Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, August 28, 2025
    10:30 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    11:00 am
    [Opening Keynote] The Broken Trust: Securing the IT/OT Boundary Where Attacks Succeed
    • session level icon
    speaker photo
    Sr. Consultant, Mandiant
    speaker photo
    Sr. Strategic Security Consultant, Mandiant
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Nearly every major OT security incident we investigate shares a common theme: a failure at the boundary between the corporate (IT) and industrial (OT) networks. This critical chasm, once protected by a physical air gap, is now a highly permeable and poorly monitored digital bridge. Adversaries know this and exploit it as their primary pathway to impacting physical operations.

    This presentation is a deep dive into the “seven deadly sins” of IT/OT integration that Mandiant consistently observes in the field. Using anonymized case studies, we will expose the common architectural flaws, misconfigurations, and broken trust relationships that allow attackers to pivot from an IT compromise to an OT shutdown. We will cover flawed firewall rules, insecure jump hosts, shared credentials, and unmonitored protocol usage. More importantly, we’ll provide a clear, defensible architecture model—based on Purdue Model principles and a zero-trust mindset—that you can use to build a boundary that is both functional and secure.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Mind Over Malware: Behavioral Profiling to Safeguard Critical Infrastructure
    • session level icon
    speaker photo
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Critical infrastructure cyber-attacks are not just technical events—they are the product of human intent, shaped by motive, tradecraft, and psychological drivers. Mind Over Malware explores how cyber behavioral profiling can reveal the underlying patterns behind nation-state sabotage, criminal campaigns, and ideologically motivated assaults on essential systems. Through recent case studies, we’ll examine how cultural influences, cognitive biases, and personality traits inform attacker decision-making and target selection. Attendees will gain practical strategies for integrating behavioral insights with technical intelligence to better predict, attribute, and defend against the most dangerous threats to the systems society depends on most.

    12:00 pm
    Zero Trust in Action: A Practical Roadmap for Security Transformation
    • session level icon
    speaker photo
    CDO & CDTO | Board Member & Advisor | Podcaster
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Zero Trust is more than a buzzword—it’s a mindset shift that reshapes how organizations protect assets. In this session, digital transformation and cybersecurity expert Amy Yee presents a clear, actionable roadmap for adopting Zero Trust. You’ll explore foundational principles and organizational drivers, learn how to assess maturity and identify quick wins, and understand common pitfalls—like fragmented identity policies—before they derail your progress.

    Amy dives into key ingredients: identity security, supply chain resilience, essential cross-team conversations, and navigating blockers/enablers. Packed with real-world examples and practical exercises, this talk will leave CISOs, IT leaders, and security teams equipped to design, implement, and sustain a Zero Trust strategy that scales with business needs.

    12:00 pm
    Improving OT Cybersecurity Programs’ Effectiveness
    • session level icon
    speaker photo
    Principal, CI5O Advisory Services LLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    At the operational field, plant or edge level, growing risks like cybersecurity must be managed amid a need to democratize and expand technology within an increasingly connected workplace. Traditional approaches of handling cyber, analytics, edge and others as separate IT projects and not addressing these needs as various pieces of a major holistic change effort (including many non-technology aspects) are causing them to fail outright or have poor results. Operational management frameworks are designed to provide consistency and reliability at the field level for various reasons, including safety and environmental priorities, and can create friction with innovative techniques and large-scale change. Culture clashes between OT, IT, and Operations teams and priorities worsen this situation.

    It’s important to appreciate how transformative OT cybersecurity programs are in order to integrate those objectives and ways of working into existing frameworks. This also allows you to take advantage of new models and emerging technology which can accelerate progress. Finding and supporting these solutions is not enough though; then, companies need to apply a different approach to leading their internal change to overcome resistance and improve engagement.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    What Data Tells Us About How APTs Really Attack Utilities
    • session level icon
    speaker photo
    CTO, Keystrike
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    In the last 18 months, there have been two significant changes in state-sponsored attackers targeting American critical infrastructure. It is not just the significant increase in the volume of breaches in the headlines, but the goals of the attackers have also shifted. Join us for a data-driven look into the most common tactics, techniques, and procedures (TTPs) of APT groups and actionable strategies to defend against these adversaries.

    What you’ll learn:

    • The most common methods exploited by APT groups
    • Where traditional best practices fall short
    • The most effective detection points and countermeasures to implement now
    1:00 pm
    Guardians of the Grid: Navigating the New Era of Cyber Threats to Infrastructure
    • session level icon
    speaker photo
    Senior Cybersecurity and Compliance SME, May Mobility
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    As critical infrastructure systems become more connected and reliant on digital technologies, they also become prime targets for cyberattacks. From power grids and water systems to healthcare networks and transportation, these essential services face a growing array of cyber threats—ransomware, nation-state actors, insider threats, and supply chain vulnerabilities among them.

    This presentation explores the evolving cyber risk landscape impacting critical infrastructure, highlighting real-world incidents, common attack vectors, and systemic weaknesses. It also outlines the strategic imperatives for resilience, including stronger public-private partnerships, regulatory modernization, workforce readiness, and investment in advanced cybersecurity technologies. Attendees will gain a deeper understanding of the urgency and complexity of defending infrastructure that underpins national security, economic stability, and public safety.

    1:00 pm
    Cyber Playbook: How to Train Your Business to Secure Code
    • session level icon
    speaker photo
    Team Leader of Information Security, Garmin International
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    Attendees will learn how to integrate security into the development process while encouraging a security-driven mindset within the business. The session will explore strategies for training business teams to adopt security best practices and aligning security goals with business objectives.
    The focus will be on STRIDE, a threat modeling methodology, and Threat Dragon, an OWASP tool that helps developers identify vulnerabilities and security risks early. These tools offer a cost-effective way to promote secure thinking across the business. Attendees will leave with practical knowledge on how to advocate for secure coding practices, collaborate effectively with developers, and meet project deadlines while ensuring robust security.
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Airgapped... but Still Compromised: Adversarial Tactics and Building Defensible Isolation
    • session level icon
    speaker photo
    Sr. Offensive Security Engineer, Confidential
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Air-gapped systems are often considered the pinnacle of security, but are they truly untouchable? This talk challenges the myth of absolute isolation, exploring real-world breaches—from Stuxnet to electromagnetic and acoustic attacks. Attendees will gain insight into modern threats, including supply chain risks and social engineering, while learning practical strategies to fortify air-gapped environments. Through physical security, procedural controls, and advanced detection methods, this session will reshape how you think about “unhackable” systems. Whether you secure critical infrastructure or simply love cybersecurity, you’ll leave with a deeper understanding of air-gap vulnerabilities and how to defend against them.

    Attendees will learn that air-gapped systems are not inherently secure and require continuous vigilance, layered defenses, and proactive threat mitigation to prevent sophisticated breaches.

    2:00 pm
    Preventing, Detecting, Responding, and Recovering from a Ransomware Attack
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Ransomware attacks continue to pose a significant and evolving threat to organizations of all sizes. The potential for operational disruption, data loss, financial damage, and reputational harm is immense. This session will provide a comprehensive overview of a multi-layered strategy to effectively combat ransomware.

    Join us to explore the critical phases of ransomware defense:

    • Prevention: Discover proactive measures to fortify your defenses, including robust security hygiene, employee awareness training, network segmentation, and vulnerability management. Learn how to minimize your attack surface and make your organization a less attractive target.
    • Detection: Understand the key indicators of an active ransomware attack. We will discuss the tools and techniques for early detection, such as monitoring for unusual file activity, network traffic anomalies, and endpoint-level behavioral analysis, enabling a swift response.
    • Response: Learn how to develop and implement an effective incident response plan specifically tailored for ransomware. This includes crucial steps like containment, eradication, communication strategies, and decision-making regarding ransom demands.
    • Recovery: Explore best practices for restoring encrypted data and systems efficiently and safely. We will cover the importance of reliable backups, an orderly restoration process, and post-incident analysis to strengthen future resilience.
    This session will equip attendees with actionable insights and best practices to build a resilient cybersecurity posture capable of withstanding, identifying, and quickly recovering from ransomware incidents, ultimately safeguarding your critical assets and ensuring business continuity.
    2:00 pm
    [Panel] The Current Threats to Critical Infrastructure
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    speaker photo
    ICS/OT Principal Security Consultant, Mandiant
    speaker photo
    SVP & GM, Healthcare and Life Sciences, ColorTokens
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Our nation’s critical infrastructure is facing an unprecedented wave of sophisticated cyber threats, targeting everything from industrial control systems to life-saving healthcare networks. This expert panel convenes leading minds from the front lines of ICS/OT security, healthcare, and strategic risk management to dissect the current threat landscape. Join us for a critical discussion on the dangerous convergence of IT and OT, the evolution of ransomware tactics, and the unique vulnerabilities within the healthcare sector.
    Our panelists will explore proactive defense strategies, the impact of the persistent cybersecurity skills gap, and the future security implications of emerging technologies like AI and 5G. Attendees will leave with a deeper understanding of today’s most significant risks and actionable insights on how to build a more resilient and secure future for our most vital assets.
    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    AI, Quantum, and the Cryptographic Countdown: A Ticking Clock for Security Leaders
    • session level icon
    speaker photo
    Sr. Security Engineer, Exeter Finance LLC
    speaker photo
    Lead IT Security Engineer, Tyson Foods
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    As quantum computing threatens to undermine classical encryption, security leaders are racing to develop cryptographic models that can withstand its power. But quantum alone isn’t the whole story, and artificial intelligence is now accelerating both the development and the threat landscape of cryptographic systems.
    In this session, we’ll explore how AI is reshaping the field of quantum cryptography, from enhancing quantum key distribution protocols to automating the discovery of post-quantum vulnerabilities. We’ll examine real-world scenarios where AI accelerates the design of quantum-safe algorithms and how adversaries may weaponize AI to exploit cryptographic transitions.
    Whether you’re planning a migration to post-quantum cryptography or evaluating the security of your digital infrastructure, this talk provides a forward-looking perspective on how AI is shaping the cryptographic future. The era of AI-driven quantum security has begun. Are we ready for it?
    3:00 pm
    Navigating Third-Party Risk and Vendor Resilience
    • session level icon
    speaker photo
    SVP, South Central Zone Regional Manager, Cyber Practice, Marsh
    speaker photo
    Cyber | Data | Artificial Intelligence | Emerging Technology Practice Group Leader, Spencer Fane LLP
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session description to come.

    3:00 pm
    Fireside Chat: Navigating the Digital Frontier with Identity and Zero Trust
    • session level icon
    speaker photo
    Managing Director, Profortis Solutions LLC
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    In an era where the traditional network perimeter has dissolved, identity has emerged as the new cornerstone of digital security. This fireside chat with Arun DeSouza will delve into the transformative power of Zero Trust Architecture, exploring how the principle of “never trust, always verify” reshapes our approach to access, data protection, and risk management. We’ll discuss the critical balance between robust security and seamless user experience, the technologies driving Zero Trust adoption, and its vital role in fortifying critical infrastructure. Join us to understand how organizations can build resilience, ensure compliance, and thrive securely amidst an evolving threat landscape.
    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    Cyber Intel Briefing: Critical Infrastructure
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    This presentation will provide a comprehensive overview of the current cyber landscape, focusing on both global and domestic government-related threats and incidents. We will delve into recent high-profile attacks, explore emerging trends, and discuss the evolving tactics employed by cybercriminals and nation-states. Additionally, the presentation will examine the ongoing challenges faced by governments in protecting critical infrastructure, securing sensitive data, and mitigating the risks posed by cyber espionage. By understanding the latest developments in the cyber threat environment, attendees will gain valuable insights into safeguarding critical networks and systems.

Exhibitors
  • ColorTokens
    Booth: n/a

    ColorTokens, the premier enterprise microsegmentation provider, specializes in making organizations “breach ready” by halting the lateral spread of ransomware and malware within intricate network infrastructures using its innovative ColorTokens Xshield™ platform. The platform visualizes traffic patterns between workloads, devices, and users, enabling organizations to enforce granular micro-perimeters, swiftly isolate critical assets, and respond to breaches effectively. Recognized as a Leader in the Forrester Wave™: Microsegmentation Solutions, Q3 2024 evaluation, ColorTokens safeguards businesses by thwarting ransomware and malware attacks, ensuring significant savings in potential disruptions. For more information, visit www.colortokens.com.

  • Google Cloud Security
    Booth: n/a

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Keystrike
    Booth: n/a

    Keystrike secures remote connections. Our technology ensures that commands made by an employee were _physically_ made on their computer, rather than by a remote attacker. Our patented technology traps even the most sophisticated attackers on a workstation without letting them advance their goals. Let us know if you’d like a demo!

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Chris Plesiuk
    Sr. Consultant, Mandiant

    Chris Plesiuk, M.Sc., a Senior Consultant specializing in strategic cybersecurity services at Mandiant, brings over 15 years of comprehensive expertise to the critical infrastructure sector. Chris's experience spans both IT and ICS/OT environments, addressing the unique challenges of diverse critical infrastructure industries. His core specializations include Security Program Assessments, Crown Jewel Assessments, Tabletop Exercises, and the development of robust Incident Management Programs and associated documentation. Notably, Chris excels in delivering tailored solutions through threat modeling and strategic preparedness.

  • speaker photo
    James Young
    Sr. Strategic Security Consultant, Mandiant

    James Young, a Senior Strategic Security Consultant based in Toronto, Ontario, offers over 25 years of extensive cybersecurity expertise. His career spans critical areas such as architecture, incident response, operations, and risk management, demonstrating a well-rounded understanding of the field. James's experience extends across diverse and demanding sectors, including energy, mining, manufacturing, logistics, banking, and investments. His core focus centers on the development and management of comprehensive IT and OT Security Programs, as well as specialized skills in Threat Modeling, Incident Response Planning, and Security Program Assessments.

  • speaker photo
    Cameron H. Malin
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi

    Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.

    During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.

    He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
    Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).

  • speaker photo
    Amy Yee
    CDO & CDTO | Board Member & Advisor | Podcaster

    Amy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.

  • speaker photo
    Al Lindseth
    Principal, CI5O Advisory Services LLC

    Highly effective and successful senior executive with 25 years in the energy industry. Experience and knowledge spans different markets, products, business models and disciplines.
    Proven track record of:
    • Driving resolution of the top challenges facing different groups, companies or individuals, whether as a member of its management team or as an outside expert
    • Acting as change agent to effect turnaround situations and solve critical problems
    • Balancing between an entrepreneurial culture and the discipline to achieve the high standards and controls of a large public company
    • Doing more with less (PAALP ranked #5 in Forbes 500 in revenues/employee in 2009)

  • speaker photo
    Ymir Vigfusson
    CTO, Keystrike

    I seek simple solutions to complex problems. As a cybersecurity entrepreneur (currently Keystrike, 2 prior exits), a computer science professor (NSF CAREER recipient, 65+ peer-reviewed papers, multiple awards), or as a public speaker (my TEDx talks on hacking have 2+ million views), I innovate and execute in the service of society. I'm also an exoskeleton for 4 little Vikings, a pianist, a private pilot, and an avid Icelander.

  • speaker photo
    Hemanth Tadepalli
    Senior Cybersecurity and Compliance SME, May Mobility

    Hemanth Tadepalli serves as the Senior Cybersecurity & Compliance Subject Matter Expert (SME) at May Mobility, a company revolutionizing transportation through advanced autonomous vehicle technology. His career spans notable roles at prestigious organizations, including management consulting firm AlixPartners, cybersecurity leader Mandiant, tech giant Google, and Michigan-based cybersecurity startup SensCy.

    Hemanth’s research focuses on advancing cybersecurity in critical areas such as autonomous vehicle security, Internet of Things (IoT) security, threat intelligence, risk management, API security, and election security. He was appointed by Michigan Secretary of State Jocelyn Benson to the Advisory Task Force overseeing statewide election security and integrity.

    In addition to his technical contributions, Hemanth has published numerous articles on cybersecurity and emerging technologies, showcasing his thought leadership. He is a sought-after speaker, invited to present at prominent cybersecurity conferences, serve as a distinguished panelist, and share insights on technology-focused podcasts. His impactful work has earned him accolades, including the 40 Under 40 recognition from Oakland County, Michigan, and the Governor’s Service Award for his philanthropic efforts and community service in cybersecurity.

    Hemanth earned his bachelor’s degree in Computer Science from Kettering University, concentrating in cybersecurity and minoring in Pre-Law, Innovation, and Entrepreneurship. He went on to earn his master’s degree in Cybersecurity and Information from the University of California, Berkeley, where he was honored as the student commencement speaker. He is currently a Ph.D. candidate at Dakota State University, specializing in cyber defense. In addition to his academic pursuits, Hemanth serves in elected office for the City of Troy and sits on the Board of Directors for Kettering University.

  • speaker photo
    Reanna Schultz
    Team Leader of Information Security, Garmin International

    Reanna Schultz, from Kansas City, MO, holds both a Bachelor’s and Master’s degree in Cybersecurity. With over six years of professional experience, Reanna has contributed to various corporate environments, leveraging her expertise to strengthen cybersecurity practices.

    Throughout her career, Reanna has worn many hats, including roles in Endpoint Security Engineering, Detection Engineering, and leading a Security Operations Center (SOC) team. In addition to her primary responsibilities, Reanna serves as an adjunct professor at the University of Central Missouri (UCM) and is also an entrepreneur.

    Reanna is the founder of CyberSpeak Labs, a platform dedicated to fostering community engagement through collaboration. She hosts the podcast Defenders in Lab Coats, where she delves into cyber threats and occasionally invites passionate guests to share their insights.
    Driven by her passion for cybersecurity, Reanna frequently travels to speak at events, sharing her industry knowledge and empowering others to improve their organizations' cybersecurity practices.

  • speaker photo
    Sean Behan
    Sr. Offensive Security Engineer, Confidential
  • speaker photo
    Larry Wilson, CISSP, CISA
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Camille Felx Leduc
    ICS/OT Principal Security Consultant, Mandiant

    Camille Felx Leduc is an ICS/OT Principal Security Consultant at Mandiant, now part of Google Cloud, where she stands out as a leading expert in securing industrial control systems. With a robust background in electrical engineering and a Master's degree in Computer Science from Université de Montréal, Camille brings a deep, multi-faceted understanding to critical infrastructure security.

    Her extensive experience includes providing strategic support and advanced consulting to clients across vital sectors such as energy, water and wastewater, and manufacturing. Camille is particularly adept at detection and response within operational technology (OT) environments, helping organizations build formidable defenses against sophisticated cyber threats. Her work consistently focuses on strengthening the ability of these critical entities to not only detect and respond to attacks but also to effectively contain them, directly addressing the unique and complex challenges inherent in operational environments.

  • speaker photo
    Dr. Guru Gurushankar
    SVP & GM, Healthcare and Life Sciences, ColorTokens

    Dr. Guru Gurushankar is a global leader with over 28 years of experience in the healthcare industry. He currently serves at ColorTokens, where he focuses on leveraging his extensive knowledge to support the company in serving global customers worldwide. Previously, he led Corporate Development at Royal Philips, overseeing strategy, M&A, and partnerships. He also headed AWS Healthcare’s medical device practice and served as VP & GM at Cardinal Health, driving growth in a $10B medical segment portfolio. Earlier, he held key roles at Johnson & Johnson and GE Healthcare. Dr. Gurushankar holds a PhD from Michigan and an MBA from Wharton.

  • speaker photo
    Ankit Gupta
    Sr. Security Engineer, Exeter Finance LLC

    Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.

  • speaker photo
    Shilpi Mittal
    Lead IT Security Engineer, Tyson Foods

    Shilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads strategic initiatives in secrets management, application security, cloud governance, and DevSecOps automation. She specializes in designing secure, scalable systems and enhancing the security posture of enterprise environments through streamlined processes and modern architecture.

    Her current areas of focus include applied cryptography and research on emerging quantum threats, particularly in the context of secure key management and the resilience of cryptographic protocols in a post-quantum world.

    Shilpi actively contributes to both internal security strategy and external cybersecurity forums. She combines deep technical knowledge with a forward-thinking approach, emphasizing automation, identity modernization, and risk-based decision-making.

  • speaker photo
    Shelly Thomas
    SVP, South Central Zone Regional Manager, Cyber Practice, Marsh

    Shelly is the Southcentral Zone Regional Manager within Marsh’s Cyber Practice in Dallas, TX. Responsibilities include advising a number of Marsh’s clients across various industries on risk transfer solutions and helping clients tactically navigate the evolving cyber and technology landscape. Shelly strives to cultivate strong relationships with clients and markets.

  • speaker photo
    Shawn E. Tuma
    Cyber | Data | Artificial Intelligence | Emerging Technology Practice Group Leader, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Arun DeSouza
    Managing Director, Profortis Solutions LLC

    Arun DeSouza is a renowned global cybersecurity executive, keynote speaker, and thought leader. Arun has extensive global IT and security leadership experience. His interests include the Internet of Things (IoT), Artificial Intelligence, blockchain, and quantum computing. Arun’s areas of expertise include strategic planning, risk management, identity management, cloud computing, data security, and privacy.

    Arun earned M.S. and PhD degrees from Vanderbilt University. He is a Certified Information Systems Security professional (CISSP) and has earned the Certificate of Cloud Security Knowledge (CCSK). He was induced into the CISO Hall of Fame by the First Global Cyber Observatory and has won multiple industry awards.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.

    Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.