Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, July 22, 2026
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.

    11:00 am
    OPENING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Securing Competitive Advantage in the Age of AI
    • session level icon
    Focus Areas: AI; Agentic AI; AI Strategy; Automation; Resilience
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In today’s digital economy, your most valuable assets are no longer sitting in filing cabinets or protected by patents alone—they are embedded in data, algorithms, models, and cloud infrastructure. Artificial intelligence has accelerated innovation, but it has also dramatically expanded the attack surface for security teams. Adversaries are no longer just stealing files; they are extracting insights, replicating capabilities, and exploiting weak governance around AI systems. The speed of digital replication means competitive advantage can erode faster than most organizations realize. For CISOs and security leaders, protecting intellectual property now requires a fundamentally different mindset.

    This session explores how AI is reshaping cybersecurity strategy and why traditional controls are no longer enough. Security teams must think beyond perimeter defense and start viewing AI systems, training data, and automation pipelines as crown-jewel assets. The challenge is not just preventing breaches, but ensuring resilience when systems are targeted. Governance gaps between innovation teams and security functions are creating blind spots that attackers can exploit. Leaders who understand this shift will move from reactive defense to proactive architectural protection.

    At the same time, AI is not just a source of risk—it is a force multiplier for defense. When deployed strategically, AI can enhance detection, reduce dwell time, and strengthen operational resilience. The organizations that win will be those that integrate security into AI development from the start rather than bolting it on later. Competitive advantage in the digital era will belong to companies that treat cybersecurity as a business enabler, not a compliance requirement. The future will not be defined by who builds AI fastest, but by who secures it best.

    12:00 pm
    Beyond the Hype: Designing AI that Actually Delivers
    • session level icon
    Focus Areas: AI; Resilience; Governance/GRC
    speaker photo
    Director of GRC, GlobalVision
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    As organizations rush to implement artificial intelligence, many are developing AI capabilities just to stay up with the competition, rather than to solve important challenges. This rush for visibility and innovation has resulted in a rising gap between existing AI systems and those that provide genuine value. The end effect is increased complexity, operational risk, and a misalignment of technology, business needs, and governance.

    This session investigates why intention and discipline, simply not speed, are the foundations of good AI. It questions the premise that quicker AI adoption inherently leads to better outcomes and investigates how poorly specified AI initiatives frequently generate technical debt, privacy risks, and governance gaps while offering little demonstrable impact. Through a governance and risk-informed lens, the conversation focuses on what useful AI looks like when it is designed to address real operational bottlenecks, customer requirements, and business outcomes. It emphasizes the importance of responsible design, oversight frameworks, and cross-functional accountability in developing AI systems that are both innovative and sustainable.

    Attendees will leave with a practical methodology for determining whether an AI idea is worth developing, how to incorporate responsibility and discipline into the AI lifecycle, and how to move beyond innovation theatre to AI that adds true value and has long-term impact.

    12:00 pm
    Artificial Intelligence: Applicable Rules and Regulations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    This presentation is on the topic of Artificial Intelligence and the related state, federal, or international laws. We will discuss the technology and how it affects intellectual property rights and privacy laws. We will also cover which technologies are being affected and how the courts are handling the legal disputes.

    The audience will take away the following:

    • What is artificial intelligence?
    • What are the applicable rules and regulations?
    • How does AI affect intellectual property rights?
    • How does AI affect privacy laws?
    • What technologies are being affected?
    • How are the courts handling the legal disputes?
    • What are the European Commission and United States doing about it?
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Out of the Shadows: Hardening the AI Frontier with ISO 42001
    • session level icon
    Focus Areas: AI; Shadow IT; BYOD; Governance/GRC; Resilience
    speaker photo
    Senior Cybersecurity and Compliance SME, May Mobility
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Shadow AI is the new “Bring Your Own Device,” but the stakes are significantly higher. When employees feed proprietary code or sensitive data into unvetted LLMs, the perimeter doesn’t just leak—it dissolves. In this session, Hemanth Tadepalli breaks down the anatomy of AI Data Risk and provides a tactical roadmap for bringing these “shadow” operations into the light. Using the ISO 42001 framework as our North Star, we will discuss how to build a resilient AI Management System (AIMS) that tames the chaos of unauthorized AI usage while keeping your organization’s data under lock and key.

    1:00 pm
    The Rise of AI Assistants: New Insider Threat and Data Exposure Challenges
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session details to come.

    1:00 pm
    API Security: Managing the Fastest-Growing Attack Surface
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session details to come.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Trust Signals for AI-Agent Access: Stopping Synthetic Identities Before They Reach Production
    • session level icon
    Focus Areas: Identity and Access Management; AI Governance; Agentic AI; API Security
    speaker photo
    Engineering Manager, Identity, LinkedIn
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Generative AI has made it trivial to create synthetic identities and autonomous agents that behave like real users until it is too late. Traditional IAM and API security focus on authentication rather than whether an identity should be trusted with a specific action.

    Drawing on experience from LinkedIn identity systems and Oracle Health Sciences, this session explores how to design trust signals for AI-agent access. Attendees will learn architectural patterns for building a dedicated trust-signal layer, combining authentication with behavioral usage patterns and credential provenance.

    The session will cover how to expose these signals to security controls and generate human-understandable explanations for access decisions, helping organizations safely adopt AI agents while defending against automated abuse.

    2:00 pm
    Threat Hunting with AI: Turning Noise into Actionable Intelligence
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Session details to come

    2:00 pm
    Burnout in Cybersecurity: Recognizing, Preventing, and Managing Team Fatigue
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Session details to come.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    AI Cyber Debrief: Geopolitics, Algorithmic Warfare, and the Frontier of AI Resilience
    • session level icon
    Focus Areas: Agentic AI; Threat Intel; Nation-States; Resilience; Governance/GRC
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Founder & President, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Artificial Intelligence is no longer just a driver of productivity; it is the primary battlefield of modern global conflict. This session connects the dots between geopolitical volatility and the immediate risks to model integrity, data sovereignty, and cognitive security. We will examine how shifting alliances involving major powers like Russia, China, and the EU are reshaping the cyber threat landscape—specifically targeting sovereign AI clusters, decentralized compute networks, and the global semiconductor supply chain.

    The discussion will pivot to the “internal” evolution of the sector, analyzing the rapid integration of Agentic AI in critical infrastructure and the resulting “black box” regulatory and privacy minefield. From state-aligned actors seeking to poison training datasets to sophisticated syndicates deploying automated exploit-generation engines, we will profile the adversaries threatening the global digital order.

    Join us for a 2026 outlook that moves beyond mere ethical frameworks, offering a battle-tested strategy for maintaining operational resilience and model alignment in the face of unprecedented global instability.

    3:00 pm
    From Alert Fatigue to Adaptive Defense: Operationalizing AI in the SOC
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session details to come.

    3:00 pm
    The Deepfake Dividend: How Fraudsters Turned 'Looks Real' into Real Money
    • session level icon
    Focus Areas: AI-Powered Fraud; Deepfakes; Social Engineering; AI Governance, Cyber Forensics
    speaker photo
    Director of Information Security & Regulatory Compliance, ETS
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Fraud has always exploited trust. Deepfakes industrialize it.

    This session explores a forensic analysis of the $25M Arup deepfake-enabled fraud case. Attendees will learn how attackers combined social engineering, real-time voice/video impersonation, and “routine” business processes to trigger high-value payments and approvals.

    You’ll leave with a practical, investigation-ready response framework built for security leaders, fraud examiners, and risk teams working together:

    • Triage: fast signal detection and decision routing when a request “feels real” but smells wrong
    • Preserve: capturing the right artifacts (transactions, communications, video/voice originals, metadata) to avoid losing proof
    • Validate: out-of-band confirmation and corroboration that separates deception from reality
    • Report: bank/law enforcement escalation, internal notification, and documentation that stands up to scrutiny

    We’ll also pressure-test common misconceptions; why “better deepfake detectors” won’t save you by themselves, how attackers weaponize urgency and authority, and which finance-process controls reduce loss fastest.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    CLOSING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm
Exhibitors
  • Google Cloud Security
    Booth: n/a

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Proofpoint
    Booth: n/a

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Security Journey
    Booth: n/a

    Security Journey offers robust application security education tools to help developers and the entire SDLC team recognize and understand vulnerabilities and threats and proactively mitigate these risks. The knowledge learners acquire in our programs goes beyond helping learners code more securely–it turns everyone in the SDLC into security champions.

    Our platform takes a unique level approach, transitioning learners from security basics to language-specific knowledge to the experiential learning required to become security champions. With lessons offered in multiple formats, including text, video, and hands-on sandbox environments, there is a modality that resonates with every learning style. Organizations with teams of security champions develop a security-first mindset that allows them to deliver safer, more secure applications.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Shruti Mukherjee
    Director of GRC, GlobalVision

    Shruti Mukherjee is a Governance, Risk, and Compliance (GRC) specialist helping organizations transform compliance into a business enabler. She bridges strategy, regulation, and technology to build resilient, privacy-driven frameworks aligned with global standards. With experience leading ISO, privacy, and AI governance programs, Shruti simplifies complex risk landscapes into actionable insights. Her work empowers leadership teams to turn compliance outcomes into trust and market advantage. Recognized as a thought leader and speaker, she brings clarity, innovation, and impact to modern governance.

  • speaker photo
    Hemanth Tadepalli
    Senior Cybersecurity and Compliance SME, May Mobility

    Hemanth Tadepalli serves as the Senior Cybersecurity & Compliance Subject Matter Expert (SME) at May Mobility, a company revolutionizing transportation through advanced autonomous vehicle technology. His career spans notable roles at prestigious organizations, including management consulting firm AlixPartners, cybersecurity leader Mandiant, tech giant Google, and Michigan-based cybersecurity startup SensCy.

    Hemanth’s research focuses on advancing cybersecurity in critical areas such as autonomous vehicle security, Internet of Things (IoT) security, threat intelligence, risk management, API security, and election security. He was appointed by Michigan Secretary of State Jocelyn Benson to the Advisory Task Force overseeing statewide election security and integrity.

    In addition to his technical contributions, Hemanth has published numerous articles on cybersecurity and emerging technologies, showcasing his thought leadership. He is a sought-after speaker, invited to present at prominent cybersecurity conferences, serve as a distinguished panelist, and share insights on technology-focused podcasts. His impactful work has earned him accolades, including the 40 Under 40 recognition from Oakland County, Michigan, and the Governor’s Service Award for his philanthropic efforts and community service in cybersecurity.

    Hemanth earned his bachelor’s degree in Computer Science from Kettering University, concentrating in cybersecurity and minoring in Pre-Law, Innovation, and Entrepreneurship. He went on to earn his master’s degree in Cybersecurity and Information from the University of California, Berkeley, where he was honored as the student commencement speaker. He is currently a Ph.D. candidate at Dakota State University, specializing in cyber defense. In addition to his academic pursuits, Hemanth serves in elected office for the City of Troy and sits on the Board of Directors for Kettering University.

  • speaker photo
    Shubham Anandani
    Engineering Manager, Identity, LinkedIn

    Shubham Anandani is an Engineering Manager at LinkedIn, where he leads teams focused on AI and professional identity platforms. Previously, at Oracle Health Sciences, he architected pioneering SaaS infrastructure for clinical trial randomization, serving Tier-1 pharmaceutical companies and ensuring FDA 21 CFR Part 11 compliance.

    He holds a Master’s in Software Engineering from Carnegie Mellon University and is a Senior Member of IEEE. Shubham combines deep expertise in distributed systems with a focus on responsible AI to solve complex security and identity challenges.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Founder & President, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.

    Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.

  • speaker photo
    Steven F. Fox
    Director of Information Security & Regulatory Compliance, ETS

    Creating value-add business outcomes through security and privacy design is the core of my professional mission. I prioritize understanding my clients’ organizational goals and culture to ensure their infrastructure and processes reflect their ethos. As an IT-to-business translator with extensive technical and business advisory experience, I have successfully led audits testing controls from standards such as NIST CSF, ISO 27001, GDPR, and PCI-DSS. My contributions to the security community include publications in ISSA Journal and CSOonline, and presentations at RSA Conference, Blackhat Executive Summit, and DefCon. As a member of the SecureWorld Expo Advisory Committee, I remain actively engaged in advancing the field of cybersecurity.

Propel your cyber career at SecureWorld!

Hone your skills and knowledge and earn 6 CPE credits.