googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, June 23, 2022
    10:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 4:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Opening Keynote] Ukraine vs. Russia: The Cyber War
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Demystifying the Partnership with the FBI – InfraGard Chapter Meeting
    • session level icon
    Open to all attendees
    speaker photo
    Special Agent, FBI
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm
    12:00 pm
    Transforming Risk into Opportunity
    • session level icon
    speaker photo
    Director of Information Security & Regulatory Compliance, ETS
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm

    This session uses the story of traversing a gorge wall leading to the base of a Central American waterfall to convey the principles of risk management.  The story illustrates a practical way to structure risk management to prepare practitioners and managers to identify and create opportunities.

    Attendees will learn three risk management principles that enable organizations to recognize business and enterprise opportunities.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Government Regulation of AI and Automated Tools
    • session level icon
    speaker photo
    Litigation Attorney, Octillo Law
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    A recent wave of state and federal government initiatives directed at the use of artificial intelligence systems and automated tools by businesses shows there is no coherent AI policy in the United States.  This presentation will discuss current AI/automated tools regulatory landscape, the wave of new state and city laws, and the need for comprehensive federal regime.

    1:00 pm
    Leveraging CISA Shields Up Guidance
    • session level icon
    To Improve Your Cybersecurity Readiness & Protect Organizational Assets
    speaker photo
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    [Lunch Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    How Can We Be More Secure in a World of Distractions?
    • session level icon
    speaker photo
    CISO, New Jersey Courts
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    We are living in a world of distractions—smartphones, alerting devices at home, metaverse—and we have a job to secure ourselves, our loved ones, and we get paid for doing it at work. How is this supposed to happen when families and staff are texting, exchanging information until they sleep? Control everything or do nothing? What is the appropriate balance? How do I keep sane? Come to this presentation on lessons of leadership and operating in a more secure way within this world of distractions.

    3:00 pm
    Ransomware: #1 with a Bullet
    • session level icon
    speaker photo
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    All cyberattacks are evolving, and attacks are getting more and more adaptive and cunning. Recently, ransomware has dominated the headlines, and incidents among the nation’s state, local, tribal, territorial (SLTT) government entities, as well as critical infrastructure organizations, have been growing for years. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. Malicious actors continue to adapt their ransomware tactics over time, and in recent months “ransomware” attacks have outpaced so much so that they’re the #1 cyberattack in 2022 and continue to gain traction.

    But don’t fret, there is hope! Come join us on a walkthrough of known countermeasures against ransomware attacks and many other attacks that could be a game changer in your security strategy: Proactivity, Awareness, Preparedness, and Resilience.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    The Future of Work
    • session level icon
    speaker photo
    Cybersecurity Advisor (CSA), Integrated Operations Division | Region 1, DHS CISA
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Over the last few years, the workforce, and the way we work, has entirely shifted focus. Between hybrid work models, attracting and retaining diverse talent, forced digital migrations/transformations, cybersecurity succession planning, and overall mental fatigue, the future of work has dramatically changed. Hear from Monsurat Ottun who is in the trenches navigating the “new normal” in hybrid government offices as she shares key takeaways and the lessons she’s learned along the way. This discussion is followed by a live (virtual) Q&A, so come prepared to ask your burning workforce questions!

    4:00 pm
    Lessons Learned from the Front Lines of Ransomware Data Recovery
    • session level icon
    speaker photo
    Director, Strategy & GTM, Rubrik
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    The “business” of ransomware has grown and it has become harder to combat the attacks. In 2019, one study showed that ransomware potentially cost the U.S government, health care providers, and schools approximately $7.5 billion, and according to Gartner, by 2025, at least 75% of IT organizations will face one or more attacks. When ransomware strikes, you either pay the ransom or attempt to recover. In this session, join us for a front row seat to hear what really happens during a ransomware attack and get insight from lessons learned from the “front lines” of recovering from an incident.

Exhibitors
  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • Cloud Security Alliance (CSA)
    Booth:

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Cybercrime Support Network
    Booth:

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • Rubrik
    Booth:

    Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Thales
    Booth:

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • WiCyS Critical Infrastructure
    Booth:

    Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Critical Infrastructure was formed to empower women in cyber across the critical infrastructure community and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    Cerena Coughlin
    Special Agent, FBI

    FBI Special Agent Cerena Coughlin is the Employment Recruiter and Applicant Coordinator for the Philadelphia Field Office and local Private Sector Coordinator overseeing InfraGard, a public/private partnership between the FBI and representatives of critical infrastructure. She was a member of the Los Angeles Innocent Images SAFE Team, where she participated in investigations of child exploitation, and was assigned to Counterterrorism squads in Los Angeles and Baltimore and Cyber in Philadelphia. Prior to joining the FBI in March 2001, Coughlin served as Director of Operations for an LA-based non-profit supporting students and educational institutions across the United States.

  • speaker photo
    Steven F. Fox
    Director of Information Security & Regulatory Compliance, ETS

    Creating value-add business outcomes through security and privacy design is the core of my professional mission. I prioritize understanding my clients’ organizational goals and culture to ensure their infrastructure and processes reflect their ethos. As an IT-to-business translator with extensive technical and business advisory experience, I have successfully led audits testing controls from standards such as NIST CSF, ISO 27001, GDPR, and PCI-DSS. My contributions to the security community include publications in ISSA Journal and CSOonline, and presentations at RSA Conference, Blackhat Executive Summit, and DefCon. As a member of the SecureWorld Expo Advisory Committee, I remain actively engaged in advancing the field of cybersecurity.

  • speaker photo
    Brian Myers, Esq.
    Litigation Attorney, Octillo Law

    Brian is a seasoned litigation attorney representing clients of all sizes - from sole proprietorships to Fortune 500 companies - in complex litigation matters. He has guided clients through all stages of the litigation process, including trials and arbitrations in both state and federal courts and before multiple administrative agencies throughout the country. Brian has focused experience in cases involving professional liability and breach of contract claims in the design and construction industries and has represented clients in class action proceedings under BIPA, the Fair Debt Collection Practices Act, TCPA, and Fair Housing Act.

  • speaker photo
    David Ortega
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security

    David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expertise is in security advisory services, architecture and solutions engineering, and digital transformation data-centric solutions that drives business value and manages risks.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Sajed Naseem
    CISO, New Jersey Courts

    Sajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters degrees from St. John's University and Columbia University. He routinely speaks at cybersecurity conferences nationally, in Europe, and with the New Jersey Bar Association. Sajed is also an Adjunct Professor at St. John's University in Information Security since 2010 and a native of New York City.

  • speaker photo
    Stanton Gatewood
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA

    Stanton Gatewood is the US Department of Homeland Security /CISA - Region 4 Cyber Security Coordinator/Advisor - State of Georgia. Gatewood is the former Chief Information Security Officer (CISO) for the State of Georgia, Board of Regents of the University System of Georgia and the University of Georgia.

    He has more than 35 years of cyber security/e-privacy experience in cyber security program management and strategic planning, executive leadership, including the U.S. federal, state, local, territorial, tribal governments, higher education, and several top-10 global corporations.

    Gatewood is also a USAF veteran and has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University.

    Stanton has built 2 centers of excellence, (1) cryptography and (2) cyber awareness & training.

  • speaker photo
    Monsurat Ottun
    Cybersecurity Advisor (CSA), Integrated Operations Division | Region 1, DHS CISA
  • speaker photo
    Joe Dabrowski
    Director, Strategy & GTM, Rubrik

    Joe leads America's Sales Strategy at Rubrik, working with enterprise customers and federal agencies on leveraging the Rubrik Data Security platform to drive cyber resiliency. Joe is an accomplished technology executive with 20 years’ experience. Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Joe resides in McLean, VA.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes