Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, July 24, 202510:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 amOPENING KEYNOTERegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmAvoid an AI Embarrassment: Addressing AI RiskSr. Solutions Engineer, HackerOneRegistration Level:Open Sessions
12:00 pm - 12:45 pmRushed AI deployments can translate to embarrassing incidents, reputational damage, and financial loss. Brands like Adobe, Snap, and Anthropic have joined a growing list of companies embracing AI red teaming to deploy AI responsibly and find emerging threats before bad actors. From the circumvention of AI guardrails to harmful content generation, HackerOne will share the latest threats to your AI deployment and methods to reduce AI risk.
12:00 pmInsider Threat Actors & Artificial IntelligenceRegistration Level:Open Sessions
12:00 pm - 12:45 pmThreat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.
This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and how to identify behavioral elements utilizing a number of security solutions. Through live demonstrations, we will show how “everyday activities” can result in higher risk to the company.
Objectives:
- Learn the methodologies utilized by individuals within the organization that would be considered insider threat activity.
- Learn how to identify system and user-based behavioral indicators.
- Learn which existing or enhanced security layer can provide insider threat profile data.
Take-Aways:
- How to identify business processes which can contribute to intentional or unintentional insider threats.
- Enhance procedures required to identify insider threat exposures.
- Enhance awareness training to include additional methods of insider threat.
- Enhance existing physical and digital security layers to better identify specific insider threat activity.
12:00 pmCybersecurity GRC: Building Industry-Leading Programs Using AI and AutomationRegistration Level:Open Sessions
12:00 pm - 12:45 pmToday, cybersecurity GRC programs and processes often take significant investments and resources to perform risk and control testing, GRC operations and maintain GRC technologies. Strategic and high-value time of product and engineering teams can be taken away by GRC teams and external auditors to support audit and compliance activities. In this new AI world, how can CISOs and cyber GRC leaders think differently about meeting their customer and business commitments of maintaining a secure and compliant environment, in a cost-efficient way? Latest GenAI and related technologies can help provide the capability of building data pipelines with source systems, generating insights from unstructured information, and building reporting layers that can give near real-time risk and controls insights. However, there can also be several complexities and challenges associated with moving from a traditional GRC program to an AI-enabled GRC program. Learn more about how you can use AI effectively and efficiently for your cyber GRC programs.
12:00 pmHow to Manage AI Risk to Let Innovation ProsperRegistration Level:Open Sessions
12:00 pm - 12:45 pmJoin this risk-and-compliance-crossover session to learn how to navigate the complexities of AI risk and create a secure environment for innovation. While AI is often seen for its tremendous benefits or doomsday scenarios, attorneys and regulators actually advocate for a balanced approach that treats AI risk like any other risk assessment—considering priorities, efficiencies, security, and more. This session will examine AI risk from legal, regulatory, technical, and cultural perspectives, offering strategies to balance these without hindering AI-driven advancements. We all aim to be the “first out of the gate” in AI, but we must get there safely.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmCybersecurity in the Age of Machine Learning and Artificial IntelligenceRegistration Level:Open Sessions
1:00 pm - 1:45 pmArtificial Intelligence (AI) coupled with Machine Learning (ML) has tremendous potential to strengthen defenses, but the benefits of ML/AI in cust be contextualized against the risks it poses. The usage of ML/AI has increased exponentially, but security and privacy governance and policies have not expanded at the same rate. Moreover, the pace of instituting AI and privacy regulations varies across the globe, creating a rather complex governance structure for cybersecurity personnel to operate under. This presentation delves into the security and privacy implications of using ML/AI in the organization, whether it is using ML/AI-based security tools or ensuring security of ML/AI-based products developed by the organization.
1:00 pmArtificial Intelligence Acceptable Use PolicyRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pm[Panel] Compliance, Automation, and AIRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description coming soon.
1:00 pmStopping AI Tool-Driven Data LossRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmArtificial Intelligence: Applicable Rules and RegulationsRegistration Level:Open Sessions
2:00 pm - 2:45 pmThis presentation is on the topic of Artificial Intelligence and the related state, federal, or international laws. We will discuss the technology and how it affects intellectual property rights and privacy laws. We will also cover which technologies are being affected and how the courts are handling the legal disputes.
The audience will take away the following:
- What is artificial intelligence?
- What are the applicable rules and regulations?
- How does AI affect intellectual property rights?
- How does AI affect privacy laws?
- What technologies are being affected?
- How are the courts handling the legal disputes?
- What are the European Commission and United States doing about it?
2:00 pmUsing GenAI to Turbocharge Your GRC TeamsRegistration Level:Open Sessions
2:00 pm - 2:45 pmTraditional methods of managing Governance, Risk Management, and Compliance (GRC) programs often lack the efficiency and scalability needed in today’s fast-paced environment. This talk will demonstrate the use of Generative AI technologies to transform and turbocharge GRC teams, offering significant advancements in processing capabilities, decision-making speed, and overall accuracy. We will explore practical applications of Generative AI in automating routine GRC tasks such as policy drafting, efficient risk assessment, threat modeling, and writing your own GPTs to automate workflows.
2:00 pm[Panel] AI Myths Explained: Cutting Through the JargonRegistration Level:Open Sessions
2:00 pm - 2:45 pmAI exploded onto the scene late in the spring of 2023. Suddenly, people were losing their jobs, minds, and composure. It was like something out of a sci-fi novel. Surely robots would take over and enslave humans.
A year has passed and we’re all still here and mostly still employed. We’ve heard some interesting truths about AI over the year. This panel is going to focus on facts. Join our experts as we dive into some of the myths around corporate / organizational use of AI. We’ll talk about the current threats around this new technology and give insights on what’s next.
Bring your questions, as well!
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmRansomware: How to Stay Off the Front PagesRegistration Level:Open Sessions
3:00 pm - 3:45 pm3:00 pmCyber Intel Briefing: Artificial IntelligenceRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:00 pmCognitive Computing in the New Age of AIRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:00 pmStrategic Insights into AI Risk Management: Threats, Regulations, Frameworks, and GovernanceRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description coming soon.
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmCLOSING KEYNOTERegistration Level:Open Sessions
4:00 pm - 4:45 pm
- C1Booth: n/a
C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- Google CloudBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- HackerOneBooth: n/a
HackerOne is the #1 hacker-powered security platform. More than 1,400 organizations, including the U.S. Department of Defense, General Motors, Google Play, Twitter, GitHub, Nintendo, Panasonic Avionics, Qualcomm, Starbucks, and Dropbox, trust HackerOne to find critical software vulnerabilities.
- KnowBe4Booth: n/a
We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
- WitnessAIBooth: n/a
WitnessAI enables safe and effective adoption of enterprise AI, through security and governance guardrails for public and private LLMs. The WitnessAI Secure AI Enablement Platform provides visibility of employee AI use, control of that use via AI-oriented policy, and protection of that use via data and topic security.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!
