST USA’s organizational growth while also serving as an industry evangelist and educator on the value of using accredited cybersecurity products and professionals to improve consumer privacy, security, and protection worldwide.

    As a proud U.S. Marine veteran, Brennan became involved with CREST International in 2016 while serving the Global Board of Directors for the Open Web Application Security Project (OWASP). Seeing similar goals, he became more active in the CREST organization and was nominated to lead the organization’s U.S. Advisory in 2019. Over his career, Brennan has amassed security expertise across the cybersecurity spectrum, including penetration testing, vulnerability assessment, application security, threat intelligence, and more. In addition to being CREST USA Chairman, he is the Chief Information Officer of the national law firm Mandelbaum Barrett, overseeing critical infrastructure, privacy, and security operations. He is also an Advisory Board Member of the information services advisory Gerson Lehrman Group, a Cyber Fellows Advisory Council Member, a Member of the Information Technology Advisory Committee of the County College of Morris, a Senior Advisor and Industry Advisory Board Member of the New Jersey Institute of Technology, and a Cyber Fellows Advisory Council Member of the NYU Tandon School of Engineering.

  • speaker photo
    Jake Bernardes
    CISO, Whistic

    Jake is a technology leader with significant experience in funding rounds, delivering security transformation and building best in class security functions.

    Passionate, innovative & pragmatic with an understanding of what makes businesses tick and how to take them from start up or growth phase to enterprise level security capabilities, opening doors to new customers and opportunities along the way.

  • speaker photo
    Juan Rodriguez
    CTO & Founder, Whistic

    After graduating from college, Juan joined numerous startups in the Los Angeles area, specifically focusing on the early stages of what we now know as SEO. During that time, Juan established himself as a seasoned engineer and learned the ins-and-outs of running a company.

    In 2011, a large eCommerce company approached Juan, and he and his family relocated to Salt Lake City. Juan quickly began managing multiple teams and spearheading important projects, such as the company’s first ever public API and their Bitcoin integration. Ultimately, Juan was promoted to Manager and Architect of Internal Infrastructure teams before his departure to begin his entrepreneurial journey.

    Juan went on to co-found a peer-to-peer recreational vehicles rental platform. The venture proved to be exactly what Juan had been looking for; an opportunity to grow a business from the ground up. The experience permitted him to personally dive into sales, marketing, customer service and most importantly analyzing the technology he had developed. After having dedicated a year to this work, he felt that the enterprise space was a better fit for his talents, so he moved on to start Whistic.

    Juan lives in Sandy, Utah, with his wife and kids. He doesn't believe in "down time," so if he isn't coaching his son's robotics team or children's soccer teams, he is mastering the art of grilling.

  • speaker photo
    Nick Hayes
    Sr. Director, Cyber Solutions, SureCloud

    As part of the SureCloud cyber services division's leadership team, Nick is responsible for developing and executing the strategy for the cyber testing team. Along with the responsibility for developing tech-led consulting service propositions that combine our expertise, the SureCloud platform and technology. Additionally, Nick oversees and drives several commercial relationships with key clients. Previously, Nick has held technical delivery and leadership positions within a number of global consulting services organizations.

  • speaker photo
    Violet Sullivan
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster

    Violet Sullivan works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and new business growth. Ms. Sullivan is a licensed attorney in Texas and Pennsylvania and a Certified Information Privacy Professional (CIPP/US), with her JD and MBA degrees from Baylor University. In addition to her full-time role, Violet serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LL.M. Degree in Litigation Management, the first of its kind nationwide. Her diverse practice experience at both the individual and policy levels has prepared her for developing new tools and approaches to solving what is fast-becoming a pervasive and costly challenge in modern industry: how to respond to a cybersecurity incident.

    Early in her career, Violet worked on the incident responses for some of the largest and most notable data breaches to date, including: Home Depot, Sony, and Anthem. Her experience in managing scaled breach responses led to her expertise and proficiency in proactively preparing organizations for cyber incidents. In the past eight years, she has facilitated over 450 cyber incident simulations (tabletops) for public and private sector companies, including many Fortune 100 companies.

    As a cybersecurity and privacy attorney, Violet provides consulting services to respond to the needs of various cybersecurity programs. She reviews and develops customized incident response plans to ensure organizations are prepared to respond efficiently and effectively to a data breach. Violet also helps improve internal coordination by facilitating customized tabletop simulations focused on "pressure-testing" an organization's incident response procedures and protocols. Each of these customer-facing services mentioned has been built and developed for the purpose of creating long-standing relationships that turn to Violet for guidance, referrals, questions, and future projects.

    As a cybersecurity and privacy professor, Violet developed the entire curriculum for an innovative course on cybersecurity and privacy law for licensed attorneys working toward their LL.M. degree. The specific focus on litigation management has made Sullivan’s course and her lecture series uniquely valuable to experts across the United States.

  • speaker photo
    Robert Loy
    Executive Director of Innovation, Grand Canyon University

    Robert Loy is the executive director of academic success and innovation at Grand Canyon University. After 18 years in technology roles as a programmer and IT leader and 20 years in education at the Maricopa Colleges, Robert joined Grand Canyon to reshape the technology training and learning landscape and help provide marketable technology skills to people looking to change careers or enhance technology knowledge. Robert Loy's teaching philosophy prioritizes personalized career pathways for students. He creates an inclusive and engaging learning environment using technology and hands-on projects. Robert provides students with opportunities for exploration and practical experience and emphasizes continuous learning and professional development. Mr. Loy is in the dissertation phase of his Ph.D. at Grand Canyon University.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.

    With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.

    VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.

    VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes