Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, June 14, 20238:30 amExhibitor Hall openRegistration Level:
Open Sessions
8:30 am - 3:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:00 amOPENING KEYNOTERegistration Level:Open Sessions
9:00 am - 9:45 am9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:00 amLocation / Room: Exhibitor FloorVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:00 amSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Open Sessions
10:00 am - 10:45 amKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
10:00 amBEC Attacks: The Stealthiest and Most Lucrative ThreatRegistration Level:Open Sessions
10:00 am - 10:45 am10:45 amNetworking BreakRegistration Level:Open Sessions
10:45 am - 11:00 amVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
11:00 amDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Open Sessions
11:00 am - 11:45 am11:00 amSecuring the Supply ChainRegistration Level:Open Sessions
11:00 am - 11:45 amA discussion of managing third-party risk and how to manage expectations and contracts with vendors.
11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
12:00 pmNavigating the Insider ThreatscapeSr. Director, Cyber Security, Acumatica, Inc.Registration Level:Open Sessions
12:00 pm - 12:45 pmThreat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.
12:00 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
12:00 pm - 12:45 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:00 pmBusiness Continuity: Succession Planning 101CISO, Veterans United Home LoansRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pmCybersecurity as a Business DriverRegistration Level:Open Sessions
1:00 pm - 1:45 pmSavvy would-be customers be research companies and typically prefer to do business with those who have good cyber hygiene. How can a strong security posture be a business driver for your organization?
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:00 pmCyber World on Fire: A Look at Internet Security in Today’s Age of ConflictCNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
2:00 pm - 2:45 pmThis informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.
Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.
He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.
2:00 pmAn Honest Peer-Driven Conversation About Cyber InsuranceRegistration Level:Open Sessions
2:00 pm - 2:45 pmCyber insurance is no longer a “do I need it?” but a must-have for organizations. This conversation among cybersecurity peers will discusse how to properly assess insurance programs, including a candid look into how the organization should drive what is and is not covered, not the insurance provider.
- OktaBooth: TBD
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
- Randy RawCISO, Veterans United Home Loans
Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.
- Col. Cedric LeightonCNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC
Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.
Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!
