googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, February 28, 2024
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Panel] Debunking Myths About Cybersecurity Insurance
    • session level icon
    speaker photo
    Vice President, Cyber Liability, Woodruff Sawyer
    speaker photo
    CISO, The Anschutz Corporation
    speaker photo
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    In an era dominated by digital advancements and technological integration, the significance of cybersecurity has become more apparent than ever. As organizations grapple with the escalating threat landscape, the role of cybersecurity insurance has emerged as a critical component in mitigating potential financial losses. However, misconceptions and myths surrounding this specialized insurance are pervasive and can hinder informed decision-making.

    This session aims to debunk prevalent myths surrounding cybersecurity insurance, offering a comprehensive exploration of the nuanced landscape. We will delve into common misconceptions, such as the belief that cybersecurity insurance is a one-size-fits-all solution, the notion that it encourages lax security practices, and the myth that coverage is unnecessary for small to medium-sized enterprises.

    Through insightful discussions and real-world case studies, our expert speakers will unravel the complexities of cybersecurity insurance, shedding light on policy nuances, coverage limitations, and the evolving nature of cyber threats. Attendees will gain a deeper understanding of the vital role cybersecurity insurance plays in an organization’s risk management strategy and discover practical insights for optimizing their coverage.

    Join us for an engaging session that aims to empower organizations with the knowledge needed to make informed decisions regarding cybersecurity insurance, ultimately fostering a more resilient and secure digital landscape.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Insider Threat Actors & Artificial Intelligence
    • session level icon
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Threat methods and controls utilized for the corporate workforce that now expands beyond the office building and into remote locations is not as comprehensive and effective for those who are typically in the office. The intent of employees may not be malicious but rather inherent to poor practices; however, there are those who happen to begin unintentional but gradually become the intentional insider threat.

    This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and how to identify behavioral elements utilizing a number of security solutions. Through live demonstrations, we will show how “everyday activities” can result in higher risk to the company.

    Objectives:

    • Learn the methodologies utilized by individuals within the organization that would be considered insider threat activity.
    • Learn how to identify system and user-based behavioral indicators.
    • Learn which existing or enhanced security layer can provide insider threat profile data.

    Take-Aways:

    • How to identify business processes which can contribute to intentional or unintentional insider threats.
    • Enhance procedures required to identify insider threat exposures.
    • Enhance awareness training to include additional methods of insider threat.
    • Enhance existing physical and digital security layers to better identify specific insider threat activity.
    12:00 pm
    VRM Doesn't Mean 'Very Real Migraine' — Conquering Your Vendor Risk Headaches
    • session level icon
    speaker photo
    VP, Security, Risk & Compliance, Whistic
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Waiting around for questionnaire responses. Line-by-line readings of endless security documentation. Hitting Ctrl+F. Everyone’s got their TPRM pet peeve. Not only are they annoying, but they could also be getting in the way of better, safer business outcomes.

    But no more. In this session, we’ll run through a checklist of challenges that used to plague risk managers, security analysts, and InfoSec leaders on the front lines of vendor risk—and why new ways of working make these irritants a thing of the past. We’ll discuss:

    • Building alignment with key stakeholders to streamline process
    • Taking advantage of opportunities to automate, so you can focus on the actual risks
    • Getting real ROI from your TPRM program
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Using Cloud Automation to Supercharge Your Security Program
    • session level icon
    speaker photo
    Enterprise Security Architect, Delta Air Lines
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    As organizations move to the cloud, it is becoming more difficult to manage the breadth of security tools and controls, including on-prem, in the cloud, and SaaS solutions. In this presentation, we will provide real-world practical ideas for using (cheap) serverless automation in the cloud to manage your security program.

    1:00 pm
    [Panel] Achieving Continuous Compliance: How to Make IT Work for Your Organization
    • session level icon
    speaker photo
    Senior Counsel, Constangy, Brooks, Smith & Prophete
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    speaker photo
    Product Evangelist, Automox
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session description to come.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Pig Butchering, BEC, and Artificial Intelligence: What the Secret Service Wants You to Know
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Session description to come.

    2:00 pm
    [Panel] Unveiling the Threat Landscape and Unmasking Digital Villains
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    speaker photo
    VP, Global Executive Engagement, Tanium
    speaker photo
    Senior Legal Counsel, Clark Hill PLC
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    In the shadows of our digital world, a clandestine battle is waged against our data, systems, and infrastructure. These hidden threats, much like the villains of comic books, lurk in the shadows, seeking to exploit vulnerabilities and disrupt our digital lives. Join us as we delve into the ever-evolving threat landscape, unmasking the villains of the digital realm and exploring their nefarious tactics.

    Our panel of cybersecurity experts unravel the intricate world of cyber threats, shedding light on the latest trends, emerging attack vectors, and the expanding arsenal of malicious tools employed by cyber adversaries. Learn the motivations behind these threats, from profit-driven cybercriminals to state-sponsored actors wielding cyberweapons.

    Our panel provides a comprehensive overview of the current threat landscape.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Threat Modeling 101: Star Wars Edition
    • session level icon
    speaker photo
    Sr. Security Software Engineer, Microsoft
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    “Help me, Obi-Wan Kenobi. You’re my only hope.” Using threat models is like getting the blueprint for the Death Star. They allow you to plan for potential scenarios or ambush attacks from stormtroopers with impossibly bad aim. Understanding the possible risks ensures your entire team will make it out of the garbage compactor and back to the Millennium Falcon.

    These ARE the droids you’re looking for….

    Fellow Rebels will gain an understanding of how to threat model, the risks and rewards, resources, and a demonstration of how to utilize threat modeling using the Death Star as a source!

    3:00 pm
    Unveiling the Business and Financial Ramifications Through Real-World Ransomware Experiences
    • session level icon
    speaker photo
    Chief Security Scientist & Advisory CISO, Delinea
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Embark on an exploration of the business and financial aftermath of a ransomware attack, guided by a real-world case. This session is designed to empower attendees with invaluable insights into the dynamic and evolving threat landscape, providing an understanding of both the immediate and enduring consequences of ransomware incidents. Moreover, participants will be equipped with best practices for prevention, mitigation, and recovery. Elevating the experience, the session will also encapsulate a summary of recent ransomware research, offering a strategic compass for navigating the ever-evolving ransomware threat landscape in 2024 and beyond.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    Cyber Intel Briefing: FinServ
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Session description to come.

Exhibitors
  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • Delinea
    Booth:

    Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

  • National Cybersecurity Alliance
    Booth:

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Tanium
    Booth:

    Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).

    The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.

    For more information, visit: https://www.tanium.com.

  • Whistic
    Booth:

    Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    David Anderson
    Vice President, Cyber Liability, Woodruff Sawyer

    David focuses on complex cyber, privacy, technology, and professional liability issues and is a dedicated and fierce advocate for his clients.

  • speaker photo
    Sam Masiello
    CISO, The Anschutz Corporation

    Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to The Anschutz Corporation, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the protection of employee, consumer, and customer data for all of the organization's clients, which included many Fortune 500 companies.

    Sam has also been the Chief Security Officer, Head of Application Security, and Head of Security Research at companies such as Groupon, Return Path, and McAfee. He currently serves as Director-at-Large of The Coalition Against Unsolicited Commercial Email (CAUCE), National Advisory Board Member for SecureWorld, and is an Executive Board Member of Colorado Cyber. He has previously served as a member of the Board of Directors for the Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG), the Steering Committee of the Online Trust Alliance (OTA), and a member of the Anti-Phishing Working Group (APWG).

  • speaker photo
    Violet Sullivan
    Adjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster

    Violet Sullivan works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and new business growth. Ms. Sullivan is a licensed attorney in Texas and Pennsylvania and a Certified Information Privacy Professional (CIPP/US), with her JD and MBA degrees from Baylor University. In addition to her full-time role, Violet serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LL.M. Degree in Litigation Management, the first of its kind nationwide. Her diverse practice experience at both the individual and policy levels has prepared her for developing new tools and approaches to solving what is fast-becoming a pervasive and costly challenge in modern industry: how to respond to a cybersecurity incident.

    Early in her career, Violet worked on the incident responses for some of the largest and most notable data breaches to date, including: Home Depot, Sony, and Anthem. Her experience in managing scaled breach responses led to her expertise and proficiency in proactively preparing organizations for cyber incidents. In the past eight years, she has facilitated over 450 cyber incident simulations (tabletops) for public and private sector companies, including many Fortune 100 companies.

    As a cybersecurity and privacy attorney, Violet provides consulting services to respond to the needs of various cybersecurity programs. She reviews and develops customized incident response plans to ensure organizations are prepared to respond efficiently and effectively to a data breach. Violet also helps improve internal coordination by facilitating customized tabletop simulations focused on "pressure-testing" an organization's incident response procedures and protocols. Each of these customer-facing services mentioned has been built and developed for the purpose of creating long-standing relationships that turn to Violet for guidance, referrals, questions, and future projects.

    As a cybersecurity and privacy professor, Violet developed the entire curriculum for an innovative course on cybersecurity and privacy law for licensed attorneys working toward their LL.M. degree. The specific focus on litigation management has made Sullivan’s course and her lecture series uniquely valuable to experts across the United States.

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    John Finizio
    VP, Security, Risk & Compliance, Whistic
  • speaker photo
    Stuart Smith
    Enterprise Security Architect, Delta Air Lines

    Stuart Smith is the Enterprise Security Architect for Delta Air Lines reporting to the CISO. He is one of the senior security advisors to the security organization and is responsible for providing security input into various business and technology initiatives across the company. Stuart has over 23 years of professional experience in the cybersecurity field for both the Department of Defense and the private sector. He is a U.S. Army combat veteran, has a Masters in cybersecurity, and holds CISSP and CISM certifications.

  • speaker photo
    Allison K. Prout, Esq.
    Senior Counsel, Constangy, Brooks, Smith & Prophete

    Allison Prout is Senior Counsel at Constangy, where she represents clients, including SaaS providers, data aggregators, and healthcare-covered entities, in complex technology transactions with a specialized focus on data privacy and security contractual requirements. She develops and implements contracting procedures for clients, including international businesses that span multiple legal jurisdictions. With business goals in mind, Allison also works with clients to develop data security and privacy programs to address compliance with data protection regulations, including the GDPR, CCPA, and other state, federal, and global privacy laws.

  • speaker photo
    Glen Sorensen
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    David van Heerden
    Product Evangelist, Automox

    David has worked as an IT professional in Asset/Fund Management, property development, hospitality, entertainment, and now tech. His passion is to help people solve problems with technology that is easy to use, easy to manage and to have fun along the way. He is spending his time at Automox as the IT Operations Manager and Product evangelist, and continues to achievement hunt in baldur’s gate, cities skylines, and TFT.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Kip Boyle
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Erik Gaston
    VP, Global Executive Engagement, Tanium

    Erik comes to Tanium from AppDynamics (part of Cisco), where he spent almost five years in field sales. For the past two years, he was the CTO for the East Sales Team, which is responsible for generating more than half of the company's revenue with a focus on large financial firms in the region. Prior to that he built out and headed the Business Value Consulting team for that region. He got his start in technology at Deutsche Bank years back where he helped lead the AM Platform and Data Services Global Organization serving as COO. From there he went to a SaaS SW company called INTTRA (large global trade / shipping logistics platform). At INTTRA, he started by leading the transformation of the company into becoming product and voice of customer led. After that, he became CTO heading all global technology. Following INTTRA, he went back to Financial Services spending time running Target State Architecture as the Global Head of Enterprise Infrastructure CTO Product Management at Morgan Stanley.

  • speaker photo
    Jason Schwent
    Senior Legal Counsel, Clark Hill PLC
  • speaker photo
    Audrey Long
    Sr. Security Software Engineer, Microsoft

    Audrey Long is a Senior Security Software Engineer at Microsoft. She is passionate about making security accessible both to software engineers and as a career for girls in STEM. She holds DoD secret clearance and a Master of Science degree in Cyber Security from Johns Hopkins University.

  • speaker photo
    Joseph Carson
    Chief Security Scientist & Advisory CISO, Delinea

    Joseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical infrastructure, financial, and maritime industries.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.

    With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.

    VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.

    VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes