Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, April 29, 202610:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.
11:00 amOPENING KEYNOTERegistration Level:
Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmThe Pocket-Sized Threat: Orchestrating Adversarial AI Workflows on a Local LaptopFocus Areas: Adversarial AI, Model Context Protocol (MCP), Local LLM, Agentic Workflows, Red Teaming, Open Source SecurityNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceRegistration Level:
Open Sessions
12:00 pm - 12:45 pmThe barrier to entry for high-level cyber operations has shifted. No longer requiring massive server farms, sophisticated “agentic” threats can now be orchestrated entirely from a single consumer-grade laptop. This session, delivered by a US Secret Service Network Intrusion Forensics Analyst, moves beyond the theory of “AI threats” and into the practical mechanics of how adversaries are using open-source tools to automate the kill chain.
This is a lab-heavy session designed to show you exactly how an adversary builds a local, autonomous hacking station. We will walk through the deployment of an Open Source Large Language Model (LLM) and demonstrate the power of the Model Context Protocol (MCP)—a protocol that serves as the “USB port” for AI, allowing models to interact seamlessly with local files, secure APIs, and system tools.
Attendees will participate in a live walkthrough of:
- Local LLM Deployment: How to run state-of-the-art models (like Llama 3 or Mistral) locally to avoid detection and maintain data privacy.
- The Power of MCP: Using the Model Context Protocol to grant an LLM “hands” (the ability to read logs, query databases, and execute scripts).
- Agentic Workflows: Moving from a simple chatbot to an “Agent” that can reason, plan multi-step attacks, and pivot autonomously based on forensic output.
- Defensive Implications: How to detect and defend against locally hosted, agentic adversarial activity that leaves a minimal network footprint.
This session is designed for security professionals who want to understand the “adversarial edge” of AI.
12:00 pmFrom Compliance to Confidence: Turning Cyber Risk into ROIFocus Areas: GRC, Compliance, Security Audit, Security ROI, Cloud SecuritySr. ITIL Project Manager, CircleRegistration Level:
Open Sessions
12:00 pm - 12:45 pmMost organizations treat cyber risk as a compliance checkbox—but real business resilience requires measurable action. In this session, Dr. Fredrick Dande, PhD, will show IT and business leaders how to transform cyber and IT risk into quantifiable business value.
Attendees will leave with a clear, actionable framework to turn cyber and IT risk into measurable business value and confident decision-making.
12:00 pmZero Trust in Action: A Practical Roadmap for Security TransformationRegistration Level:
Open Sessions
12:00 pm - 12:45 pmZero Trust is more than a buzzword—it’s a mindset shift that reshapes how organizations protect assets. In this session, digital transformation and cybersecurity expert Amy Yee presents a clear, actionable roadmap for adopting Zero Trust. You’ll explore foundational principles and organizational drivers, learn how to assess maturity and identify quick wins, and understand common pitfalls—like fragmented identity policies—before they derail your progress.
Amy dives into key ingredients: identity security, supply chain resilience, essential cross-team conversations, and navigating blockers/enablers. Packed with real-world examples and practical exercises, this talk will leave CISOs, IT leaders, and security teams equipped to design, implement, and sustain a Zero Trust strategy that scales with business needs.
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmThe Data War for FinServ Has BegunCybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
1:00 pm - 1:45 pmThe Financial Services sector is living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how wealth is managed, transactions are executed, and capital is protected. In this new era, your most valuable asset—customer trust and financial data—is under constant threat, not just from cybercriminals targeting your vaults, but from the rapid digitization of your own banking infrastructure.
In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots financial institutions face as they race to adopt Fintech innovations and migrate legacy systems to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional fraud controls, how AI is both a weapon for sophisticated financial crimes and a shield for defense, and why the cloud isn’t inherently secure for sensitive financial records—unless you make it so.
Whether you’re a CEO, CISO, or banking leader, this session will empower you with actionable frameworks to:
- Understand how AI and cloud reshape the cyber threat landscape for banks, insurers, and investment firms.
- Identify financial data exposure risks that live outside your control—and how to maintain sovereignty over critical assets.
- Shift from a legacy perimeter model to identity- and data-centric security to protect the modern financial ecosystem.
- Build an AI-aware security posture that accelerates—not blocks—Fintech innovation and algorithmic advantage.
- Win the new war for data ownership, visibility, and control in a highly regulated global market.
The convergence is already here. The question is, are you investing in resilience, or banking on luck?
1:00 pmTop 10 Most-Needed AI Skills in Cybersecurity – "Draft Day" to Accelerate Your CareerFocus Areas: AI; Cybersecurity Skills; Career Development; Professional Growth; Workforce EvolutionLead Information Security Analyst, TIAARegistration Level:
Open Sessions
1:00 pm - 1:45 pmThe cybersecurity talent market is officially on the clock. As AI-driven threats—from agentic malware to deepfake identity deception—move from theory to the frontline, the demand for AI-fluent defenders has reached a fever pitch. But which skills carry a first-round pedigree, and which are just pre-season hype?
In this high-energy session, join “Commissioner” Charles Hartley for the ultimate AI Cybersecurity Career Draft. Based on extensive research from TIAA’s Cybersecurity Awareness Team, we rank the Top 10 “franchise-player” skills—including Adversarial ML, Agentic Governance, and LLM Auditing—that are redefining the SOC.
Whether you’re a veteran or a rookie, you’ll leave with a professional scouting report on the most in-demand competencies and a winning playbook to secure your spot on the industry’s elite roster.
With the next pick in the AI career draft… will you be the one to change the game?
1:00 pmAPI Security: Managing the Fastest-Growing Attack SurfaceRegistration Level:
Open Sessions
1:00 pm - 1:45 pmSession details to come.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmFinServ DebriefFocus Areas: Cyber Defense; Ransomware; Operational Resilience; Critical Infrastructure; AI; GeopoliticalCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:
Open Sessions
2:00 pm - 2:45 pmFinancial Services is no longer just a facilitator of global trade; it is the primary battlefield of modern conflict. This session connects the dots between global geopolitical volatility and the immediate risks to market liquidity, institutional integrity, and consumer trust. We will examine how shifting alliances and conflicts involving major powers like Russia, China, and the EU are reshaping the cyber threat landscape—specifically targeting cross-border payment systems, central bank digital currencies (CBDCs), and the global fintech supply chain.The discussion will pivot to the “internal” evolution of the sector, analyzing the rapid integration of Generative AI in algorithmic trading and automated underwriting, and the resulting regulatory and privacy minefield. From state-aligned actors seeking to destabilize national economies to sophisticated ransomware syndicates targeting the high-frequency trading floor, we will profile the adversaries threatening the global fiscal order.Join us for a 2026 outlook that moves beyond mere regulatory compliance, offering a battle-tested framework for maintaining operational resilience and capital stability in the face of unprecedented global instability.2:00 pmSpeaking the Language of Risk: Bridging the CISO-CFO DividevCISO, Cyber Risk Opportunities LLCFormer CFO; Founder of kept.proRegistration Level:
Open Sessions
2:00 pm - 2:45 pmFor years, the relationship between security leadership and finance has been defined by a fundamental “language barrier.” While the CISO talks in vulnerabilities and threat vectors, the CFO thinks in terms of ROI, capital allocation, and fiscal resilience. This session moves beyond the myth that “security is too expensive” to address the real issue: a lack of shared vocabulary. Join a veteran vCISO and a seasoned CFO for a candid conversation on how to align technical requirements with business objectives. Attendees will learn how to transform security metrics into financial risk data that commands boardroom respect and secures long-term investment. The problem isn’t the budget; it’s the dictionary.
2:00 pm[Panel] Trust in the Crosshairs: Defeating Industrialized BEC, Insider Threats, and Supply Chain FraudRegistration Level:
Open Sessions
2:00 pm - 2:45 pmIn the financial sector, trust is the primary currency—and it is currently under siege from within and without. In 2026, the “real-world” threats are no longer just external attacks; they are the sophisticated exploitation of trusted relationships. From AI-enhanced Business Email Compromise (BEC) that mimics executive authority to the “silent” risk of third-party vendor compromises and malicious (or negligent) insider activity, the modern firm’s perimeter is effectively non-existent.
This session provides a pragmatic defense strategy for the 2026 financial landscape. We will move beyond theoretical risks to address the three pillars of operational resilience: hardening the “Identity Perimeter” to neutralize stolen credentials and insider risk, gaining “Deep Observability” to catch lateral movement in encrypted supply-chain traffic, and leveraging “Secure-by-Design” cloud infrastructure to ensure rapid recovery. Attendees will leave with a blueprint for protecting transaction integrity and customer privacy against the threats that are already inside the gates.
2:45 pmNetworking BreakRegistration Level:
Open Sessions
2:45 pm - 3:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmAlways Listening, Always Connected: Why Smart Home Privacy Risks Are an Enterprise ProblemFocus Areas: IoT; Remote Work Security; Shadow IT; Data Privacy; AI-Powered Smart DevicesSr. Information Security Engineer, Reinsurance Group of AmericaRegistration Level:
Open Sessions
3:00 pm - 3:45 pmAI-powered smart home devices continuously collect, analyze, and transmit voice, behavioral, and environmental data to provide seamless personalization. However, as the lines between home and office blur, these
“convenient” consumer devices have become the new soft underbelly of corporate security.This session explores how AI-driven ecosystems handle sensitive data—from always-on microphones to complex sensor fusion—and identifies the critical failure points in data retention and third-party sharing. We will dive into the “Pivot Risk”: how continuous connectivity and opaque data flows allow privacy threats to follow users from their living rooms directly into the enterprise network. Attendees will gain a practitioner’s perspective on the cascading risks of unintended data inference and learn practical strategies for applying privacy-by-design to protect both personal and professional environments.
Key Takeaways:
- The Household Pivot: How vulnerabilities in consumer AI devices can serve as entry points for broader network lateral movement
- Data Lifecycle Risks: Identifying common privacy failure points in smart home ecosystems, from collection to cloud storage
- The Shadow Perimeter: Understanding the risks of continuous connectivity and how personal data inference impacts corporate privacy postures
- Risk Assessment: Practical approaches for evaluating the privacy footprint of AI-enabled devices in remote-work environments
- Privacy-by-Design: Applying rigorous architectural principles to mitigate data leakage in consumer-grade technology
3:00 pm[Panel] Calculated Risk: The FinServ 'Would You Rather' Face-OffFocus Areas: FinServ; BEC attacks; Identity Management; Vendor Risk; AI; Operational SecurityDirector, Technology Risks and Controls - US Card and International Business and Payments, CapitalOneRegistration Level:
Open Sessions
3:00 pm - 3:45 pmIn the hyper-connected, regulation-heavy world of financial services, a single second of latency costs millions, and a single breach costs trust. There are no “safe bets”—only calculated risks. Join us for an unscripted, high-energy session where top Financial Sector CISOs face off on the industry’s most brutal hypothetical scenarios.Moderated in a rapid-fire game show format, our panelists will be presented with unforgiving “Would You Rather” choices ranging from catastrophic wire fraud and third-party failures to SEC disclosure dilemmas and crippling legacy mainframe vulnerabilities. They won’t just pick a side; they have to defend it against the clock—and each other.Attendees will gain a unique window into the minds of security leaders, understanding how they balance friction-free customer experience against fraud controls, and rapid fintech innovation against strict regulatory compliance. Come ready to vote on who makes the best investment in a bad situation.3:00 pmThe Digital Path to Physical Harm: Profiling 'Cyber Violence' in the Modern AgeFocus Areas: Cyber Violence; Violence-as-a-Service; Digital Extortion; Digital Behavioral CriminalisticsCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:
Open Sessions
3:00 pm - 3:45 pmThe line between a digital threat and a physical attack has officially vanished. From the targeted murder of executives to “Violence-as-a-Service,” the digital footprint is no longer just a trail of data—it is a measurable pathway toward intended harm. In this session, former FBI Profiler Cameron Malin introduces the concept of Cyber Violence, exploring how physical atrocities are now enabled, rehearsed, and amplified through digital systems.
Attendees will get an inside look at Digital Behavioral Criminalistics (DBC), a revolutionary forensic discipline that merges behavioral science with digital forensics. Learn how to reconstruct user thought processes and identify the “pre-attack” indicators hidden within digital media before the threat transitions from the screen to the street.
3:45 pmNetworking BreakRegistration Level:
Open Sessions
3:45 pm - 4:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmCLOSING KEYNOTERegistration Level:
Open Sessions
4:00 pm - 4:45 pm
- DoppelBooth: n/a
Doppel is the social engineering defense platform using AI to fight AI. Built to outpace and overpower your would-be attackers, our sophisticated AI-forensics see attacks coming and crush them at their source. We safeguard every channel and move faster than attack speed. With intelligence that constantly compounds, we’re perpetually at the forefront of social engineering defenses.
We work relentlessly to defend your brand, people, and future from whatever comes next in social engineering.
- Google Cloud SecurityBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- Sublime SecurityBooth: n/a
Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.
Jared LobatoNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceWith a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification. Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.
Fredrick Dande, PhDSr. ITIL Project Manager, CircleBusiness Enablement, Technology Strategy, and Digital Transformation. With 15+ years advising firms like EY and Circle, Fredrick developed the ROI-Based Risk Assessment Framework (RRAF) to help leaders quantify IT and cyber risk in business terms. He has presented at IEEE and other professional forums, holds a PhD in Technology Management, and is certified in ITIL, PMP, and IT governance. He empowers executives to turn IT risk into strategic growth and measurable business value.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Charles HartleyLead Information Security Analyst, TIAACharles Hartley is a lead information security analyst with TIAA. His focus is on researching and creating compelling AI/cybersecurity content. He has a master's degree in business administration and journalism, and he has 30-plus years in the high-tech industry.
Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCCedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.
Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.
Kip BoylevCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
James WheelerFormer CFO; Founder of kept.proJames Wheeler is a fractional CFO and the founder of kept.pro, which provides an outsourced accounting department model for growing companies with $2M–$50M in annual revenue. He brings 15+ years of executive finance leadership across services and technology businesses and was twice a finalist for the San Diego Business Journal’s CFO of the Year. James holds a BA in Economics and an MBA from UC San Diego, completed executive education at MIT Sloan, and has served on nonprofit and for-profit boards.
Google Cloud Security Representative
Shwetha Babu PrasadSr. Information Security Engineer, Reinsurance Group of AmericaI am a Senior Information Security Engineer, author, and speaker specializing in data protection, privacy engineering, and security controls across modern cloud and AI-enabled environments. My work focuses on designing and implementing practical privacy and data protection controls that balance innovation with risk, including sensitive data handling, policy enforcement, and privacy-by-design practices. I have hands-on experience evaluating privacy risks across connected systems and emerging technologies, with a particular interest in how AI changes data collection, inference, and exposure. I am an active contributor to professional security and privacy communities, where I share practical insights through speaking and writing.
Piyali DasDirector, Technology Risks and Controls - US Card and International Business and Payments, CapitalOnePiyali Das is a highly-accomplished cyber risk leader with two decades of experience driving enterprise-wide technology and cyber risk initiatives. Certified with CRISC, CCSK, CCAK, and PMP, she aligns risk management with strategic business objectives. Her expertise covers information security risk and compliance frameworks, cloud security, third-party risk, and AI/ML risk assessment. Piyali holds an MS in IT and Cybersecurity, specializing in data protection and risk management, complemented by a BTech in Computer Science and Engineering, which provides a strong foundation in algorithms and system architecture.
Panel Discussion
Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiCameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).
Hone your skills and connect with your regional peers in InfoSec.

