googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, July 24, 2024
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Opening Keynote] Do More with Less: Practical SOC Automation Strategies Using AI
    • session level icon
    speaker photo
    CEO & Co-Founder, Intezer
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    In this keynote, Itai Tevet puts the focus on the real world—how security teams can realistically use artificial intelligence to do more with less. Generative AI isn’t a magical solution, but as one part of a smart cybersecurity strategy, advanced AI models are already proving to be an affordable way to reduce risk, alleviate bottlenecks, and uncover hidden threats.

    Learn about use cases for new AI tools, along with strategies and tips for modernizing your SOC and automating more processes. This session offers a realistic perspective by showing how innovative teams have deployed AI-driven alert triage processes in their SOC, with practical examples for endpoint, SIEM, and reported phishing alerts.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Insider Threat Actors & Artificial Intelligence
    • session level icon
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Threat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.

    This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and how to identify behavioral elements utilizing a number of security solutions. Through live demonstrations, we will show how “everyday activities” can result in higher risk to the company.

    Objectives:

    • Learn the methodologies utilized by individuals within the organization that would be considered insider threat activity.
    • Learn how to identify system and user-based behavioral indicators.
    • Learn which existing or enhanced security layer can provide insider threat profile data.

    Take-Aways:

    • How to identify business processes which can contribute to intentional or unintentional insider threats.
    • Enhance procedures required to identify insider threat exposures.
    • Enhance awareness training to include additional methods of insider threat.
    • Enhance existing physical and digital security layers to better identify specific insider threat activity.
    12:00 pm
    Model Assisted Threat Hunting Powered by PEAK and Splunk AI
    • session level icon
    speaker photo
    Staff Security Strategist, SURGe, Splunk
    speaker photo
    Global Principal Machine Learning Architect, Splunk
    speaker photo
    Staff Security Strategist, SURGe, Splunk
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Wanting to accelerate your threat hunting? Learn how Splunk AI can be the catalyst. Join us to learn how to leverage the PEAK threat hunting framework and Splunk AI to find malware dictionary-DGA domains.

    We’ll introduce the PEAK framework, walk through the hunt step-by-step, and demonstrate how to turn a successful hunt into automated detection. Join this session to learn how PEAK and Splunk AI can help you:

    • Learn the basics of the PEAK threat hunting framework developed by Splunk’s SURGe security research team
    • Understand the power Splunk AI can bring to your threat hunts
    • See how to create automated detections from your successful hunts
    12:00 pm
    Cybersecurity GRC: Building Industry-Leading Programs Using AI and Automation
    • session level icon
    speaker photo
    Partner, Cyber Risk & Regulatory, PwC
    speaker photo
    Director, Cyber Risk & Regulatory, PwC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Today, cybersecurity GRC programs and processes often take significant investments and resources to perform risk and control testing, GRC operations and maintain GRC technologies. Strategic and high-value time of product and engineering teams can be taken away by GRC teams and external auditors to support audit and compliance activities. In this new AI world, how can CISOs and cyber GRC leaders think differently about meeting their customer and business commitments of maintaining a secure and compliant environment, in a cost-efficient way? Latest GenAI and related technologies can help provide the capability of building data pipelines with source systems, generating insights from unstructured information, and building reporting layers that can give near real-time risk and controls insights. However, there can also be several complexities and challenges associated with moving from a traditional GRC program to an AI-enabled GRC program. Learn more about how you can use AI effectively and efficiently for your cyber GRC programs.

    12:00 pm
    How to Manage AI Risk to Let Innovation Prosper
    • session level icon
    speaker photo
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Join this risk-and-compliance-crossover session to learn how to navigate the complexities of AI risk and create a secure environment for innovation. While AI is often seen for its tremendous benefits or doomsday scenarios, attorneys and regulators actually advocate for a balanced approach that treats AI risk like any other risk assessment—considering priorities, efficiencies, security, and more. This session will examine AI risk from legal, regulatory, technical, and cultural perspectives, offering strategies to balance these without hindering AI-driven advancements. We all aim to be the “first out of the gate” in AI, but we must get there safely.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Balancing Act: Data, AI and Cybersecurity Governance
    • session level icon
    speaker photo
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Join a thoughtful discussion on balancing AI innovation, ethical data use, efficient data governance and secure cyber governance practices. Gain insights on the risks, challenges and responsibilities of managing AI technologies with ethical and regulatory frameworks while exploring the integration with cybersecurity.

    1:00 pm
    Artificial Intelligence Information Risks and Acceptable Use Policy
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session description coming soon.

    1:00 pm
    [Panel] Compliance, Automation, and AI
    • session level icon
    speaker photo
    Partner - Data Protection, Privacy & Security Group, K&L Gates
    speaker photo
    Cybersecurity and Compliance Engineer, May Mobility
    speaker photo
    Product Evangelist, Automox
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session description coming soon.

    1:00 pm
    Stopping AI Tool-Driven Data Loss
    • session level icon
    speaker photo
    Director, Product Marketing, Cloudflare
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session description to come.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Pig Butchering, BEC, and Artificial Intelligence: What the Secret Service Wants You to Know
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Session description to come.

    2:00 pm
    Using GenAI to Turbocharge Your GRC Teams
    • session level icon
    speaker photo
    Security GRC Lead, Plaid
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Traditional methods of managing Governance, Risk Management, and Compliance (GRC) programs often lack the efficiency and scalability needed in today’s fast-paced environment. This talk will demonstrate the use of Generative AI technologies to transform and turbocharge GRC teams, offering significant advancements in processing capabilities, decision-making speed, and overall accuracy. We will explore practical applications of Generative AI in automating routine GRC tasks such as policy drafting, efficient risk assessment, threat modeling, and writing your own GPTs to automate workflows.

    2:00 pm
    [Panel] AI Myths Explained: Cutting Through the Jargon
    • session level icon
    speaker photo
    VP, Global Executive Engagement, Tanium
    speaker photo
    Head of Product Marketing, Intezer
    speaker photo
    Head of Machine Learning, Abnormal Security
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    AI exploded onto the scene late in the spring of 2023. Suddenly, people were losing their jobs, minds, and composure. It was like something out of a sci-fi novel. Surely robots would take over and enslave humans.

    A year has passed and we’re all still here and mostly still employed. We’ve heard some interesting truths about AI over the year. This panel is going to focus on facts. Join our experts as we dive into some of the myths around corporate / organizational use of AI. We’ll talk about the current threats around this new technology and give insights on what’s next.

    Bring your questions, as well!

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Guardians of the Ballot Box: Cybersecurity in Elections
    • session level icon
    speaker photo
    Cybersecurity and Compliance Engineer, May Mobility
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    In this presentation, we address the critical challenge of defending electoral processes against targeted campaigns, elections and social engineering tactics. As elections increasingly become targets for cyber interference, safeguarding against these threats is paramount. We examine how campaigns and elections are targeted by malicious actors, aiming to disrupt democratic practices and sway voter sentiment.

    Through case studies and real-world examples, we illustrate the impact of social engineering on constituents, highlighting how misinformation and manipulation tactics can influence voter behavior and swing election outcomes. We also discuss strategies to prevent and mitigate these threats, including robust cybersecurity measures, public awareness campaigns, and enhanced education on recognizing and combating social engineering tactics.

    By understanding the tactics used by malicious actors and implementing proactive defenses, we can better protect the integrity of electoral processes and ensure that voters are empowered to make informed decisions. Join us as we explore practical steps to defend against targeted campaigns and safeguard the democratic process.

    3:00 pm
    Cyber Intel Briefing: Artificial Intelligence
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session description to come.

    3:00 pm
    The Role of Human-Centric Security in an AI-Powered World
    • session level icon
    speaker photo
    Sr. Director, Cybersecurity Strategy, Proofpoint
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    As AI continues to transform the way we live and work, it’s more important than ever to ensure that security measures keep pace with technological advancements. Human-centric security is a key approach that puts people at the center of security strategies, focusing on protecting individuals as well as the data and systems they use. In an AI-powered world, this approach becomes even more critical to ensure that technology is used for good and not exploited for malicious purposes.

    Join us during this 45-minute breakout session and hear from Proofpoint’s Senior Director of Cybersecurity Strategy, Brian Reed, as he discusses:

    • How AI is changing the security landscape
    • The importance of putting people at the center of security strategies
    • Strategies for protecting against human-targeted threats
    • Best practices for developing and implementing human-centric security measures in an AI-powered world
    3:00 pm
    Strategic Insights into AI Risk Management: Threats, Regulations, Frameworks, and Governance
    • session level icon
    speaker photo
    Board of Directors, Vice President, InfraGard Atlanta Members Alliance
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session description coming soon.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    [Closing Keynote] The ChatGPT Threat: Using Defensive AI to Prevent AI-Powered Attacks
    • session level icon
    speaker photo
    Field CISO, Abnormal Security
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    The widespread adoption of generative AI meant increased productivity for employees, but also for bad actors. They can now create attacks at scale, with tools like ChatGPT enabling even petty criminals to create sophisticated attacks. And no surface is more vulnerable than your inboxes—not when generative AI can create email attacks void of the typos and grammatical errors that have become a key indicators of malicious activity.

    So how do you defend against this threat? And what is the future of cybersecurity in this AI-powered world? Join this session to hear how generative AI is changing the threat landscape, what AI-generated attacks look like, and how you can use “good AI” to prevent “bad AI” from harming your organization.

Exhibitors
  • Abnormal Security
    Booth:

    Abnormal is the most precise human behavior security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
    Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.

    Only Abnormal uses behavioral AI to profile known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.

  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • Cloudflare
    Booth:

    Cloudflare, Inc. (NYSE: NET) is the leading connectivity cloud company. It empowers organizations to make their employees, applications, and networks faster and more secure everywhere, while reducing complexity and cost. Cloudflare’s connectivity cloud delivers the most full-featured, unified platform of cloud-native products and developer tools, so any organization can gain the control they need to work, develop, and accelerate their business.

    Powered by one of the world’s largest and most interconnected networks, Cloudflare blocks billions of threats online for its customers every day. It is trusted by millions of organizations—from the largest brands to entrepreneurs and small businesses to nonprofits, humanitarian groups, and governments across the globe.

    Learn more about Cloudflare’s connectivity cloud at cloudflare.com/connectivity-cloud. Learn more about the latest internet trends and insights at radar.cloudflare.com.

  • Intezer
    Booth:

    Empower security operations and Incident Response teams with a technology that simulates the complex decision-making process and threat analysis skills of experienced analysts. Automate alert triage, response, and hunting to save time and resources, with a platform that can help close skill gaps and .For more information, visit www.intezer.com.

  • Proofpoint
    Booth:

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Splunk
    Booth:

    Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.

  • Tanium
    Booth:

    Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).

    The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.

    For more information, visit: https://www.tanium.com.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Itai Tevet
    CEO & Co-Founder, Intezer

    Itai Tevet is the CEO of Intezer, a leading provider of AI-powered technology for autonomous security operations. He previously led a government Computer Emergency Response Team of elite specialists in incident response, digital forensics, malware analysis, and reverse engineering. His experience led him to co-found Intezer in 2016, with a mission to research and develop technologies to transform the way we investigate and respond to cybersecurity incidents.

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    David J. Bianco
    Staff Security Strategist, SURGe, Splunk
  • speaker photo
    Philipp Drieger
    Global Principal Machine Learning Architect, Splunk
  • speaker photo
    Ryan Fetterman
    Staff Security Strategist, SURGe, Splunk
  • speaker photo
    Shirish Munshi
    Partner, Cyber Risk & Regulatory, PwC

    Shirish is a Cybersecurity Partner at PwC and a seasoned and visionary cybersecurity executive with a distinguished career in leading global organizations to safeguard their technology and business assets using automation and advanced techniques (e.g., AI, ML). He has over 15 years of experience leading, managing and successfully delivering large multi-million-dollar initiatives in the areas of cyber risk management, regulatory programs, digital transformation for security organizations, and cyber governance. He has served as a trusted advisor to several security and business executives for mid-sized and large technology organizations, providing strategic and technical guidance, and implementing robust and transformative security programs.

    Throughout his career, Shirish has demonstrated strong interpersonal skills, business acumen and a proven track record of driving efficiencies, scalability and risk reduction for security programs. Shirish is known for fostering a culture of security awareness, empowering business teams with tools and techniques to better identify and reduce risks, and a proactive and holistic approach to protecting critical data and assets.

    Shirish’s expertise extends across a wide range of cybersecurity domains, including cyber risk management, third-party security, regulatory compliance (e.g., NIST 800-53, ISO 27001, PCI DSS), and application security. At PwC, Shirish has led the development of various cyber-AI solutions and services, where he consistently delivered measurable results, led market and sector growth, and delivered custom services for clients. Outside his cybersecurity role, Shirish has demonstrated strengths in the building and leading diverse high-performing teams and driving inclusive mindset.

    Shirish holds a Master’s degree in Information Management, where he conducted research in the areas of cybersecurity and information assurance. He also holds multiple industry certifications, including ISO 27001 Lead Implementer, and is a regular speaker at industry conferences with published articles on cybersecurity topics such as software supply chain security.

  • speaker photo
    Norb Vas
    Director, Cyber Risk & Regulatory, PwC
  • speaker photo
    Violet Sullivan
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster

    Violet Sullivan works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and new business growth. Ms. Sullivan is a licensed attorney in Texas and Pennsylvania and a Certified Information Privacy Professional (CIPP/US), with her JD and MBA degrees from Baylor University. In addition to her full-time role, Violet serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LL.M. Degree in Litigation Management, the first of its kind nationwide. Her diverse practice experience at both the individual and policy levels has prepared her for developing new tools and approaches to solving what is fast-becoming a pervasive and costly challenge in modern industry: how to respond to a cybersecurity incident.

    Early in her career, Violet worked on the incident responses for some of the largest and most notable data breaches to date, including: Home Depot, Sony, and Anthem. Her experience in managing scaled breach responses led to her expertise and proficiency in proactively preparing organizations for cyber incidents. In the past eight years, she has facilitated over 450 cyber incident simulations (tabletops) for public and private sector companies, including many Fortune 100 companies.

    As a cybersecurity and privacy attorney, Violet provides consulting services to respond to the needs of various cybersecurity programs. She reviews and develops customized incident response plans to ensure organizations are prepared to respond efficiently and effectively to a data breach. Violet also helps improve internal coordination by facilitating customized tabletop simulations focused on "pressure-testing" an organization's incident response procedures and protocols. Each of these customer-facing services mentioned has been built and developed for the purpose of creating long-standing relationships that turn to Violet for guidance, referrals, questions, and future projects.

    As a cybersecurity and privacy professor, Violet developed the entire curriculum for an innovative course on cybersecurity and privacy law for licensed attorneys working toward their LL.M. degree. The specific focus on litigation management has made Sullivan’s course and her lecture series uniquely valuable to experts across the United States.

  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Kip Boyle
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Jake Bernstein, Esq.
    Partner - Data Protection, Privacy & Security Group, K&L Gates

    Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.

  • speaker photo
    Hemanth Tadepalli
    Cybersecurity and Compliance Engineer, May Mobility

    Hemanth Tadepalli is a Cybersecurity Compliance Engineer at May Mobility, excelling in the realm of autonomous transportation services. With a rich professional background spanning roles at AlixPartners, Mandiant, Google, and SensCy, he specializes in ensuring compliance with stringent standards like ISO 27001, SOC 2, ISO/SAE 21434, and others. Hemanth co-founded MYCAP (Michigan Young Cybersecurity Analysts and Professionals), fostering budding talents in the cybersecurity domain. Appointed by the Michigan Department of State in 2022, he served on the Collegiate Advisory Task Force, determined and implemented recommendations to improve voter education and engagement among universities across the state of Michigan. The task force played an important role in election security, integrity, and combatting the result of misinformation being spread.

    Hemanth has presented at the Detroit Automotive Cybersecurity Conference and various other prominent industry events, showcasing his expertise and thought leadership. He holds a Computer Science degree with a cybersecurity concentration and minors in Pre-Law, Innovation, and Entrepreneurship from Kettering University. Currently pursuing a Master's in Cybersecurity at the University of California, Berkeley, he continues to drive innovation and excellence in the cybersecurity landscape.

  • speaker photo
    David van Heerden
    Product Evangelist, Automox

    David has worked as an IT professional in Asset/Fund Management, property development, hospitality, entertainment, and now tech. His passion is to help people solve problems with technology that is easy to use, easy to manage and to have fun along the way. He is spending his time at Automox as the IT Operations Manager and Product evangelist, and continues to achievement hunt in baldur’s gate, cities skylines, and TFT.

  • speaker photo
    Dawn Parzych
    Director, Product Marketing, Cloudflare

    Dawn Parzych is the Director of Developer and AI Product Marketing at Cloudflare. She makes technical information accessible avoiding buzzwords and jargon whenever possible. Dawn is an accomplished speaker, author, and traveler, having recently achieved her goal of visiting all 50 U.S. states.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Kenneth Moras
    Security GRC Lead, Plaid

    Kenneth Moras is a recognized leader in the cybersecurity Governance, Risk, and Compliance (GRC) space, with extensive experience in building GRC teams from the ground up at Plaid and scaling large GRC programs at notable organizations such as Meta and Adobe. His expertise also extends to cybersecurity consulting for Fortune 500 companies during his tenure at KPMG. He holds various certifications, including CISSP, CISA, ISO 27001 LA, CDPSE, CEH, CHFI, and CCNA. Kenneth enjoys staying up-to-date with offensive strategies used by attackers and building proactive risk management programs that serve as business enablers.

  • speaker photo
    Erik Gaston
    VP, Global Executive Engagement, Tanium

    Erik comes to Tanium from AppDynamics (part of Cisco), where he spent almost five years in field sales. For the past two years, he was the CTO for the East Sales Team, which is responsible for generating more than half of the company's revenue with a focus on large financial firms in the region. Prior to that he built out and headed the Business Value Consulting team for that region. He got his start in technology at Deutsche Bank years back where he helped lead the AM Platform and Data Services Global Organization serving as COO. From there he went to a SaaS SW company called INTTRA (large global trade / shipping logistics platform). At INTTRA, he started by leading the transformation of the company into becoming product and voice of customer led. After that, he became CTO heading all global technology. Following INTTRA, he went back to Financial Services spending time running Target State Architecture as the Global Head of Enterprise Infrastructure CTO Product Management at Morgan Stanley.

  • speaker photo
    Shannon McFarland
    Head of Product Marketing, Intezer
  • speaker photo
    Dan Shiebler
    Head of Machine Learning, Abnormal Security

    Dan is the Head of Machine Learning at Abnormal Security, responsible for leading a team of 40+ detection and ML engineers in building the data processing and ML layers in the platform. Prior to Abnormal, Dan worked at Twitter, first as a staff machine learning engineer in Cortex, and later as the manager of the web ads machine learning team. Before Twitter, Dan worked as a senior data scientist at Truemotion, where he developed smartphone sensor algorithms to price car insurance. He has a PhD in machine learning from the University of Oxford.

  • speaker photo
    Hemanth Tadepalli
    Cybersecurity and Compliance Engineer, May Mobility

    Hemanth Tadepalli is a Cybersecurity Compliance Engineer at May Mobility, excelling in the realm of autonomous transportation services. With a rich professional background spanning roles at AlixPartners, Mandiant, Google, and SensCy, he specializes in ensuring compliance with stringent standards like ISO 27001, SOC 2, ISO/SAE 21434, and others. Hemanth co-founded MYCAP (Michigan Young Cybersecurity Analysts and Professionals), fostering budding talents in the cybersecurity domain. Appointed by the Michigan Department of State in 2022, he served on the Collegiate Advisory Task Force, determined and implemented recommendations to improve voter education and engagement among universities across the state of Michigan. The task force played an important role in election security, integrity, and combatting the result of misinformation being spread.

    Hemanth has presented at the Detroit Automotive Cybersecurity Conference and various other prominent industry events, showcasing his expertise and thought leadership. He holds a Computer Science degree with a cybersecurity concentration and minors in Pre-Law, Innovation, and Entrepreneurship from Kettering University. Currently pursuing a Master's in Cybersecurity at the University of California, Berkeley, he continues to drive innovation and excellence in the cybersecurity landscape.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.

    With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.

    VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.

    VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.

  • speaker photo
    Brian Reed
    Sr. Director, Cybersecurity Strategy, Proofpoint

    Brian Reed is Senior Director of Cybersecurity Strategy at Proofpoint. He comes to Proofpoint from Gartner where he focused on a wide variety of topics - cloud security, data security, incident response, insider threats and security awareness. Since 2015, he published over 50 thought-leading research notes at Gartner, including Cool Vendors reports, Market Guides for Digital Forensics and Incident Response Services and Security Awareness Training, Risk Management research, as well as the last two Gartner Magic Quadrants for Enterprise DLP. Prior to Gartner, he spent over 15 years in a variety of business development, product management, sales and system engineering roles, at companies including Sourcefire (acquired by Cisco), HP, McAfee and Internet Security Systems (acquired by IBM). He is well known in the information security industry and has spoken at numerous Gartner events, as well as other industry events globally. Brian also serves as an advisory board member and holds a BA degree from The University of Georgia and an MBA from Kennesaw State University.

  • speaker photo
    Chris Sullivan
    Board of Directors, Vice President, InfraGard Atlanta Members Alliance

    Mr. Sullivan is a seasoned leader with over 20 years of cybersecurity experience. He has a robust track record in developing and deploying cybersecurity solutions at scale for the world’s leading companies. Christopher currently serves as the Managing Director at VoSec, a management consulting firm, and holds key positions as Vice President and Financial Services Sector Chief at InfraGard Atlanta. He is also a member of the AI Cross-Sector Counsel at InfraGard Atlanta.

    At VoSec, Chris has spearheaded AI security governance strategy work for a Fortune 500 company, designed and run large-scale tabletop exercises with the FBI, DHS, Federal Reserve, and major financial, medical, and academic institutions. Additionally, he serves as the vCISO and vCOO for an AI-as-a-Service company that is currently in stealth mode. His extensive experience spans across cybersecurity risk and compliance, organizational design, and business management.

    Chris's professional experience includes leading Nymi as CEO, where he transformed the biometric security wearables company to achieve global success. As SVP, CTO, and CISO at SecureAuth, he directed the integration of multiple security entities and led the company's technical strategy, resulting in significant advancements in AI-based threat detection and security solutions. He has briefed a US Congressional Subcommittee on Cybersecurity and the US Army Cyber School, and led the cybersecurity R&D labs for three different companies, driving significant advancements in the field. In 2022, he sold his last cybersecurity company and continues to advise boards and CEOs on business and cyber strategies.

  • speaker photo
    Mick Leach
    Field CISO, Abnormal Security

    Mick Leach is Field CISO of Abnormal Security, where he is responsible for threat hunting and analysis, customer engagement, and speaking at global industry conferences. Previously, he led security operations organizations at Abnormal, Alliance Data, and Nationwide Insurance, and also spent more than eight years serving in the U.S. Army’s famed Cavalry Regiments.

    A passionate information security practitioner, Mick holds seven SANS/GIAC certifications, coupled with 20+ years of experience in the IT and security industries.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes