Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, December 4, 20258:30 amExhibitor Hall openRegistration Level:
Open Sessions
8:30 am - 3:00 pmYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.
9:00 am[Opening Keynote ] Lessons from the Trenches: Frontline Intelligence on Today's Most Dangerous ThreatsManaging Security Consultant, Mandiant, part of Google CloudRegistration Level:
Open Sessions
9:00 am - 9:45 amIn today’s adversarial landscape, security teams are constantly playing catch-up against sophisticated, well-resourced attackers. Josh Iroko, a Managing Security Consultant with Mandiant, is on the frontlines of these battles, helping global organizations respond to their most critical breaches and transforming their security programs.
In this high-impact keynote, Mr. Iroko will share proprietary, real-world intelligence gleaned from Mandiant’s recent, high-profile incident response and strategic consulting engagements. He will move beyond mere headlines to unpack the current Tactics, Techniques, and Procedures (TTPs) that define modern attacks, including:
- The New Initial Access: Analyzing the most effective entry points currently being exploited, from supply chain weaknesses to zero-day vulnerabilities in cloud infrastructure.
- Post-Compromise Behavior: Detailing how threat actors—be they financially motivated or nation-state groups—escalate privileges, maintain persistence, and exfiltrate data after the initial breach, with a specific focus on challenges in hybrid and cloud-native environments.
- Strategic Imperatives: Translating these frontline observations into actionable strategies for security leaders and practitioners. Attendees will learn how to shift their posture from purely reactive defense to an intelligence-led, proactive cyber resilience model that is proven to reduce the impact and duration of a compromise.
This session offers a rare opportunity to gain insights from one of the world’s leading incident response firms, equipping you with the knowledge needed to prepare for, and survive, the next major attack.
9:45 amNetworking BreakRegistration Level:
Open Sessions
9:45 am - 10:00 amVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
10:00 amThe Five People You Meet in CybersecurityFounder & Fractional Chief Digital and Transformation Officer, Wired for ChangeRegistration Level:
Open Sessions
10:00 am - 10:45 amCybersecurity isn’t just about systems—it’s about people. Inspired by The Five People You Meet in Heaven by Mitch Albom, this talk uses storytelling and lived experience to reveal five personas you’re likely to meet on the path to cyber transformation: from the under-resourced IT leader to the recently breached, the skeptic exec to the inspired keener, and the vulnerable populations most at risk. Amy Yee blends empathy, strategy, and systemic insight to reframe how we see our roles—and each other—in this high-stakes, human-centered field.
10:00 amCyber Behavioral ProfilingCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:
Open Sessions
10:00 am - 10:45 amSession details to come.
10:00 amFrom Shadow IT to Shadow AI: Securing Data in the Age of Unsanctioned IntelligenceStaff Product Marketing Manager, Information & Cloud Security, ProofpointStaff Product Marketing Manager, ProofpointRegistration Level:
Open Sessions
10:00 am - 10:45 amAs generative AI adoption accelerates, a new risk emerges: Shadow AI. Just like Shadow IT before it, unsanctioned AI tools are quietly accessing sensitive data, often without visibility or control from security teams.
Join us to learn how Proofpoint is redefining data security with a unified, AI-aware platform that helps you discover where sensitive data resides, understand who’s using it, and prevent exposure through unauthorized AI applications.
In this session, you’ll learn:
- How Shadow AI is reshaping the data-security landscape
- Why traditional DLP falls short in today’s AI-driven world
- How Proofpoint delivers visibility and control over unsanctioned AI use
- How prebuilt policies and automated controls prevent data violations and govern access
- Real-world examples of how organizations are securing data across hybrid workspaces
10:00 amAI-Assisted SDLC: Rapid Prototyping for Security EngineeringVP, Security Strategy, Sumo LogicLead Technical Advocate, Sumo LogicRegistration Level:
Open Sessions
10:00 am - 10:45 amThe age-old complaint in security engineering is that “big ideas die in the backlog.” Lengthy discovery, design, and coding cycles smother urgency—especially when threats are evolving faster than releases. Enter AI-first development, where language models collapse friction at every step of the SDLC and let small teams translate concept into running code in hours, not quarters.This talk tells the inside story of how we built a working Al Assisted Alert Agent & an Insider Threat & Fraud Detection module in a couple afternoons—then generalized the method into a repeatable playbook any security team can copy.Highlights include:- Rethink Development Cycles – AI-assisted competitive analysis, ROI modeling, architecture drafting, and test generation—each shaved from weeks to minutes.
- Vibe Coding in practice – How “prompt-to-prototype” workflows boost individual throughput 30–40 % and democratize coding to non-developers.
- New tools available to stitch together AI and Automation for app-like workflows.
10:45 amNetworking BreakRegistration Level:
Open Sessions
10:45 am - 11:00 amVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
11:00 amWhat's Up? Hot Topics and Recent Headlines in Privacy, Cyber, and AIMember, Data Privacy & Cybersecurity, Clark Hill LawRegistration Level:
Open Sessions
11:00 am - 11:45 amJoin us for a lively and engaging session that cuts through the noise of today’s privacy, cybersecurity, and artificial intelligence news. In this fast-paced presentation, we’ll dive into ten of the most significant and talked-about headlines, exploring the real-world legal and compliance implications for your business.Our host will put an entertaining and perhaps comical spin on these headlines, framing complex issues in a way that’s a little more light-hearted. Then, our special guest will test their knowledge, attempting to identify each headline and provide a breakdown of why it matters—or why it doesn’t—for your organization. Get ready to sort through the hype and walk away with a clear understanding of the developments you need to know about right now.11:00 amFrame by Frame: Deepfakes in the Wild and in CourtNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceRegistration Level:
Open Sessions
11:00 am - 11:45 amThis presentation treats deepfakes as a dual problem: first, scalable social-engineering for fraud and extortion, second, evidentiary trust and admissibility.
We outline an operational triage for scams and a forensic pipeline for courtroom authentication. On the technical side, we interrogate video at three layers: container metadata, codec bitstream, and sensor. For HEVC (H.265) we examine GOP layout and I/P/B distributions in contrast to AI Generated Images.
AI-generated sequences are profiled for temporal inconsistencies, mouth-eye desynchrony, lighting and specular drift, unstable motion-vector fields relative to content, and atypical of camera originals. The goal is for a playbook for rapid scam mitigation and a repeatable, tool-logged, frame-by-frame method to either authenticate legitimate HEVC captures or challenge AI-assisted fabrications in court.
We also cover tools and methodology used in deepfakes.
11:00 amThe Rise of Digital Ghosts: Managing Machines Before They Manage YouDirector of GRC, GlobalVisionRegistration Level:
Open Sessions
11:00 am - 11:45 amAs organizations embrace automation, APIs, and AI-driven workflows, a new class of identities has quietly emerged—the non-human identities. These include machine agents, service accounts, bots, and API keys that carry out essential tasks but frequently function outside of conventional governance frameworks. Identifying, controlling, and safeguarding these digital “ghosts” before they become a blind spot in your security and compliance systems is the focus of this webinar. Participants will get an understanding through practical examples of how to apply GRC and privacy principles to machine identities, incorporate them into frameworks that correspond with ISO 27001/42001, and mitigate the risks associated with uncontrolled automation.
11:00 am[Panel] The Rise of Zero-Touch Compliance: Automating Your Way Out of Audit FearSenior Director, Security and Technical Operations, AutomoxSVP of Operations & General Counsel, AutomoxRegistration Level:
Open Sessions
11:00 am - 11:45 amThe future of compliance isn’t about more headcount; it’s about zero-touch automation. This session brings together legal and technology experts to discuss how organizations can leverage modern IT automation platforms to achieve and maintain compliance effortlessly. Panelists will address critical questions like: How does automated proof of remediation change the auditor-IT relationship? and What is the legal perspective on trusting automated compliance evidence?
Discover how shifting from manual oversight to automated enforcement dramatically reduces risk and transforms compliance from an operational burden into a competitive advantage.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmA Practical Guide to Data Protection for Enterprise AI AdoptionHead of Enterprise Security, BoxRegistration Level:
Open Sessions
12:00 pm - 12:45 pmAs enterprises embrace the limitless possibilities of AI, we security professionals need to adapt to safeguard sensitive data. In this talk, we’ll unpack a few real-world patterns of how data leaks into or out of AI systems and offer a simple framework for threat-modeling enterprise AI usage without slowing down innovation.
12:00 pmLeadership Excellence: Strategies to Enhance Productivity, Performance, and CollaborationCEO & Founder, Optimize You High-Performance CoachingRegistration Level:
Open Sessions
12:00 pm - 12:45 pmIn today’s dynamic and diverse workplace, effective leadership requires more than just strategic thinking; it demands emotional intelligence, active listening, and the ability to inspire trust and collaboration. Leadership Excellence is a high-impact session designed to help leaders elevate performance while fostering a culture of belonging, collaboration, and well-being.
This engaging presentation equips professionals with actionable strategies to lead with clarity, connection, and confidence. Participants will explore a proven framework for listening beyond words, building trust across teams, managing conflict with empathy, and driving meaningful results, without sacrificing their own health or values.
Grounded in real-world application and supported by research, this session empowers leaders to balance professional excellence with personal well-being. Attendees will walk away with tools to minimize burnout, improve collaboration, and create psychologically safe environments where individuals and ideas thrive.
Through interactive exercises, real-time feedback, and practical takeaways, participants will learn how to become the kind of leader who energizes people, unites diverse perspectives, and delivers consistent results. Whether you’re an executive, team lead, or rising professional, this session offers a blueprint for sustainable success and impactful leadership.
12:00 pmMaximizing Data Security ROI: Turn Managed Services into a Strategic AdvantageHead of Services GTM, CyeraHead of Services, CyeraRegistration Level:
Open Sessions
12:00 pm - 12:45 pmData security is no longer just a cost center—it’s a driver of business value. Join Cyera’s experts for a thought-provoking discussion on how managed services can help organizations maximize ROI by improving compliance, reducing risk, and enabling scalability.
12:00 pm[Panel] The Current Threat LandscapeVP, CTO-in-Residence, ZscalerChief Security Advisor, TaniumHead of Services, CyeraGlobal Field CISO, CohesityRegistration Level:
Open Sessions
12:00 pm - 12:45 pmThe threat landscape is constantly evolving, with new and sophisticated attacks emerging daily. This expert panel provides critical insights into the latest cyber threats, equipping you with the knowledge and strategies to defend your organization.
12:45 pmNetworking BreakRegistration Level:12:45 pm - 1:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmThe Last Human Advantage: How Persuasion, Trust, and Influence Win Budget and the Battle for SecurityHead of New Ventures Security Team, Walmart; Founder, CyberXRegistration Level:
Open Sessions
1:00 pm - 1:45 pmHackers don’t just exploit code, they exploit people. They use Cialdini-grade persuasion, authority cues, urgency, and trust triggers to get humans to click, comply, and reveal. In this provocative and practical session, former Fortune-1 cybersecurity and privacy executive Anthony Martin turns that playbook inside out—showing security leaders how to ethically apply those same influence principles to drive results in the boardroom instead of the inbox.
Attendees will learn why persuasion works at a neural level, how to translate “attacker psychology” into ethical communication, and how to use those levers to win budget, accelerate adoption, and build departmental trust. Whether you’re a rising manager or a CISO in waiting, this session will give you the science-backed techniques to sell your strategy, earn executive confidence, and move the needle on both your program and your career.
Key take-aways:
- Leverage “persuasion” or “influence” as the ultimate leadership differentiator
- Transform technical expertise into influence that secures funding, drives adoption, and accelerates both organizational impact and personal career growth.
1:00 pmThe Data War Has Begun: Winning at the Intersection of Cybersecurity, Cloud, and AICybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
1:00 pm - 1:45 pmWe are living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how data is created, accessed, manipulated, and weaponized. In this new era, your most valuable asset—your data—is under constant threat, not just from cybercriminals, but from your own infrastructure decisions.
In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots organizations face as they race to adopt AI and migrate to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional defenses, how AI is both a weapon and a shield, and why the cloud isn’t inherently secure—unless you make it so.
Whether you’re a CEO, CISO, or business leader, this session will empower you with actionable frameworks to:
- Understand how AI and cloud reshape the cyber threat landscape
- Identify data exposure risks that live outside your control—and how to reclaim it
- Shift from a perimeter model to identity- and data-centric security
- Build an AI-aware security posture that accelerates—not blocks—innovation
- Win the new war for data ownership, visibility, and control
The convergence is already here. The question is, are you leading with confidence, or reacting with chaos?
1:00 pmCyber Intel BriefingCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:1:00 pm - 1:45 pmIn an increasingly volatile world, this session offers a critical debrief on the most pressing global issues and their direct impact on organizational strategy and resilience. The talk will cover significant geopolitical developments, from shifting international power dynamics to the complex relationship between global events and digital security. It will also explore the dramatic changes in data privacy regulations driven by the rise of artificial intelligence, highlighting the new compliance and ethical responsibilities for all leaders. Finally, the presentation will provide a strategic framework for building resilience against modern threats, from digital attacks to supply chain disruptions. As we wrap up 2025 and start to think about 2026, attendees will leave with a clear understanding of the evolving landscape and a proactive plan to secure their operations in the year ahead.
1:00 pmRansomware: A Left of Boom StorySr. Manager, Hunt & Response, HuntressDirector, Product Marketing, HuntressRegistration Level:
Open Sessions
1:00 pm - 1:45 pmRansomware isn’t an instantaneous event—it’s a multi-stage campaign, whether opportunistic or highly targeted. These critical, pre-deployment phases offer a window of opportunity for prevention, detection, and defense.
In this presentation, we will dissect the stages leading up to the ransomware payload. We’ll share real-world examples from the Huntress SOC and our threat hunters and provide ways your organization can boost resilience against ransomware attacks.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pm[Closing Keynote] Zero Trust and AI: Strengthening Security, Reducing Complexity, and Driving InnovationVP, CTO-in-Residence, ZscalerRegistration Level:
Open Sessions
2:00 pm - 2:45 pmBusinesses stand to benefit from AI in unprecedented ways, but only if IT and security leaders overcome transformation challenges. This includes implementing a modern zero trust architecture to protect data and users, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based approach to security ensures CIOs and CISOs deliver a secure, phased transformation.
Join this session to:
- Understand how zero trust and AI together, unlike firewalls, provide the strongest cyber defense by stopping threat actors from lateral movement within networks
- Learn strategies for protecting AI applications developed internally for customers and employees, while preventing data leaks from public AI applications
- Discover how AI is being leveraged for better cyber defense, in areas like segmentation, data classification and agentic operations
- AutomoxBooth: n/a
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- Cohesity, IncBooth: n/a
We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. The company develops software that allows IT professionals to backup, manage, and gain insights from their data across multiple systems or cloud providers.
- CyeraBooth: n/a
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.
- Google CloudBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- HuntressBooth: n/a
Protect Your Endpoints, Identities, Logs, and Employees.
The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center.
By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most under-resourced businesses defend against today’s cyberthreats.
As long as hackers keep hacking, we keep hunting.
- ProofpointBooth: n/a
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- Sumo LogicBooth: n/a
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- TaniumBooth: n/a
Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).
The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.
For more information, visit: https://www.tanium.com.
- ZscalerBooth: n/a
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
Josh IrokoManaging Security Consultant, Mandiant, part of Google CloudJosh Iroko is a Managing Consultant in Strategic Consulting Services with Mandiant. Josh works closely with organizations of many sizes and in different industries to help identify gaps within their security posture or ability to respond to incidents in a highly efficient and effective manner. Using a combination of experience and Mandiant’s in-depth resources, Josh consistently delivers high quality, detail-oriented consulting services security strategy development, and security assessment engagements across North America, South America, Europe, Middle East, Asia, and Africa.
With experience in private and public sector environments, Josh has assisted large institutions and governments transform various parts of their information security, cyber security and technology functions and elevate their profile to be a valued partner by the business as applicable. Josh has worked on various projects including: Cybersecurity maturity and defense assessments; security solution evaluation and design; alignment of multiple information technology projects via the enterprise security architecture function to ensure a Secure by Design approach; incident response preparedness assessment, incident response and management, incident simulations, implementation and integration of log aggregation and analytics applications; development of a cybersecurity and technology risk framework; crown jewel assessments, cyber threat profiling including, prioritization of risks and controls; design and implementation of performance and risk reporting dashboard; development of enterprise security policy and standards; process mapping and improvement and project management.
Amy YeeFounder & Fractional Chief Digital and Transformation Officer, Wired for ChangeAmy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.
Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiCameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).
Itir ClarkeStaff Product Marketing Manager, Information & Cloud Security, ProofpointItir Clarke is a Staff Product Marketing Manager for Proofpoint's Information and Cloud Security solutions. Before joining Proofpoint, Itir worked on data center products at Cisco, Brocade and Sun Microsystems. Itir has over 20 years of information technology experience in OEM Marketing, Product Marketing and Management roles. Her responsibilities at Proofpoint include positioning and messaging of our Information Protection solutions, evangelizing our people-centric approach to Enterprise Data Loss Prevention, blogging about cloud and insider threats, definition and execution of campaigns and promotions, and sales enablement.
Brian GleesonStaff Product Marketing Manager, ProofpointBrian Gleeson is charged with bringing to market Proofpoint’s People-centric Security Service Edge solutions. He comes to Proofpoint from Check Point, where he focused on a wide portfolio of product offerings, including network, mobile, endpoint, IoT, and cloud security. Since 2013, he published more than 50 though-leadership papers and blogs on topics ranging from cyber threat research, security best practices, and threat prevention.
Chas ClawsonVP, Security Strategy, Sumo LogicAs a technologist interested in disruptive cloud technologies, Chas joined Sumo Logic's Cyber Security team with more than 20 years in the field, consulting with many federal agencies on how to secure modern workloads. In the federal space, he spent time as an architect designing the Department of Commerce ESOC SIEM solution. He also worked at the NSA as a civilian conducting Red Team assessments and within the Office of Compliance and Policy. Commercially, he has worked with MSSP practices and security consulting services for various Fortune 500 companies. Chas also enjoys teaching networking and cybersecurity courses as a Professor at the University of Maryland Global Campus.
David GirvinLead Technical Advocate, Sumo LogicDavid Girvin is a husband, father, surfer, foiler, and BJJ nerd. David is a welder/Ship Captain who got lost and ended up in Security. Starting in offensive AppSec, he began architecting security programs for multiple great companies. That led to conference talks about what he learned and how to help others. David then dove into sales engineering and marketing. Currently, he is trying to bridge gaps in security between engineers and business. All of his talks are made to clear up some of the problems in security, leadership, and business.
Myriah V. Jaworski, Esq., CIPP/US, CIPP/EMember, Data Privacy & Cybersecurity, Clark Hill LawMyriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.
Jared LobatoNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceWith a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification. Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.
Shruti MukherjeeDirector of GRC, GlobalVisionShruti Mukherjee is a Governance, Risk, and Compliance (GRC) specialist helping organizations transform compliance into a business enabler. She bridges strategy, regulation, and technology to build resilient, privacy-driven frameworks aligned with global standards. With experience leading ISO, privacy, and AI governance programs, Shruti simplifies complex risk landscapes into actionable insights. Her work empowers leadership teams to turn compliance outcomes into trust and market advantage. Recognized as a thought leader and speaker, she brings clarity, innovation, and impact to modern governance.
Tom BowyerSenior Director, Security and Technical Operations, AutomoxI'm an innovative security leader with 15 years of technology experience in SaaS and Cloud companies. I am adept at aligning security with business strategy. I specialize in building and leading high-performing teams through empathy, empowerment, and honesty. My experience includes designing and implementing security programs encompassing Product Security, Corporate Security, and Security Governance.
Paul ShoningSVP of Operations & General Counsel, AutomoxExperienced executive providing practical legal solutions in complex, dynamic, and high-growth environments. Expertise in legal, regulatory compliance, corporate development, corporate governance, and legal operations matters for technology companies.
Akhila NamaHead of Enterprise Security, BoxAkhila Nama leads the Enterprise Security organization at Box where she oversees security design, strategy, architecture and risk management, with a focus on securing modern enterprise environments while driving business growth. With more than a decade of experience, Akhila has worked through multiple roles and domains, helping organizations navigate complex threats while building security programs and teams that scale.
Eva MedilekCEO & Founder, Optimize You High-Performance CoachingEva Medilek, the CEO & Founder of Optimize You High-Performance Coaching, is a multi-award-winning executive leadership coach, #1 best-selling author, renowned international speaker, and successful real estate investor.
As a Brendon Burchard certified high-performance coach, ICF trained coach, master trainer, and inclusion communications trainer, Eva offers holistic leadership and collaborative communication coaching programs to individuals, groups, and organizations so they can achieve optimal performance in every area of their lives.
To date, she has clocked over 1,200 coaching hours in her career. With her signature Human Relationship Style Assessment™, she helps her clients identify what’s stopping them so they can go from sabotaging habits and behaviors to creating the time and energy for what matters most to them—all while achieving higher levels of personal and professional success.
She has also contributed to the #1 best-selling book, "Possibilities Unlimited," alongside luminaries Les Brown and Dr. Cheryl Wood.
Ian BushHead of Services GTM, CyeraIan Bush currently serves as the Head of Services / GTM at Cyera. Prior to his current role, Ian was the co-founder and CEO of an MDR firm, which after 13 years was sold to private equity. Ian has held numerous leadership roles in his 25 years of Information Security experience after getting his start as a U.S. Marine in the early 1990s.
Nick PuetzHead of Services, CyeraNick has spent his entire career helping businesses solve problems pertaining to cybersecurity, technology and compliance while building high performing teams that collaboratively deliver services and solutions. These experiences have manifested themselves over the years in different shapes and forms; internal audit, consulting and customer success.
Cybersecurity experience spans nearly 25 years with a focus in consulting and advisory services, business development, and customer success.
Sanjit GanguliVP, CTO-in-Residence, ZscalerSanjit Ganguli is VP, CTO-in-Residence at Zscaler, specializing in zero trust strategy, network transformation and digital experience monitoring engagements. For more than 20 years, he has worked in a variety of roles, including as a Gartner analyst and Deputy CTO at Riverbed. Sanjit was among the original analysts that coined and defined the Digital Experience Monitoring (DEM) and Artificial Intelligence for IT Operations (AIOps) markets. Sanjit also worked on the original SASE research. While at Zscaler, Sanjit has written three books on the topics of zero trust and SASE/SSE.
Sanjit’s current focus is on helping customers along their zero trust transformation journeys, which includes advising on best practices, aligning to industry and analyst frameworks, and adopting zero trust while maintaining user experience.
Tim MorrisChief Security Advisor, TaniumTim is a visionary leader and an IT and cybersecurity expert, with decades of experience across industries. He joined Tanium after retiring from Wells Fargo, where he was an SVP and led several teams in cyber operations, engineering, and research. He holds 24 U.S. patents and has written many articles on cybersecurity topics. He is also a trusted source of insights and opinions for major publications and web shows, where he shares his knowledge and passion for the field.
Tim started his IT career as a developer and sysadmin in manufacturing, then moved to banking, where he did software packaging, scripting, active directory administration, and M&A projects. He has been dedicated to cybersecurity since 2009, specializing in areas such as detection and response, systems and patch management, vulnerability assessment, web-content filtering, malware analysis, red-teaming, and digital forensics.
Nick PuetzHead of Services, CyeraNick has spent his entire career helping businesses solve problems pertaining to cybersecurity, technology and compliance while building high performing teams that collaboratively deliver services and solutions. These experiences have manifested themselves over the years in different shapes and forms; internal audit, consulting and customer success.
Cybersecurity experience spans nearly 25 years with a focus in consulting and advisory services, business development, and customer success.
Dr. Joye Purser, CISSPGlobal Field CISO, CohesityDr. Joye Purser is Global Field CISO at Cohesity, the number-one maker of data backup systems. She also is the 2023 ISC2 Lifetime Achievement Award Winner in Cybersecurity.
In 2022, she was the first-ever senior executive Regional Director for Cybersecurity in CISA Region 4, for the U.S. Department of Homeland Security. At CISA, the Cybersecurity and Infrastructure Security Agency, Dr. Purser delivered strategic vision for a geographically distributed team of security experts and strengthened partnerships with critical infrastructure owners in the region. Prior to that, Dr. Purser worked in the private sector at a large, global management consulting firm, where she facilitated enterprise risk management and business continuity activities for a 10,000-staff client. She led global pandemic recovery operations, enabling a county of 4.7 million people to organize, plan, and expend more than $400 million in COVID relief aid.
Working for 20 years in Washington, Dr. Purser was selected to serve in the White House at the Office of Management and Budget (OMB), where she oversaw development of the $95 billion Department of Defense technology budget. While at OMB, she led an effort that galvanized federal agencies, the private sector, and Congress to unify to secure and strengthen the semiconductor supply chain.
Dr. Purser led audit activities at the Pentagon for a decade, advising on the design and deployment of multi-billion-dollar IT programs such as financial management systems and electronic health records. A governance, risk, and compliance expert, she authored internal policies establishing new authorities for the Director of Cost Assessment and Program Evaluation (OSD/CAPE) for an agency with a two-million-person workforce.
Before that, Dr. Purser worked on Capitol Hill as a seasoned legislative staffer, guiding the agenda for two members of Congress on the House Science Committee. There, she steered the House Diversity and Innovation Caucus; drafted a bill promoting a more diverse technology workforce that passed into law; organized constituent town hall events; worked on a presidential campaign; and contributed to the drafting of the Affordable Care Act.
Earlier in her career, Dr. Purser has consulted on federal engagement strategy as Vice President of Artemis Strategies; and she worked at the nonprofit, Research America, to educate scientists on how to engage with Congress more effectively and in their communities. She serves on the Board of Cyversity; mentors a large group of security professionals; and devotes her gifts of communication, strategy, and coalition-building in a number of volunteer activities in her community.
A graduate of Georgia Tech, Dr. Purser has a technical background as an accomplished researcher. Her first scientific publication has been cited more than three hundred times. She resides in Atlanta with her spouse and children.
Anthony Martin, J.D.Head of New Ventures Security Team, Walmart; Founder, CyberXI’m Anthony Martin. I teach ethical persuasion and influence to cybersecurity and privacy leaders. I’m a Cialdini Institute certified practitioner and former Fortune-50 operator: led cybersecurity for Walmart International, served as Chief Privacy Officer at GAP, and taught Information Privacy & Data Security as a law professor. My current research explores influence, trust, negotiation, and influence—practical ways to help technical professionals be heard by boards and executives.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCCedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)With more than 25 years at the forefront of AI, cloud, enterprise technologies, cybersecurity, privacy, and risk management, VJ is a proven leader, trusted advisor, and strategic investor. He has a demonstrated history of building and scaling successful programs for global enterprises and transforming innovative concepts into impactful products.
As a trusted Board advisor and subject matter expert, VJ guides organizations through intricate digital landscapes, fostering both innovation and strategic foresight. He brings particular value to Audit & Risk Management committees, where he rigorously evaluates and audits technology and cybersecurity organizations and programs, ensuring their veracity, efficiency, resilience, and strategic effectiveness.
A sought-after advisor across expert, incubator, and accelerator networks, VJ empowers VC and PE firms with incisive market analysis, competitive intelligence, and opportunity mapping.
VJ currently applies his diverse skills as the Founding Partner of CYFORIX, a strategic defense and technology risk advisory group, and as CEO of TORQE, a specialized firm focused on solution engineering and transformation.
Dray AghaSr. Manager, Hunt & Response, HuntressWhat started as a helpdesk position for a scarf company turned into a life-long obsession with computers and securing them. Dray holds (among other certifications) an OSCP certification (Offensive Security Certified Professional). The training for OSCP covers several aspects of penetration testing, including network enumeration, vulnerability analysis, buffer overflows, web application attacks, privilege escalation, and more. Based in the UK, Dray specializes in Digital forensics and incident response and is interested in defensive and offensive information security. “I'm here because I genuinely believe in the Huntress mission to secure the 99%—mom & pop stores, local municipal governments, mechanic shops—Huntress is looking out for regular, everyday people and families. It's an honour to provide cyber security for the community.” What's your favorite cybersecurity tip, Dray? “Multi-Factor Authentication is a minor inconvenience for you, and an absolutely devastating obstacle for a cybercriminal.” When he’s not on the computer or walking his dogs, you'll find him in the kitchen, Head-Cheffing it up and trying new recipes.
Toby BussaDirector, Product Marketing, HuntressToby Bussa is a Director of Product Marketing at Huntress. He has over 20 years of experience in cybersecurity. He most recently was VP of Product Marketing at ThreatConnect. Prior to that he was a VP Analyst at Gartner where he covered security operations. He previously led IT security operations, data protection, security architecture and engineering, and 3rd party risk management for a FTSE100 enterprise, and the EMEA SOC threat detection team for a global MSSP.
Sanjit GanguliVP, CTO-in-Residence, ZscalerSanjit Ganguli is VP, CTO-in-Residence at Zscaler, specializing in zero trust strategy, network transformation and digital experience monitoring engagements. For more than 20 years, he has worked in a variety of roles, including as a Gartner analyst and Deputy CTO at Riverbed. Sanjit was among the original analysts that coined and defined the Digital Experience Monitoring (DEM) and Artificial Intelligence for IT Operations (AIOps) markets. Sanjit also worked on the original SASE research. While at Zscaler, Sanjit has written three books on the topics of zero trust and SASE/SSE.
Sanjit’s current focus is on helping customers along their zero trust transformation journeys, which includes advising on best practices, aligning to industry and analyst frameworks, and adopting zero trust while maintaining user experience.

