Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, April 29, 202610:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.
11:00 amOPENING KEYNOTERegistration Level:
Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmThe Pocket-Sized Threat: Orchestrating Adversarial AI Workflows on a Local LaptopFocus Areas: Adversarial AI, Model Context Protocol (MCP), Local LLM, Agentic Workflows, Red Teaming, Open Source SecurityNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceRegistration Level:
Open Sessions
12:00 pm - 12:45 pmThe barrier to entry for high-level cyber operations has shifted. No longer requiring massive server farms, sophisticated “agentic” threats can now be orchestrated entirely from a single consumer-grade laptop. This session, delivered by a US Secret Service Network Intrusion Forensics Analyst, moves beyond the theory of “AI threats” and into the practical mechanics of how adversaries are using open-source tools to automate the kill chain.
This is a lab-heavy session designed to show you exactly how an adversary builds a local, autonomous hacking station. We will walk through the deployment of an Open Source Large Language Model (LLM) and demonstrate the power of the Model Context Protocol (MCP)—a protocol that serves as the “USB port” for AI, allowing models to interact seamlessly with local files, secure APIs, and system tools.
Attendees will participate in a live walkthrough of:
- Local LLM Deployment: How to run state-of-the-art models (like Llama 3 or Mistral) locally to avoid detection and maintain data privacy.
- The Power of MCP: Using the Model Context Protocol to grant an LLM “hands” (the ability to read logs, query databases, and execute scripts).
- Agentic Workflows: Moving from a simple chatbot to an “Agent” that can reason, plan multi-step attacks, and pivot autonomously based on forensic output.
- Defensive Implications: How to detect and defend against locally hosted, agentic adversarial activity that leaves a minimal network footprint.
This session is designed for security professionals who want to understand the “adversarial edge” of AI.
12:00 pmCyber Behavioral Profiling: Assessing Cyber Adversary Deception Tactics in FinServ AttacksRegistration Level:
Open Sessions
12:00 pm - 12:45 pmFinancial services remain prime targets for sophisticated cyber adversaries who leverage deception tactics to evade detection, manipulate trust, and exploit cognitive vulnerabilities. This session explores the intersection of cyber threat intelligence and behavioral profiling to dissect adversaries’ modus operandi in FinServ attacks. Attendees will gain insights into how psychological manipulation and adversarial adaptation shape modern cyber threats—equipping security teams with proactive strategies to detect, disrupt, and mitigate deceptive cyber campaigns.
12:00 pmZero Trust in Action: A Practical Roadmap for Security TransformationRegistration Level:
Open Sessions
12:00 pm - 12:45 pmZero Trust is more than a buzzword—it’s a mindset shift that reshapes how organizations protect assets. In this session, digital transformation and cybersecurity expert Amy Yee presents a clear, actionable roadmap for adopting Zero Trust. You’ll explore foundational principles and organizational drivers, learn how to assess maturity and identify quick wins, and understand common pitfalls—like fragmented identity policies—before they derail your progress.
Amy dives into key ingredients: identity security, supply chain resilience, essential cross-team conversations, and navigating blockers/enablers. Packed with real-world examples and practical exercises, this talk will leave CISOs, IT leaders, and security teams equipped to design, implement, and sustain a Zero Trust strategy that scales with business needs.
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmThe Data War for FinServ Has BegunCybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
1:00 pm - 1:45 pmThe Financial Services sector is living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how wealth is managed, transactions are executed, and capital is protected. In this new era, your most valuable asset—customer trust and financial data—is under constant threat, not just from cybercriminals targeting your vaults, but from the rapid digitization of your own banking infrastructure.
In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots financial institutions face as they race to adopt Fintech innovations and migrate legacy systems to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional fraud controls, how AI is both a weapon for sophisticated financial crimes and a shield for defense, and why the cloud isn’t inherently secure for sensitive financial records—unless you make it so.
Whether you’re a CEO, CISO, or banking leader, this session will empower you with actionable frameworks to:
- Understand how AI and cloud reshape the cyber threat landscape for banks, insurers, and investment firms.
- Identify financial data exposure risks that live outside your control—and how to maintain sovereignty over critical assets.
- Shift from a legacy perimeter model to identity- and data-centric security to protect the modern financial ecosystem.
- Build an AI-aware security posture that accelerates—not blocks—Fintech innovation and algorithmic advantage.
- Win the new war for data ownership, visibility, and control in a highly regulated global market.
The convergence is already here. The question is, are you investing in resilience, or banking on luck?
1:00 pmFrom Alert Fatigue to Adaptive Defense: Operationalizing AI in the SOCRegistration Level:
Open Sessions
1:00 pm - 1:45 pmSession details to come.
1:00 pmAPI Security: Managing the Fastest-Growing Attack SurfaceRegistration Level:
Open Sessions
1:00 pm - 1:45 pmSession details to come.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmModern Ransomware: Double Extortion, Data Destruction, and Targeted CampaignsRegistration Level:
Open Sessions
2:00 pm - 2:45 pmSession details to come.
2:00 pmBuilding Incident Response Plans for Highly Distributed WorkforcesRegistration Level:
Open Sessions
2:00 pm - 2:45 pmSession details to come.
2:00 pm[Panel] Trust in the Crosshairs: Defeating Industrialized BEC, Insider Threats, and Supply Chain FraudRegistration Level:
Open Sessions
2:00 pm - 2:45 pmIn the financial sector, trust is the primary currency—and it is currently under siege from within and without. In 2026, the “real-world” threats are no longer just external attacks; they are the sophisticated exploitation of trusted relationships. From AI-enhanced Business Email Compromise (BEC) that mimics executive authority to the “silent” risk of third-party vendor compromises and malicious (or negligent) insider activity, the modern firm’s perimeter is effectively non-existent.
This session provides a pragmatic defense strategy for the 2026 financial landscape. We will move beyond theoretical risks to address the three pillars of operational resilience: hardening the “Identity Perimeter” to neutralize stolen credentials and insider risk, gaining “Deep Observability” to catch lateral movement in encrypted supply-chain traffic, and leveraging “Secure-by-Design” cloud infrastructure to ensure rapid recovery. Attendees will leave with a blueprint for protecting transaction integrity and customer privacy against the threats that are already inside the gates.
2:45 pmNetworking BreakRegistration Level:
Open Sessions
2:45 pm - 3:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmCalculated Risk: The FinServ 'Would You Rather' Face-OffFocus Areas: Risk Management; GRC; Cybersecurity Leadership; CISO StrategyRegistration Level:
Open Sessions
3:00 pm - 3:45 pmIn the hyper-connected, regulation-heavy world of financial services, a single second of latency costs millions, and a single breach costs trust. There are no “safe bets”—only calculated risks. Join us for an unscripted, high-energy session where top FinServ security leaders face off on the industry’s most brutal hypothetical scenarios.
Moderated in a rapid-fire game show format, our panelists will be presented with unforgiving “Would You Rather” choices ranging from catastrophic wire fraud and third-party failures to SEC disclosure dilemmas and crippling legacy mainframe vulnerabilities. They won’t just pick a side; they have to defend it against the clock—and each other.
Attendees will gain a unique window into the minds of security leaders, understanding how they balance friction-free customer experience against fraud controls, and rapid fintech innovation against strict regulatory compliance. Come ready to vote on who makes the best investment in a bad situation.
3:00 pmBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Open Sessions
3:00 pm - 3:45 pmSession details to come.
3:00 pmData Privacy in 2026: Navigating New Regulations and Compliance PressuresRegistration Level:
Open Sessions
3:00 pm - 3:45 pmSession details to come.
3:45 pmNetworking BreakRegistration Level:
Open Sessions
3:45 pm - 4:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmCLOSING KEYNOTERegistration Level:
Open Sessions
4:00 pm - 4:45 pm
- Google CloudBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
Jared LobatoNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceWith a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification. Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Google Cloud Security Representative
Hone your skills and connect with your regional peers in InfoSec.
