Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, August 28, 202510:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 amOPENING KEYNOTERegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmThe Enemy Within: Insider Threats and the Impact to Critical InfrastructureRegistration Level:Open Sessions
12:00 pm - 12:45 pmA careless or malicious insider can destroy an enterprise. Optimizing a cybersecurity insider threat program and integrating it into the enterprise risk management strategy can increase security resilience and provide early warning to threats. What security and contingency policies should you consider that are right for you? Examine how to assess your existing risk profile and how to design, plan, and build a successful insider risk program. Participants will learn what critical infrastructure sectors are doing to combat the threat and discuss how to build an effective strategy along with technology solutions that may aid security programs.
12:00 pmRansomware: How to Stay Off the Front PagesRegistration Level:Open Sessions
12:00 pm - 12:45 pm12:00 pmAI-Driven Cybersecurity: The Good, the Bad, and the UglyRegistration Level:Open Sessions
12:00 pm - 12:45 pmSession description to come.
12:00 pmInvesting in Your Application Security ProgramsRegistration Level:Open Sessions
12:00 pm - 12:45 pmSession description to come.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmGuardians of the Grid: Navigating the New Era of Cyber Threats to InfrastructureCybersecurity and Compliance Engineer, May MobilityRegistration Level:Open Sessions
1:00 pm - 1:45 pmAs critical infrastructure systems become more connected and reliant on digital technologies, they also become prime targets for cyberattacks. From power grids and water systems to healthcare networks and transportation, these essential services face a growing array of cyber threats—ransomware, nation-state actors, insider threats, and supply chain vulnerabilities among them.
This presentation explores the evolving cyber risk landscape impacting critical infrastructure, highlighting real-world incidents, common attack vectors, and systemic weaknesses. It also outlines the strategic imperatives for resilience, including stronger public-private partnerships, regulatory modernization, workforce readiness, and investment in advanced cybersecurity technologies. Attendees will gain a deeper understanding of the urgency and complexity of defending infrastructure that underpins national security, economic stability, and public safety.
1:00 pmEngaging with and Driving Innovation in CybersecurityRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pmHarnessing Data Analytics for Robust Fraud Detection and PreventionRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pmMicro Segmentation: What You Need to KnowRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmAirgapped... but Still Compromised: Adversarial Tactics and Building Defensible IsolationSr. Offensive Security Engineer, ConfidentialRegistration Level:Open Sessions
2:00 pm - 2:45 pmAir-gapped systems are often considered the pinnacle of security, but are they truly untouchable? This talk challenges the myth of absolute isolation, exploring real-world breaches—from Stuxnet to electromagnetic and acoustic attacks. Attendees will gain insight into modern threats, including supply chain risks and social engineering, while learning practical strategies to fortify air-gapped environments. Through physical security, procedural controls, and advanced detection methods, this session will reshape how you think about “unhackable” systems. Whether you secure critical infrastructure or simply love cybersecurity, you’ll leave with a deeper understanding of air-gap vulnerabilities and how to defend against them.
Attendees will learn that air-gapped systems are not inherently secure and require continuous vigilance, layered defenses, and proactive threat mitigation to prevent sophisticated breaches.
2:00 pmUsing GenAI to Turbocharge Your GRC TeamsRegistration Level:Open Sessions
2:00 pm - 2:45 pmTraditional methods of managing Governance, Risk Management, and Compliance (GRC) programs often lack the efficiency and scalability needed in today’s fast-paced environment. This talk will demonstrate the use of Generative AI technologies to transform and turbocharge GRC teams, offering significant advancements in processing capabilities, decision-making speed, and overall accuracy. We will explore practical applications of Generative AI in automating routine GRC tasks such as policy drafting, efficient risk assessment, threat modeling, and writing your own GPTs to automate workflows.
2:00 pm[Panel] Protecting Data and Systems in the CloudRegistration Level:Open Sessions
2:00 pm - 2:45 pmSession description to come.
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmIntegrating Transformative OT Cybersecurity ProgramsRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:00 pmExploiting the Human Side: Phishing, Social Engineering, and Con ArtistsRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:00 pmStarting Your Zero Trust Journey on the Right FootRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmCLOSING KEYNOTERegistration Level:Open Sessions
4:00 pm - 4:45 pm
- Google CloudBooth:
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- Hemanth TadepalliCybersecurity and Compliance Engineer, May Mobility
Hemanth Tadepalli is a Cybersecurity Compliance Engineer at May Mobility, excelling in the realm of autonomous transportation services. With a rich professional background spanning roles at AlixPartners, Mandiant, Google, and SensCy, he specializes in ensuring compliance with stringent standards like ISO 27001, SOC 2, ISO/SAE 21434, and others. Hemanth co-founded MYCAP (Michigan Young Cybersecurity Analysts and Professionals), fostering budding talents in the cybersecurity domain. Appointed by the Michigan Department of State in 2022, he served on the Collegiate Advisory Task Force, determined and implemented recommendations to improve voter education and engagement among universities across the state of Michigan. The task force played an important role in election security, integrity, and combatting the result of misinformation being spread.
Hemanth has presented at the Detroit Automotive Cybersecurity Conference and various other prominent industry events, showcasing his expertise and thought leadership. He holds a Computer Science degree with a cybersecurity concentration and minors in Pre-Law, Innovation, and Entrepreneurship from Kettering University. Currently pursuing a Master's in Cybersecurity at the University of California, Berkeley, he continues to drive innovation and excellence in the cybersecurity landscape.
- Sean BehanSr. Offensive Security Engineer, Confidential

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Reserve your spot today!
