googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, September 25, 2025
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    OPENING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Locking the Future: Why Data Security Is the Key to Trustworthy AI
    • session level icon
    speaker photo
    Data Strategy and Data Information Architect, Bank of America
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    As AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.

    12:00 pm
    Zero Trust in Action: A Practical Roadmap for Security Transformation
    • session level icon
    speaker photo
    Founder & Fractional Chief Digital and Transformation Officer, Wired for Change
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Zero Trust is more than a buzzword—it’s a mindset shift that reshapes how organizations protect assets. In this session, digital transformation and cybersecurity expert Amy Yee presents a clear, actionable roadmap for adopting Zero Trust. You’ll explore foundational principles and organizational drivers, learn how to assess maturity and identify quick wins, and understand common pitfalls—like fragmented identity policies—before they derail your progress.

    Amy dives into key ingredients: identity security, supply chain resilience, essential cross-team conversations, and navigating blockers/enablers. Packed with real-world examples and practical exercises, this talk will leave CISOs, IT leaders, and security teams equipped to design, implement, and sustain a Zero Trust strategy that scales with business needs.

    12:00 pm
    [Panel] Achieving Continuous Compliance: How to Make IT Work for Your Organization
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In today’s rapidly evolving regulatory landscape, maintaining continuous compliance is no longer a choice, but a necessity. This panel discussion brings together leading experts to explore how organizations can leverage IT to streamline compliance efforts, reduce risk, and achieve sustainable growth.

    Discussion Points:

    • The Evolving Compliance Landscape: Navigating the complexities of GDPR, CCPA, HIPAA, and other industry-specific regulations.
    • Automation and Orchestration: Utilizing IT tools and technologies to automate compliance tasks, monitor systems, and ensure adherence to policies.
    • Building a Culture of Compliance: Integrating compliance into organizational DNA through training, communication, and accountability.
    • The Role of IT in Risk Management: Leveraging IT infrastructure and security protocols to identify, assess, and mitigate compliance risks.
    • Best Practices for Continuous Compliance: Practical strategies and real-world examples of successful IT-driven compliance programs.

    Join us for an engaging discussion on how to transform IT from a compliance burden to a strategic enabler.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    AI and Security Awareness: Building a Future-Ready Culture
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    In the era of rapid technological change, the intersection of artificial intelligence (AI) and cybersecurity presents both tremendous opportunities and complex challenges. This presentation will explore how AI is transforming security awareness programs and shaping security culture within organizations. Attendees will learn how to leverage AI to build a more resilient and proactive security culture that empowers individuals to become active participants in the fight against cyber threats. We’ll discuss the importance of human behavior in security, practical tools for implementing AI-driven training, and how to create a dynamic culture where employees continuously adapt to emerging threats.

     

    1:00 pm
    Prevent Emerging Threats in Financial Services with Proactive Data Security
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    2024 plagued financial services firms with some major breaches. Insider threats, third party risks, and typical threat actors all had hands in high-profile stories like the incidents at LoanDepot, SRP Federal Credit Union, and Navy Federal Credit Union.

    In this session, you’ll get a quick overview of this emerging threat landscape and how data security solutions such as data loss prevention, data security posture management, and data detection and response can address the primary risks to your data (insider, third party, threat actors). You’ll come away from this session with the knowledge of how to use these solutions to achieve proactive data security that fits in a zero trust architecture and enables compliance for regulations like PCI DSS 4.0, ISO-27001, GDR, and more.

    1:00 pm
    Securing Financial Services through Attack Surface Management
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Join Censys as we discuss securing your FinTech and explore what’s really happening on the internet. See how it’s impacting security professionals, particularly Financial Services organizations, and see tangible examples of exposures that are impacting the data that we protect, and what you can do about it.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Assumption of Risk or the Risks of Assumption? Examining the Impact of Thoughtful Communication
    • session level icon
    speaker photo
    VP, Cyber Services, AmTrust Financial Services
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Security is a growth strategy, but are we delivering that message effectively? Risk assumption is the mainstay of the security professional, but let’s look at assumption through a different lens. What beliefs do you presume about other initiatives, teams, leaders in your organization? How might these be stymying your effectiveness or decelerating growth and innovation?
    This presentation explores what words and actions purport and examines how accurate (or inaccurate) our hasty conclusions about others can be. Participants will learn how abandoning assumptions in favor of objective alignment can multiply security program impact and efficacy, accelerating innovation and business growth.
    2:00 pm
    Email Security Is Not Enough: Preparing for Deepfakes and AI-Powered Cyber Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Learn more about how AI is supercharging spear phishing campaigns. Automated OSINT collection, deepfake video and audio, and low-cost datasets with employee mobile phone numbers and social media profiles are taking social engineering threats to new heights. In this session, we’ll walk through some numbers on the risk of highly personalized phishing, compare traditional open-source intelligence to AI-powered spears, and highlight some recent attacks indicative of the next-generation of social engineering.

    2:00 pm
    The Current Threat Landscape in FinServ
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Join us as we dive into several of the top concerns in Financial Services. From deep web cards to BECs, ransomware, and more! Bring your questions for the panel.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Cyber on the Brink: Inside the Relentless Threat Surge Facing Financial Institutions
    • session level icon
    speaker photo
    Sr. Security Engineer, Exeter Finance LLC
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    As someone working in the finance sector every day, I see firsthand how rapidly the threat landscape is evolving, from AI-generated deepfakes and impersonation scams to advanced persistent threats and the looming risks posed by quantum computing. This talk will explore the whole cyber frontier that financial institutions are now navigating, with a focus on the real-world challenges CISOs are facing as they enter 2026.
    3:00 pm
    The Dissonance Test: What Can't Be Faked?
    • session level icon
    speaker photo
    Cybersecurity Researcher, Boston University
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    In 2024 alone, the U.S. Treasury Department linked over $6.8 million in earnings from fake freelance IT work to the North Korean regime, representing a growing national security and cybersecurity concern. These operatives pass identity checks, video interviews, and even technical screenings by mimicking genuine applicants, targeting almost every Fortune 500 company. But beneath the surface, they carry buried truths that create invisible strain.
    This session introduces a novel behavioral screening tool, called the Dissonance Test, that aims to detect deception before damage is done. By triggering cognitive dissonance between a liar’s persona and their suppressed identity, this test provokes micro-reactions, like flinching, freezing, tone shifts, even defensiveness and bailing, that truth-tellers glide through. We’ll explore how this can be applied in hiring and vetting processes to expose nation-state operatives like North Korean operatives, scammers, and social engineers, long before they can do damage.
    3:00 pm
    Protecting the Bottom Line: Data Security Essentials for Financial Services
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    In the financial services sector, protecting sensitive data is critical to maintaining customer trust and regulatory compliance. Yet, financial and insurance industry experiences more data breaches than most other industries. According to 2024 Verizon DBIR report, financial services organizations were plagued by system intrusion attacks resulting from stolen credentials and human errors such as mis-delivery and misconfigurations.

    Join us to hear our experts discuss the unique challenges of protecting information in the financial services industry and how Proofpoint Data Security helps organizations to:

    • Prevent sensitive data exfiltration such as customer information
    • Strengthen data posture to safeguard valuable data such as financial records
    • Comply with strict regulations, such as PCI DSS
    • Build insider threat programs

    Bring your questions!

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    Reading the Tea Leaves: What to Expect from Your 2025 Cyber Insurance Renewal
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    The claims environment remains fraught with cyber threats, particularly ransomware. At the same time, privacy concerns continue to escalate, with a heightened focus on data protection, biometric security, and non-breach privacy claims. Regulatory scrutiny from the FTC and State Privacy Regulators further emphasizes the need for robust cybersecurity measures.

    To effectively mitigate risks, organizations must prioritize controls such as EDR, DLP, privileged account management, and technology product risk management. A proactive approach to third-party risk management and supply chain resilience is also essential. Culture and awareness training play a pivotal role in fostering a security-conscious workforce.

    Maximizing cyber insurance efforts requires collaboration across departments. CISOs should engage with risk managers and legal teams to ensure alignment in coverage discussions and budget allocation. Cyber underwriting exercises can provide valuable insights for business impact assessments and audit committee reviews, fostering a shared understanding of risk and mitigation strategies.

    4:00 pm
    Cyber Intel Briefing: FinServ
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Session description to come.

    4:00 pm
    Preventing, Detecting, Responding, and Recovering from a Ransomware Attack
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Ransomware attacks continue to pose a significant and evolving threat to organizations of all sizes. The potential for operational disruption, data loss, financial damage, and reputational harm is immense. This session will provide a comprehensive overview of a multi-layered strategy to effectively combat ransomware.

    Join us to explore the critical phases of ransomware defense:

    • Prevention: Discover proactive measures to fortify your defenses, including robust security hygiene, employee awareness training, network segmentation, and vulnerability management. Learn how to minimize your attack surface and make your organization a less attractive target.
    • Detection: Understand the key indicators of an active ransomware attack. We will discuss the tools and techniques for early detection, such as monitoring for unusual file activity, network traffic anomalies, and endpoint-level behavioral analysis, enabling a swift response.
    • Response: Learn how to develop and implement an effective incident response plan specifically tailored for ransomware. This includes crucial steps like containment, eradication, communication strategies, and decision-making regarding ransom demands.
    • Recovery: Explore best practices for restoring encrypted data and systems efficiently and safely. We will cover the importance of reliable backups, an orderly restoration process, and post-incident analysis to strengthen future resilience.
    This session will equip attendees with actionable insights and best practices to build a resilient cybersecurity posture capable of withstanding, identifying, and quickly recovering from ransomware incidents, ultimately safeguarding your critical assets and ensuring business continuity.
Exhibitors
  • Google Cloud
    Booth: N/A

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Jennifer Fite
    Data Strategy and Data Information Architect, Bank of America

    Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.

  • speaker photo
    Amy Yee
    Founder & Fractional Chief Digital and Transformation Officer, Wired for Change

    Amy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.

  • speaker photo
    Courtney Hans
    VP, Cyber Services, AmTrust Financial Services

    Currently the Vice President of Cyber Services for AmTrustCyber, Courtney Hans brings a variety of experience into her work. In her early career, Courtney was an adventure travel guide with a short window to make a strong impression. Curiosity became her superpower as she learned how to uncover the inner motivations of diverse groups of guests. Guiding, just like cybersecurity, requires agility and a cool head during a crisis. Formerly the Head of Security and IT for a growing SaaS startup, Courtney joined AmTrust to help to reduce risk and deepen the relationship between carrier and insured.

  • speaker photo
    Ankit Gupta
    Sr. Security Engineer, Exeter Finance LLC

    Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.

  • speaker photo
    Ian Sun
    Cybersecurity Researcher, Boston University

    Ian Sun is a computer science student at Boston University with a focus on cybersecurity, threat modeling, and human-layer defense. He holds ISC2 CC, CompTIA Network+, and Security+ certifications, and is pursuing the PNPT. Ian’s research includes cognitive vetting techniques to expose imposters in remote environments, and cultural blind spots like victim blaming in cybersecurity. He has experience in systems administration, phishing analysis, and adversarial narrative testing through internship work and self-directed research. Ian brings a student-practitioner lens to doctrine-first security, emphasizing low-cost, high-impact methods that raise workforce maturity without requiring expensive tooling.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.