Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, September 25, 202510:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 amOPENING KEYNOTERegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmLocking the Future: Why Data Security Is the Key to Trustworthy AIData Strategy and Data Information Architect, Bank of AmericaRegistration Level:Open Sessions
12:00 pm - 12:45 pmAs AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.
12:00 pmZero Trust in Action: A Practical Roadmap for Security TransformationFounder & Fractional Chief Digital and Transformation Officer, Wired for ChangeRegistration Level:Open Sessions
12:00 pm - 12:45 pmZero Trust is more than a buzzword—it’s a mindset shift that reshapes how organizations protect assets. In this session, digital transformation and cybersecurity expert Amy Yee presents a clear, actionable roadmap for adopting Zero Trust. You’ll explore foundational principles and organizational drivers, learn how to assess maturity and identify quick wins, and understand common pitfalls—like fragmented identity policies—before they derail your progress.
Amy dives into key ingredients: identity security, supply chain resilience, essential cross-team conversations, and navigating blockers/enablers. Packed with real-world examples and practical exercises, this talk will leave CISOs, IT leaders, and security teams equipped to design, implement, and sustain a Zero Trust strategy that scales with business needs.
12:00 pm[Panel] Achieving Continuous Compliance: How to Make IT Work for Your OrganizationRegistration Level:Open Sessions
12:00 pm - 12:45 pmIn today’s rapidly evolving regulatory landscape, maintaining continuous compliance is no longer a choice, but a necessity. This panel discussion brings together leading experts to explore how organizations can leverage IT to streamline compliance efforts, reduce risk, and achieve sustainable growth.
Discussion Points:
- The Evolving Compliance Landscape: Navigating the complexities of GDPR, CCPA, HIPAA, and other industry-specific regulations.
- Automation and Orchestration: Utilizing IT tools and technologies to automate compliance tasks, monitor systems, and ensure adherence to policies.
- Building a Culture of Compliance: Integrating compliance into organizational DNA through training, communication, and accountability.
- The Role of IT in Risk Management: Leveraging IT infrastructure and security protocols to identify, assess, and mitigate compliance risks.
- Best Practices for Continuous Compliance: Practical strategies and real-world examples of successful IT-driven compliance programs.
Join us for an engaging discussion on how to transform IT from a compliance burden to a strategic enabler.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmAI and Security Awareness: Building a Future-Ready CultureRegistration Level:Open Sessions
1:00 pm - 1:45 pmIn the era of rapid technological change, the intersection of artificial intelligence (AI) and cybersecurity presents both tremendous opportunities and complex challenges. This presentation will explore how AI is transforming security awareness programs and shaping security culture within organizations. Attendees will learn how to leverage AI to build a more resilient and proactive security culture that empowers individuals to become active participants in the fight against cyber threats. We’ll discuss the importance of human behavior in security, practical tools for implementing AI-driven training, and how to create a dynamic culture where employees continuously adapt to emerging threats.
1:00 pmPrevent Emerging Threats in Financial Services with Proactive Data SecurityRegistration Level:Open Sessions
1:00 pm - 1:45 pm2024 plagued financial services firms with some major breaches. Insider threats, third party risks, and typical threat actors all had hands in high-profile stories like the incidents at LoanDepot, SRP Federal Credit Union, and Navy Federal Credit Union.
In this session, you’ll get a quick overview of this emerging threat landscape and how data security solutions such as data loss prevention, data security posture management, and data detection and response can address the primary risks to your data (insider, third party, threat actors). You’ll come away from this session with the knowledge of how to use these solutions to achieve proactive data security that fits in a zero trust architecture and enables compliance for regulations like PCI DSS 4.0, ISO-27001, GDR, and more.
1:00 pmSecuring Financial Services through Attack Surface ManagementRegistration Level:Open Sessions
1:00 pm - 1:45 pmJoin Censys as we discuss securing your FinTech and explore what’s really happening on the internet. See how it’s impacting security professionals, particularly Financial Services organizations, and see tangible examples of exposures that are impacting the data that we protect, and what you can do about it.
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmAssumption of Risk or the Risks of Assumption? Examining the Impact of Thoughtful CommunicationVP, Cyber Services, AmTrust Financial ServicesRegistration Level:Open Sessions
2:00 pm - 2:45 pmSecurity is a growth strategy, but are we delivering that message effectively? Risk assumption is the mainstay of the security professional, but let’s look at assumption through a different lens. What beliefs do you presume about other initiatives, teams, leaders in your organization? How might these be stymying your effectiveness or decelerating growth and innovation?This presentation explores what words and actions purport and examines how accurate (or inaccurate) our hasty conclusions about others can be. Participants will learn how abandoning assumptions in favor of objective alignment can multiply security program impact and efficacy, accelerating innovation and business growth.2:00 pmEmail Security Is Not Enough: Preparing for Deepfakes and AI-Powered Cyber ThreatsRegistration Level:Open Sessions
2:00 pm - 2:45 pmLearn more about how AI is supercharging spear phishing campaigns. Automated OSINT collection, deepfake video and audio, and low-cost datasets with employee mobile phone numbers and social media profiles are taking social engineering threats to new heights. In this session, we’ll walk through some numbers on the risk of highly personalized phishing, compare traditional open-source intelligence to AI-powered spears, and highlight some recent attacks indicative of the next-generation of social engineering.
2:00 pmThe Current Threat Landscape in FinServRegistration Level:Open Sessions
2:00 pm - 2:45 pmJoin us as we dive into several of the top concerns in Financial Services. From deep web cards to BECs, ransomware, and more! Bring your questions for the panel.
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmCyber on the Brink: Inside the Relentless Threat Surge Facing Financial InstitutionsSr. Security Engineer, Exeter Finance LLCRegistration Level:Open Sessions
3:00 pm - 3:45 pmAs someone working in the finance sector every day, I see firsthand how rapidly the threat landscape is evolving, from AI-generated deepfakes and impersonation scams to advanced persistent threats and the looming risks posed by quantum computing. This talk will explore the whole cyber frontier that financial institutions are now navigating, with a focus on the real-world challenges CISOs are facing as they enter 2026.3:00 pmThe Dissonance Test: What Can't Be Faked?Cybersecurity Researcher, Boston UniversityRegistration Level:Open Sessions
3:00 pm - 3:45 pmIn 2024 alone, the U.S. Treasury Department linked over $6.8 million in earnings from fake freelance IT work to the North Korean regime, representing a growing national security and cybersecurity concern. These operatives pass identity checks, video interviews, and even technical screenings by mimicking genuine applicants, targeting almost every Fortune 500 company. But beneath the surface, they carry buried truths that create invisible strain.This session introduces a novel behavioral screening tool, called the Dissonance Test, that aims to detect deception before damage is done. By triggering cognitive dissonance between a liar’s persona and their suppressed identity, this test provokes micro-reactions, like flinching, freezing, tone shifts, even defensiveness and bailing, that truth-tellers glide through. We’ll explore how this can be applied in hiring and vetting processes to expose nation-state operatives like North Korean operatives, scammers, and social engineers, long before they can do damage.3:00 pmProtecting the Bottom Line: Data Security Essentials for Financial ServicesRegistration Level:Open Sessions
3:00 pm - 3:45 pmIn the financial services sector, protecting sensitive data is critical to maintaining customer trust and regulatory compliance. Yet, financial and insurance industry experiences more data breaches than most other industries. According to 2024 Verizon DBIR report, financial services organizations were plagued by system intrusion attacks resulting from stolen credentials and human errors such as mis-delivery and misconfigurations.
Join us to hear our experts discuss the unique challenges of protecting information in the financial services industry and how Proofpoint Data Security helps organizations to:
- Prevent sensitive data exfiltration such as customer information
- Strengthen data posture to safeguard valuable data such as financial records
- Comply with strict regulations, such as PCI DSS
- Build insider threat programs
Bring your questions!
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmReading the Tea Leaves: What to Expect from Your 2025 Cyber Insurance RenewalRegistration Level:Open Sessions
4:00 pm - 4:45 pmThe claims environment remains fraught with cyber threats, particularly ransomware. At the same time, privacy concerns continue to escalate, with a heightened focus on data protection, biometric security, and non-breach privacy claims. Regulatory scrutiny from the FTC and State Privacy Regulators further emphasizes the need for robust cybersecurity measures.
To effectively mitigate risks, organizations must prioritize controls such as EDR, DLP, privileged account management, and technology product risk management. A proactive approach to third-party risk management and supply chain resilience is also essential. Culture and awareness training play a pivotal role in fostering a security-conscious workforce.
Maximizing cyber insurance efforts requires collaboration across departments. CISOs should engage with risk managers and legal teams to ensure alignment in coverage discussions and budget allocation. Cyber underwriting exercises can provide valuable insights for business impact assessments and audit committee reviews, fostering a shared understanding of risk and mitigation strategies.
4:00 pmCyber Intel Briefing: FinServRegistration Level:Open Sessions
4:00 pm - 4:45 pmSession description to come.
4:00 pmPreventing, Detecting, Responding, and Recovering from a Ransomware AttackRegistration Level:Open Sessions
4:00 pm - 4:45 pmRansomware attacks continue to pose a significant and evolving threat to organizations of all sizes. The potential for operational disruption, data loss, financial damage, and reputational harm is immense. This session will provide a comprehensive overview of a multi-layered strategy to effectively combat ransomware.
Join us to explore the critical phases of ransomware defense:
- Prevention: Discover proactive measures to fortify your defenses, including robust security hygiene, employee awareness training, network segmentation, and vulnerability management. Learn how to minimize your attack surface and make your organization a less attractive target.
- Detection: Understand the key indicators of an active ransomware attack. We will discuss the tools and techniques for early detection, such as monitoring for unusual file activity, network traffic anomalies, and endpoint-level behavioral analysis, enabling a swift response.
- Response: Learn how to develop and implement an effective incident response plan specifically tailored for ransomware. This includes crucial steps like containment, eradication, communication strategies, and decision-making regarding ransom demands.
- Recovery: Explore best practices for restoring encrypted data and systems efficiently and safely. We will cover the importance of reliable backups, an orderly restoration process, and post-incident analysis to strengthen future resilience.
This session will equip attendees with actionable insights and best practices to build a resilient cybersecurity posture capable of withstanding, identifying, and quickly recovering from ransomware incidents, ultimately safeguarding your critical assets and ensuring business continuity.

- Google CloudBooth: N/A
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- Jennifer FiteData Strategy and Data Information Architect, Bank of America
Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.
- Amy YeeFounder & Fractional Chief Digital and Transformation Officer, Wired for Change
Amy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.
- Courtney HansVP, Cyber Services, AmTrust Financial Services
Currently the Vice President of Cyber Services for AmTrustCyber, Courtney Hans brings a variety of experience into her work. In her early career, Courtney was an adventure travel guide with a short window to make a strong impression. Curiosity became her superpower as she learned how to uncover the inner motivations of diverse groups of guests. Guiding, just like cybersecurity, requires agility and a cool head during a crisis. Formerly the Head of Security and IT for a growing SaaS startup, Courtney joined AmTrust to help to reduce risk and deepen the relationship between carrier and insured.
- Ankit GuptaSr. Security Engineer, Exeter Finance LLC
Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.
- Ian SunCybersecurity Researcher, Boston University
Ian Sun is a computer science student at Boston University with a focus on cybersecurity, threat modeling, and human-layer defense. He holds ISC2 CC, CompTIA Network+, and Security+ certifications, and is pursuing the PNPT. Ian’s research includes cognitive vetting techniques to expose imposters in remote environments, and cultural blind spots like victim blaming in cybersecurity. He has experience in systems administration, phishing analysis, and adversarial narrative testing through internship work and self-directed research. Ian brings a student-practitioner lens to doctrine-first security, emphasizing low-cost, high-impact methods that raise workforce maturity without requiring expensive tooling.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
