Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, September 25, 2025
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.

    11:00 am
    [Opening Keynote] Post-Quantum Cryptography on Google Cloud
    • session level icon
    speaker photo
    Cloud Security Architect, Google Cloud
    speaker photo
    Google Cloud Security Architect Team, US East & Canada
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    At Google, we take post-quantum computing risks seriously, and we are taking proactive steps to secure customer’s data against the potential threats of future quantum computers. In this session, we will be discussing our PQC journey on Google Cloud.

    The goals of this session are to:

    • Understand the proactive steps Google is taking to secure customer data against post-quantum computing threats

    • Gain insight into Google’s journey and implementation of Post-Quantum Cryptography (PQC) on Google Cloud

    • Learn best practices for organizations to prepare their infrastructure and PKI for the transition to PQC

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Cyber Behavioral Profiling: Assessing Cyber Adversary Deception Tactics in FinServ Attacks
    • session level icon
    speaker photo
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Financial services remain prime targets for sophisticated cyber adversaries who leverage deception tactics to evade detection, manipulate trust, and exploit cognitive vulnerabilities. This session explores the intersection of cyber threat intelligence and behavioral profiling to dissect adversaries’ modus operandi in FinServ attacks. Attendees will gain insights into how psychological manipulation and adversarial adaptation shape modern cyber threats—equipping security teams with proactive strategies to detect, disrupt, and mitigate deceptive cyber campaigns.

    12:00 pm
    Zero Trust in Action: A Practical Roadmap for Security Transformation
    • session level icon
    speaker photo
    CDO & CDTO | Board Member & Advisor | Podcaster
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Zero Trust is more than a buzzword—it’s a mindset shift that reshapes how organizations protect assets. In this session, digital transformation and cybersecurity expert Amy Yee presents a clear, actionable roadmap for adopting Zero Trust. You’ll explore foundational principles and organizational drivers, learn how to assess maturity and identify quick wins, and understand common pitfalls—like fragmented identity policies—before they derail your progress.

    Amy dives into key ingredients: identity security, supply chain resilience, essential cross-team conversations, and navigating blockers/enablers. Packed with real-world examples and practical exercises, this talk will leave CISOs, IT leaders, and security teams equipped to design, implement, and sustain a Zero Trust strategy that scales with business needs.

    12:00 pm
    Automation with PowerShell and dbatools: Streamlining SQL Server Management
    • session level icon
    speaker photo
    Senior Software Engineer, Cornerstone Building Brands
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Managing SQL Server environments can be time-consuming, error-prone, and difficult to scale—especially when juggling backups, migrations, security audits, and performance checks. In this session, we’ll explore how to supercharge your workflow with PowerShell and the dbatools module to automate and simplify routine DBA tasks.

    Through practical demos, you’ll see how to effortlessly migrate databases between servers, manage permissions, validate backups, and inventory your entire SQL estate with just a few lines of PowerShell. We’ll cover best practices for creating reusable scripts, integrating automation into CI/CD pipelines, and scheduling jobs for proactive maintenance.

    Whether you’re managing a single instance or hundreds of servers, you’ll learn how dbatools can save time, improve consistency, and reduce human error—letting you focus on higher-value tasks like performance tuning and architecture.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Security Awareness Reimagined: Marketing Tactics for Real Impact
    • session level icon
    speaker photo
    Technology Learning & Adoption Practitioner, Nationwide
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Cybersecurity isn’t just a tech problem—it’s a people problem. Too many awareness programs are forgettable checkboxes.

    This session shows you how to change that by applying proven marketing strategies to drive real behavior change. You’ll learn to:

    • Craft targeted, emotionally resonant messages that stick
    • Build a security brand employees trust and remember
    • Use data and segmentation to deliver the right message to the right person
    Whether you lead Security Awareness & Training or partner with HR and communications teams, you’ll walk away ready to drive engagement, reduce risky behaviors, and embed security into your organization’s culture.
    1:00 pm
    Locking the Future: Why Data Security Is the Key to Trustworthy AI
    • session level icon
    speaker photo
    Data Strategy and Data Information Architect, Bank of America
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    As AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.

    1:00 pm
    The Dissonance Test: What Can't Be Faked?
    • session level icon
    speaker photo
    IT Support Specialist, Boston University
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    In 2024 alone, the U.S. Treasury Department linked over $6.8 million in earnings from fake freelance IT work to the North Korean regime, representing a growing national security and cybersecurity concern. These operatives pass identity checks, video interviews, and even technical screenings by mimicking genuine applicants, targeting almost every Fortune 500 company. But beneath the surface, they carry buried truths that create invisible strain.
    This session introduces a novel behavioral screening tool, called the Dissonance Test, that aims to detect deception before damage is done. By triggering cognitive dissonance between a liar’s persona and their suppressed identity, this test provokes micro-reactions, like flinching, freezing, tone shifts, even defensiveness and bailing, that truth-tellers glide through. We’ll explore how this can be applied in hiring and vetting processes to expose nation-state operatives like North Korean operatives, scammers, and social engineers, long before they can do damage.
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Assumption of Risk or the Risks of Assumption? Examining the Impact of Thoughtful Communication
    • session level icon
    speaker photo
    VP, Cyber Services, AmTrust Financial Services
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Security is a growth strategy, but are we delivering that message effectively? Risk assumption is the mainstay of the security professional, but let’s look at assumption through a different lens. What beliefs do you presume about other initiatives, teams, leaders in your organization? How might these be stymying your effectiveness or decelerating growth and innovation?
    This presentation explores what words and actions purport and examines how accurate (or inaccurate) our hasty conclusions about others can be. Participants will learn how abandoning assumptions in favor of objective alignment can multiply security program impact and efficacy, accelerating innovation and business growth.
    2:00 pm
    Enhancing Security, Easing Compliance: PCI DSS for Multi-Payment Channel Organizations
    • session level icon
    speaker photo
    Managing Director, Schellman
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    Navigating PCI DSS compliance can be daunting for multi-payment channel merchants and service providers handling diverse transaction environments. This presentation explores practical strategies to reduce compliance burden while bolstering security. Attendees will learn how simple process changes, such as tokenization and point-to-point encryption, can minimize sensitive data exposure. We’ll also examine the benefits of outsourcing specific PCI DSS responsibilities to trusted third-party providers, enabling organizations to focus on core operations without compromising security. Drawing on real-world examples, the session will highlight how these approaches streamline compliance efforts, reduce costs, and enhance protection across online, in-store, and mobile payment channels. Ideal for merchants and service providers, this talk offers actionable insights to achieve PCI DSS compliance efficiently.
    2:00 pm
    The Current Threat Landscape in FinServ
    • session level icon
    speaker photo
    CISO, Americas, Zscaler
    speaker photo
    Chief Analyst, Google Threat Intelligence Group
    speaker photo
    CISO, The Anschutz Corporation
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Join us as we dive into several of the top concerns in Financial Services. From deep web cards to BECs, ransomware, and more! Bring your questions for the panel.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Cyber on the Brink: Inside the Relentless Threat Surge Facing Financial Institutions
    • session level icon
    speaker photo
    Sr. Security Engineer, Exeter Finance LLC
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    As someone working in the finance sector every day, I see firsthand how rapidly the threat landscape is evolving, from AI-generated deepfakes and impersonation scams to advanced persistent threats and the looming risks posed by quantum computing. This talk will explore the whole cyber frontier that financial institutions are now navigating, with a focus on the real-world challenges CISOs are facing as they enter 2026.
    3:00 pm
    You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    3:00 pm
    Cyber Intel Briefing: FinServ
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    In an increasingly volatile world, this session provides a crucial debrief on the most pressing global security issues and their direct impact on cybersecurity and business resilience. The talk will cover geopolitical flashpoints, including recent developments in China, Russia, Ukraine, and the European Union, examining how these international power shifts influence the digital landscape. It will also explore the dramatic changes in data privacy regulations in the age of AI, highlighting the new responsibilities for corporations.
    Finally, the presentation will provide actionable insights for building resilience against a backdrop of sophisticated cyber threats, from financially motivated groups targeting the financial sector to state-sponsored attacks. Attendees will leave with a clear understanding of the evolving threat landscape and a strategic framework to protect their organizations in 2025 and beyond.
    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    [Closing Keynote] Zero Trust: Cutting Cyber Risks, Lowering Claims, and Unlocking Better Cyber Insurance!
    • session level icon
    speaker photo
    Global VP of M&A/Divestiture, Private Equity, and Cyber Risk, Zscaler
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Breaches, ransomware, and AI-driven attacks are exposing the flaws of outdated perimeter defenses. Discover how Zero Trust Architecture can transform your cybersecurity strategy while unlocking better insurance outcomes! Marsh & McLennan’s recent report reveals that nearly $500 billion in annual cyber losses could be prevented with Zero Trust and robust cyber hygiene.

    This session will empower you to:

    • Minimize the impact of CVE’s and prevent breaches, while leveraging Zero Trust
    • Reduce cyber insurance claims and losses with proactive defense
    • Deductive analysis to secure more favorable cyber insurance policies

    Attendees will learn how adopting zero trust network access enhances security posture and results in more favorable cyber insurance policies including:

    • Preventing one third of cyber incidents
    • Cutting breach costs by over 20%
    • Reducing insured loss by up to 31%
Exhibitors
  • Google Cloud Security
    Booth: N/A

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Zscaler
    Booth: N/A

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Daniel Gremaud
    Cloud Security Architect, Google Cloud

    As a Google Cloud Security Architect, Daniel is a trusted advisor to HCLS customers and partners. Before Google, Daniel was a consultant at PricewaterhouseCoopers in their Cyber, Privacy and Forensics Practice. He is on the Board of Advisors to the University of Alabama Management Information Systems Department, serving the faculty and students brings him great joy. His goal is to not only secure his customer’s Google Cloud workloads, but also work to secure the entire sector.

  • speaker photo
    Lanre Ogunmola
    Google Cloud Security Architect Team, US East & Canada

    Lanre is a member of Google Cloud Security Architect team for the US East & Canada. Lanre advises Google’s clients on cyber security and helps them to be in compliance with laws and regulations when using Google Cloud.

  • speaker photo
    Cameron H. Malin
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi

    Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.

    During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.

    He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
    Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).

  • speaker photo
    Amy Yee
    CDO & CDTO | Board Member & Advisor | Podcaster

    Amy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.

  • speaker photo
    Bhaskar Bharat Sawant
    Senior Software Engineer, Cornerstone Building Brands

    Bhaskar Bharat Sawant is a Senior Software Engineer and Team Lead at Cornerstone Building Brands with over 15 years of experience in enterprise architecture, cloud development, and regulatory compliance. Bhaskar has led initiatives in AI-driven testing, data privacy engineering, and pricing automation across complex .NET and Azure ecosystems. He is an IEEE Senior Member and a frequent reviewer and speaker at national and international tech conferences.

  • speaker photo
    Mike Taylor
    Technology Learning & Adoption Practitioner, Nationwide

    Mike Taylor is a learning designer, speaker, and consultant who helps organizations make cybersecurity awareness stick. With 20+ years of experience spanning instructional design, marketing, and technology, Mike specializes in transforming forgettable training into engaging, behavior-changing programs. He has led learning innovation at Fortune 500 companies and regularly shares practical strategies at conferences worldwide. As the author of Think Like a Marketer, Learn Like an L&D Pro, Mike empowers teams to communicate security messages that resonate and drive action.

  • speaker photo
    Jennifer Fite
    Data Strategy and Data Information Architect, Bank of America

    Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.

  • speaker photo
    Ian Sun
    IT Support Specialist, Boston University

    Ian Sun is a cybersecurity researcher and conference speaker focused on social engineering defense and human layer security. He previously presented original research at SecureWorld Financial Services in 2025, where he introduced the Dissonance Test, a behavioral method for surfacing deception in hiring and access control, including nation-state infiltration into IT roles. His work bridges threat intelligence with practical defenses for help desks, hiring, onboarding, and workforce identity. Ian brings hands-on experience from MSP and university IT roles and holds CompTIA Network+, Security+, and ISC² Certified in Cybersecurity credentials. He is currently pursuing the PNPT.

  • speaker photo
    Courtney Hans
    VP, Cyber Services, AmTrust Financial Services

    Currently the Vice President of Cyber Services for AmTrustCyber, Courtney Hans brings a variety of experience into her work. In her early career, Courtney was an adventure travel guide with a short window to make a strong impression. Curiosity became her superpower as she learned how to uncover the inner motivations of diverse groups of guests. Guiding, just like cybersecurity, requires agility and a cool head during a crisis. Formerly the Head of Security and IT for a growing SaaS startup, Courtney joined AmTrust to help to reduce risk and deepen the relationship between carrier and insured.

  • speaker photo
    Adam Bush
    Managing Director, Schellman
  • speaker photo
    Benjamin Corll
    CISO, Americas, Zscaler

    Ben is a 25-year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, to security architect, and CISO roles.

    Prior to joining Zscaler, Ben was the VP/Head of Cybersecurity (CISO) for Coats, a global manufacturer of industrial thread. This was a newly created role that allowed Ben to build a program: from policies, creating and refining processes, to choosing technology controls. Ben is passionate about engaging with both security practitioners and business leaders on the value of digital transformation and preparing businesses to defend against threats. Much of his time is spent focusing teams on the fundamental practices or basics and doing them well before pivoting to more advanced solutions.

  • speaker photo
    John Hultquist
    Chief Analyst, Google Threat Intelligence Group

    John Hultquist is Chief Analyst of Mandiant Intelligence at Google Cloud. Prior to the acquisition of iSIGHT Partners by FireEye/Mandiant, John led iSIGHT’s cyber espionage practice, where his team uncovered the Russian threat actor best known as Sandworm. He has more than 15 years of experience covering emerging threats in cyber espionage and information operations, working in the private sector and the U.S. government. He is the founder of CYBERWARCON and SLEUTHCON.

  • speaker photo
    Sam Masiello
    CISO, The Anschutz Corporation

    Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to The Anschutz Corporation, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the protection of employee, consumer, and customer data for all of the organization's clients, which included many Fortune 500 companies.

    Sam has also been the Chief Security Officer, Head of Application Security, and Head of Security Research at companies such as Groupon, Return Path, and McAfee. He currently serves as Director-at-Large of The Coalition Against Unsolicited Commercial Email (CAUCE), National Advisory Board Member for SecureWorld, and is an Executive Board Member of Colorado Cyber. He has previously served as a member of the Board of Directors for the Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG), the Steering Committee of the Online Trust Alliance (OTA), and a member of the Anti-Phishing Working Group (APWG).

  • speaker photo
    Ankit Gupta
    Sr. Security Engineer, Exeter Finance LLC

    Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.

    Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.

  • speaker photo
    Stephen Singh
    Global VP of M&A/Divestiture, Private Equity, and Cyber Risk, Zscaler

    Stephen Singh serves as the Global Vice President of M&A/Divestiture, Private Equity, and Cyber Risk at Zscaler, bringing more than 25 years of expertise in management consulting, professional services, enterprise IT, and cybersecurity.

    Stephen established Zscaler’s Transaction Advisory Services practice, which assists Enterprises and Private Equity, by improving value creation, capture and preservation during mergers, acquisitions and divestitures.

    He’s also been a prominent contributor to the cyber insurance ecosystem, collaborating with brokers, carriers, reinsurers, and clients to integrate emerging best practices—such as Zero Trust adoption—to mitigate claims and reduce financial losses.

    Previously, Stephen served as Vice President and CTO at DXC Technology, where he guided clients through digital transformations by leveraging emerging technologies and industry-leading methodologies. Prior to that, he established Fidelity Investments' Enterprise Technology and Cyber Advisory Practice, addressing the firm's most complex business challenges.

    Stephen’s career also includes leadership roles in Enterprise IT at globally recognized organizations, including PwC, Travelers Insurance, Juniper Networks, Cosine Communications, and AT&T.

    He holds B.S. degrees in Computer Science and Applied Mathematics from the University of Rochester and has completed executive education at MIT’s Sloan School of Management.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes