Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, December 4, 20258:30 amExhibitor Hall openRegistration Level:
Open Sessions
8:30 am - 3:00 pmYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.
9:00 amOPENING KEYNOTERegistration Level:
Open Sessions
9:00 am - 9:45 am9:45 amNetworking BreakRegistration Level:
Open Sessions
9:45 am - 10:00 amVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
10:00 amThe Five People You Meet in CybersecurityFounder & Fractional Chief Digital and Transformation Officer, Wired for ChangeRegistration Level:
Open Sessions
10:00 am - 10:45 amCybersecurity isn’t just about systems—it’s about people. Inspired by The Five People You Meet in Heaven by Mitch Albom, this talk uses storytelling and lived experience to reveal five personas you’re likely to meet on the path to cyber transformation: from the under-resourced IT leader to the recently breached, the skeptic exec to the inspired keener, and the vulnerable populations most at risk. Amy Yee blends empathy, strategy, and systemic insight to reframe how we see our roles—and each other—in this high-stakes, human-centered field.
10:00 amCyber Behavioral ProfilingCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:
Open Sessions
10:00 am - 10:45 amSession details to come.
10:00 amFrom Shadow IT to Shadow AI: Securing Data in the Age of Unsanctioned IntelligenceStaff Product Marketing Manager, Information & Cloud Security, ProofpointStaff Product Marketing Manager, ProofpointRegistration Level:
Open Sessions
10:00 am - 10:45 amAs generative AI adoption accelerates, a new risk emerges: Shadow AI. Just like Shadow IT before it, unsanctioned AI tools are quietly accessing sensitive data, often without visibility or control from security teams.
Join us to learn how Proofpoint is redefining data security with a unified, AI-aware platform that helps you discover where sensitive data resides, understand who’s using it, and prevent exposure through unauthorized AI applications.
In this session, you’ll learn:
- How Shadow AI is reshaping the data-security landscape
- Why traditional DLP falls short in today’s AI-driven world
- How Proofpoint delivers visibility and control over unsanctioned AI use
- How prebuilt policies and automated controls prevent data violations and govern access
- Real-world examples of how organizations are securing data across hybrid workspaces
10:45 amNetworking BreakRegistration Level:
Open Sessions
10:45 am - 11:00 amVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
11:00 amWhat's Up? Hot Topics and Recent Headlines in Privacy, Cyber, and AIMember, Data Privacy & Cybersecurity, Clark Hill LawRegistration Level:
Open Sessions
11:00 am - 11:45 amJoin us for a lively and engaging session that cuts through the noise of today’s privacy, cybersecurity, and artificial intelligence news. In this fast-paced presentation, we’ll dive into ten of the most significant and talked-about headlines, exploring the real-world legal and compliance implications for your business.Our host will put an entertaining and perhaps comical spin on these headlines, framing complex issues in a way that’s a little more light-hearted. Then, our special guest will test their knowledge, attempting to identify each headline and provide a breakdown of why it matters—or why it doesn’t—for your organization. Get ready to sort through the hype and walk away with a clear understanding of the developments you need to know about right now.11:00 amFrame by Frame: Deepfakes in the Wild and in CourtNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceRegistration Level:
Open Sessions
11:00 am - 11:45 amThis presentation treats deepfakes as a dual problem: first, scalable social-engineering for fraud and extortion, second, evidentiary trust and admissibility.
We outline an operational triage for scams and a forensic pipeline for courtroom authentication. On the technical side, we interrogate video at three layers: container metadata, codec bitstream, and sensor. For HEVC (H.265) we examine GOP layout and I/P/B distributions in contrast to AI Generated Images.
AI-generated sequences are profiled for temporal inconsistencies, mouth-eye desynchrony, lighting and specular drift, unstable motion-vector fields relative to content, and atypical of camera originals. The goal is for a playbook for rapid scam mitigation and a repeatable, tool-logged, frame-by-frame method to either authenticate legitimate HEVC captures or challenge AI-assisted fabrications in court.
We also cover tools and methodology used in deepfakes.
11:00 amThe Rise of Digital Ghosts: Managing Machines Before They Manage YouDirector of GRC, GlobalVisionRegistration Level:
Open Sessions
11:00 am - 11:45 amAs organizations embrace automation, APIs, and AI-driven workflows, a new class of identities has quietly emerged—the non-human identities. These include machine agents, service accounts, bots, and API keys that carry out essential tasks but frequently function outside of conventional governance frameworks. Identifying, controlling, and safeguarding these digital “ghosts” before they become a blind spot in your security and compliance systems is the focus of this webinar. Participants will get an understanding through practical examples of how to apply GRC and privacy principles to machine identities, incorporate them into frameworks that correspond with ISO 27001/42001, and mitigate the risks associated with uncontrolled automation.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmA Practical Guide to Data Protection for Enterprise AI AdoptionHead of Enterprise Security, BoxRegistration Level:
Open Sessions
12:00 pm - 12:45 pmAs enterprises embrace the limitless possibilities of AI, we security professionals need to adapt to safeguard sensitive data. In this talk, we’ll unpack a few real-world patterns of how data leaks into or out of AI systems and offer a simple framework for threat-modeling enterprise AI usage without slowing down innovation.
12:00 pmLeadership Excellence: Strategies to Enhance Productivity, Performance, and CollaborationCEO & Founder, Optimize You High-Performance CoachingRegistration Level:
Open Sessions
12:00 pm - 12:45 pmIn today’s dynamic and diverse workplace, effective leadership requires more than just strategic thinking; it demands emotional intelligence, active listening, and the ability to inspire trust and collaboration. Leadership Excellence is a high-impact session designed to help leaders elevate performance while fostering a culture of belonging, collaboration, and well-being.
This engaging presentation equips professionals with actionable strategies to lead with clarity, connection, and confidence. Participants will explore a proven framework for listening beyond words, building trust across teams, managing conflict with empathy, and driving meaningful results, without sacrificing their own health or values.
Grounded in real-world application and supported by research, this session empowers leaders to balance professional excellence with personal well-being. Attendees will walk away with tools to minimize burnout, improve collaboration, and create psychologically safe environments where individuals and ideas thrive.
Through interactive exercises, real-time feedback, and practical takeaways, participants will learn how to become the kind of leader who energizes people, unites diverse perspectives, and delivers consistent results. Whether you’re an executive, team lead, or rising professional, this session offers a blueprint for sustainable success and impactful leadership.
12:00 pmMaximizing Data Security ROI: Turn Managed Services into a Strategic AdvantageHead of Services GTM , CyeraHead of Services, CyeraRegistration Level:
Open Sessions
12:00 pm - 12:45 pmData security is no longer just a cost center—it’s a driver of business value. Join Cyera’s experts for a thought-provoking discussion on how managed services can help organizations maximize ROI by improving compliance, reducing risk, and enabling scalability.
12:00 pmThe Current Threat LandscapeGlobal Field CISO, CohesityRegistration Level:
Open Sessions
12:00 pm - 12:45 pmThe threat landscape is constantly evolving, with new and sophisticated attacks emerging daily. This expert panel provides critical insights into the latest cyber threats, equipping you with the knowledge and strategies to defend your organization.
12:45 pmNetworking BreakRegistration Level:12:45 pm - 1:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmThe Last Human Advantage: How Persuasion, Trust, and Influence Win Budget and the Battle for SecurityHead of New Ventures Security Team, Walmart; Founder, CyberXRegistration Level:
Open Sessions
1:00 pm - 1:45 pmHackers don’t just exploit code, they exploit people. They use Cialdini-grade persuasion, authority cues, urgency, and trust triggers to get humans to click, comply, and reveal. In this provocative and practical session, former Fortune-1 cybersecurity and privacy executive Anthony Martin turns that playbook inside out—showing security leaders how to ethically apply those same influence principles to drive results in the boardroom instead of the inbox.
Attendees will learn why persuasion works at a neural level, how to translate “attacker psychology” into ethical communication, and how to use those levers to win budget, accelerate adoption, and build departmental trust. Whether you’re a rising manager or a CISO in waiting, this session will give you the science-backed techniques to sell your strategy, earn executive confidence, and move the needle on both your program and your career.
Key take-aways:
- Leverage “persuasion” or “influence” as the ultimate leadership differentiator
- Transform technical expertise into influence that secures funding, drives adoption, and accelerates both organizational impact and personal career growth.
1:00 pmThe Data War Has Begun: Winning at the Intersection of Cybersecurity, Cloud, and AICybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
1:00 pm - 1:45 pmWe are living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how data is created, accessed, manipulated, and weaponized. In this new era, your most valuable asset—your data—is under constant threat, not just from cybercriminals, but from your own infrastructure decisions.
In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots organizations face as they race to adopt AI and migrate to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional defenses, how AI is both a weapon and a shield, and why the cloud isn’t inherently secure—unless you make it so.
Whether you’re a CEO, CISO, or business leader, this session will empower you with actionable frameworks to:
- Understand how AI and cloud reshape the cyber threat landscape
- Identify data exposure risks that live outside your control—and how to reclaim it
- Shift from a perimeter model to identity- and data-centric security
- Build an AI-aware security posture that accelerates—not blocks—innovation
- Win the new war for data ownership, visibility, and control
The convergence is already here. The question is, are you leading with confidence, or reacting with chaos?
1:00 pmCyber Intel BriefingCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:1:00 pm - 1:45 pmIn an increasingly volatile world, this session offers a critical debrief on the most pressing global issues and their direct impact on organizational strategy and resilience. The talk will cover significant geopolitical developments, from shifting international power dynamics to the complex relationship between global events and digital security. It will also explore the dramatic changes in data privacy regulations driven by the rise of artificial intelligence, highlighting the new compliance and ethical responsibilities for all leaders. Finally, the presentation will provide a strategic framework for building resilience against modern threats, from digital attacks to supply chain disruptions. As we wrap up 2025 and start to think about 2026, attendees will leave with a clear understanding of the evolving landscape and a proactive plan to secure their operations in the year ahead.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pm[Closing Keynote] Zero Trust and AI: Strengthening Security, Reducing Complexity, and Driving InnovationVP, CTO-in-Residence, ZscalerRegistration Level:
Open Sessions
2:00 pm - 2:45 pmBusinesses stand to benefit from AI in unprecedented ways, but only if IT and security leaders overcome transformation challenges. This includes implementing a modern zero trust architecture to protect data and users, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based approach to security ensures CIOs and CISOs deliver a secure, phased transformation.
Join this session to:
- Understand how zero trust and AI together, unlike firewalls, provide the strongest cyber defense by stopping threat actors from lateral movement within networks
- Learn strategies for protecting AI applications developed internally for customers and employees, while preventing data leaks from public AI applications
- Discover how AI is being leveraged for better cyber defense, in areas like segmentation, data classification and agentic operations
- AutomoxBooth: n/a
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- CyeraBooth: n/a
Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.
- Google CloudBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- HuntressBooth: n/a
Protect Your Endpoints, Identities, Logs, and Employees.
The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center.
By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most under-resourced businesses defend against today’s cyberthreats.
As long as hackers keep hacking, we keep hunting.
- Sumo LogicBooth: n/a
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- TaniumBooth: n/a
Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).
The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.
For more information, visit: https://www.tanium.com.
- ZscalerBooth: n/a
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
Amy YeeFounder & Fractional Chief Digital and Transformation Officer, Wired for ChangeAmy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.
Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiCameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).
Itir ClarkeStaff Product Marketing Manager, Information & Cloud Security, ProofpointItir Clarke is a Staff Product Marketing Manager for Proofpoint's Information and Cloud Security solutions. Before joining Proofpoint, Itir worked on data center products at Cisco, Brocade and Sun Microsystems. Itir has over 20 years of information technology experience in OEM Marketing, Product Marketing and Management roles. Her responsibilities at Proofpoint include positioning and messaging of our Information Protection solutions, evangelizing our people-centric approach to Enterprise Data Loss Prevention, blogging about cloud and insider threats, definition and execution of campaigns and promotions, and sales enablement.
Brian GleesonStaff Product Marketing Manager, ProofpointBrian Gleeson is charged with bringing to market Proofpoint’s People-centric Security Service Edge solutions. He comes to Proofpoint from Check Point, where he focused on a wide portfolio of product offerings, including network, mobile, endpoint, IoT, and cloud security. Since 2013, he published more than 50 though-leadership papers and blogs on topics ranging from cyber threat research, security best practices, and threat prevention.
Myriah V. Jaworski, Esq., CIPP/US, CIPP/EMember, Data Privacy & Cybersecurity, Clark Hill LawMyriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.
Jared LobatoNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceWith a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification. Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.
Shruti MukherjeeDirector of GRC, GlobalVisionShruti Mukherjee is a Governance, Risk, and Compliance (GRC) specialist helping organizations transform compliance into a business enabler. She bridges strategy, regulation, and technology to build resilient, privacy-driven frameworks aligned with global standards. With experience leading ISO, privacy, and AI governance programs, Shruti simplifies complex risk landscapes into actionable insights. Her work empowers leadership teams to turn compliance outcomes into trust and market advantage. Recognized as a thought leader and speaker, she brings clarity, innovation, and impact to modern governance.
Akhila NamaHead of Enterprise Security, BoxAkhila Nama leads the Enterprise Security organization at Box where she oversees security design, strategy, architecture and risk management, with a focus on securing modern enterprise environments while driving business growth. With more than a decade of experience, Akhila has worked through multiple roles and domains, helping organizations navigate complex threats while building security programs and teams that scale.
Eva MedilekCEO & Founder, Optimize You High-Performance CoachingEva Medilek, the CEO & Founder of Optimize You High-Performance Coaching, is a multi-award-winning executive leadership coach, #1 best-selling author, renowned international speaker, and successful real estate investor.
As a Brendon Burchard certified high-performance coach, ICF trained coach, master trainer, and inclusion communications trainer, Eva offers holistic leadership and collaborative communication coaching programs to individuals, groups, and organizations so they can achieve optimal performance in every area of their lives.
To date, she has clocked over 1,200 coaching hours in her career. With her signature Human Relationship Style Assessment™, she helps her clients identify what’s stopping them so they can go from sabotaging habits and behaviors to creating the time and energy for what matters most to them—all while achieving higher levels of personal and professional success.
She has also contributed to the #1 best-selling book, "Possibilities Unlimited," alongside luminaries Les Brown and Dr. Cheryl Wood.
Ian BushHead of Services GTM , CyeraIan Bush currently serves as the Head of Services / GTM at Cyera. Prior to his current role, Ian was the co-founder an MDR firm where he served as CEO, and after 13 years was sold to private equity. Ian has held numerous leadership roles in his 25 years of Information Security experience after getting his start as a US Marine in the early 1990’s.
Nick PuetzHead of Services, CyeraNick has spent his entire career helping businesses solve problems pertaining to cybersecurity, technology and compliance while building high performing teams that collaboratively deliver services and solutions. These experiences have manifested themselves over the years in different shapes and forms; internal audit, consulting and customer success.
Cybersecurity experience spans nearly 25 years with a focus in consulting and advisory services, business development, and customer success.
Dr. Joye Purser, CISSPGlobal Field CISO, CohesityDr. Joye Purser is Global Field CISO at Cohesity, the number-one maker of data backup systems. She also is the 2023 ISC2 Lifetime Achievement Award Winner in Cybersecurity.
In 2022, she was the first-ever senior executive Regional Director for Cybersecurity in CISA Region 4, for the U.S. Department of Homeland Security. At CISA, the Cybersecurity and Infrastructure Security Agency, Dr. Purser delivered strategic vision for a geographically distributed team of security experts and strengthened partnerships with critical infrastructure owners in the region. Prior to that, Dr. Purser worked in the private sector at a large, global management consulting firm, where she facilitated enterprise risk management and business continuity activities for a 10,000-staff client. She led global pandemic recovery operations, enabling a county of 4.7 million people to organize, plan, and expend more than $400 million in COVID relief aid.
Working for 20 years in Washington, Dr. Purser was selected to serve in the White House at the Office of Management and Budget (OMB), where she oversaw development of the $95 billion Department of Defense technology budget. While at OMB, she led an effort that galvanized federal agencies, the private sector, and Congress to unify to secure and strengthen the semiconductor supply chain.
Dr. Purser led audit activities at the Pentagon for a decade, advising on the design and deployment of multi-billion-dollar IT programs such as financial management systems and electronic health records. A governance, risk, and compliance expert, she authored internal policies establishing new authorities for the Director of Cost Assessment and Program Evaluation (OSD/CAPE) for an agency with a two-million-person workforce.
Before that, Dr. Purser worked on Capitol Hill as a seasoned legislative staffer, guiding the agenda for two members of Congress on the House Science Committee. There, she steered the House Diversity and Innovation Caucus; drafted a bill promoting a more diverse technology workforce that passed into law; organized constituent town hall events; worked on a presidential campaign; and contributed to the drafting of the Affordable Care Act.
Earlier in her career, Dr. Purser has consulted on federal engagement strategy as Vice President of Artemis Strategies; and she worked at the nonprofit, Research America, to educate scientists on how to engage with Congress more effectively and in their communities. She serves on the Board of Cyversity; mentors a large group of security professionals; and devotes her gifts of communication, strategy, and coalition-building in a number of volunteer activities in her community.
A graduate of Georgia Tech, Dr. Purser has a technical background as an accomplished researcher. Her first scientific publication has been cited more than three hundred times. She resides in Atlanta with her spouse and children.
Panel Discussion
Anthony Martin, J.D.Head of New Ventures Security Team, Walmart; Founder, CyberXI’m Anthony Martin. I teach ethical persuasion and influence to cybersecurity and privacy leaders. I’m a Cialdini Institute certified practitioner and former Fortune-50 operator: led cybersecurity for Walmart International, served as Chief Privacy Officer at GAP, and taught Information Privacy & Data Security as a law professor. My current research explores influence, trust, negotiation, and influence—practical ways to help technical professionals be heard by boards and executives.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCCedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)With more than 25 years at the forefront of AI, cloud, enterprise technologies, cybersecurity, privacy, and risk management, VJ is a proven leader, trusted advisor, and strategic investor. He has a demonstrated history of building and scaling successful programs for global enterprises and transforming innovative concepts into impactful products.
As a trusted Board advisor and subject matter expert, VJ guides organizations through intricate digital landscapes, fostering both innovation and strategic foresight. He brings particular value to Audit & Risk Management committees, where he rigorously evaluates and audits technology and cybersecurity organizations and programs, ensuring their veracity, efficiency, resilience, and strategic effectiveness.
A sought-after advisor across expert, incubator, and accelerator networks, VJ empowers VC and PE firms with incisive market analysis, competitive intelligence, and opportunity mapping.
VJ currently applies his diverse skills as the Founding Partner of CYFORIX, a strategic defense and technology risk advisory group, and as CEO of TORQE, a specialized firm focused on solution engineering and transformation.
Sanjit GanguliVP, CTO-in-Residence, ZscalerSanjit Ganguli is VP, CTO-in-Residence at Zscaler, specializing in zero trust strategy, network transformation and digital experience monitoring engagements. For more than 20 years, he has worked in a variety of roles, including as a Gartner analyst and Deputy CTO at Riverbed. Sanjit was among the original analysts that coined and defined the Digital Experience Monitoring (DEM) and Artificial Intelligence for IT Operations (AIOps) markets. Sanjit also worked on the original SASE research. While at Zscaler, Sanjit has written three books on the topics of zero trust and SASE/SSE.
Sanjit’s current focus is on helping customers along their zero trust transformation journeys, which includes advising on best practices, aligning to industry and analyst frameworks, and adopting zero trust while maintaining user experience.
Join your cybersecurity peers for practical insights from industry thought leaders. Sign up today!

