- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Thursday, June 23, 202210:00 amExhibitor Hall openRegistration Level:
- Open Sessions
10:00 am - 4:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 am[Opening Keynote] Ukraine vs. Russia: The Cyber WarCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:- Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:- Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmDemystifying the Partnership with the FBI – InfraGard Chapter MeetingOpen to all attendeesSpecial Agent, FBIRegistration Level:- Open Sessions
12:00 pm - 12:30 pm12:00 pmTransforming Risk into OpportunityDirector of Information Security & Regulatory Compliance, ETSRegistration Level:- Open Sessions
12:00 pm - 12:30 pmThis session uses the story of traversing a gorge wall leading to the base of a Central American waterfall to convey the principles of risk management. The story illustrates a practical way to structure risk management to prepare practitioners and managers to identify and create opportunities.
Attendees will learn three risk management principles that enable organizations to recognize business and enterprise opportunities.
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmGovernment Regulation of AI and Automated ToolsLitigation Attorney, Octillo LawRegistration Level:- Open Sessions
1:00 pm - 1:45 pmA recent wave of state and federal government initiatives directed at the use of artificial intelligence systems and automated tools by businesses shows there is no coherent AI policy in the United States. This presentation will discuss current AI/automated tools regulatory landscape, the wave of new state and city laws, and the need for comprehensive federal regime.
1:00 pmLeveraging CISA Shields Up GuidanceTo Improve Your Cybersecurity Readiness & Protect Organizational AssetsPrincipal Solution Architect, Digital Identity and Security, Thales Cloud SecurityRegistration Level:- Open Sessions
1:00 pm - 1:45 pm1:45 pmNetworking BreakRegistration Level:- Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pm[Lunch Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret ServiceFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:- Open Sessions
2:00 pm - 2:45 pm2:45 pmNetworking BreakRegistration Level:- Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmHow Can We Be More Secure in a World of Distractions?CISO, New Jersey CourtsRegistration Level:- Open Sessions
3:00 pm - 3:45 pmWe are living in a world of distractions—smartphones, alerting devices at home, metaverse—and we have a job to secure ourselves, our loved ones, and we get paid for doing it at work. How is this supposed to happen when families and staff are texting, exchanging information until they sleep? Control everything or do nothing? What is the appropriate balance? How do I keep sane? Come to this presentation on lessons of leadership and operating in a more secure way within this world of distractions.
3:00 pmRansomware: #1 with a BulletCyber Security Advisor & Georgia State Coordinator, DHS CISARegistration Level:- Open Sessions
3:00 pm - 3:45 pmAll cyberattacks are evolving, and attacks are getting more and more adaptive and cunning. Recently, ransomware has dominated the headlines, and incidents among the nation’s state, local, tribal, territorial (SLTT) government entities, as well as critical infrastructure organizations, have been growing for years. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. Malicious actors continue to adapt their ransomware tactics over time, and in recent months “ransomware” attacks have outpaced so much so that they’re the #1 cyberattack in 2022 and continue to gain traction.
But don’t fret, there is hope! Come join us on a walkthrough of known countermeasures against ransomware attacks and many other attacks that could be a game changer in your security strategy: Proactivity, Awareness, Preparedness, and Resilience.
3:45 pmNetworking BreakRegistration Level:- Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmThe Future of WorkCybersecurity Advisor (CSA), Integrated Operations Division | Region 1, DHS CISARegistration Level:- Open Sessions
4:00 pm - 4:45 pmOver the last few years, the workforce, and the way we work, has entirely shifted focus. Between hybrid work models, attracting and retaining diverse talent, forced digital migrations/transformations, cybersecurity succession planning, and overall mental fatigue, the future of work has dramatically changed. Hear from Monsurat Ottun who is in the trenches navigating the “new normal” in hybrid government offices as she shares key takeaways and the lessons she’s learned along the way. This discussion is followed by a live (virtual) Q&A, so come prepared to ask your burning workforce questions!
4:00 pmLessons Learned from the Front Lines of Ransomware Data RecoveryDirector, Strategy & GTM, RubrikRegistration Level:- Open Sessions
4:00 pm - 4:45 pmThe “business” of ransomware has grown and it has become harder to combat the attacks. In 2019, one study showed that ransomware potentially cost the U.S government, health care providers, and schools approximately $7.5 billion, and according to Gartner, by 2025, at least 75% of IT organizations will face one or more attacks. When ransomware strikes, you either pay the ransom or attempt to recover. In this session, join us for a front row seat to hear what really happens during a ransomware attack and get insight from lessons learned from the “front lines” of recovering from an incident.
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- Cloud Security Alliance (CSA)Booth:
The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.
- Cybercrime Support NetworkBooth:
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- RubrikBooth:
Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.
- TechTargetBooth:
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThalesBooth:
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- WiCyS Critical InfrastructureBooth:
Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Critical Infrastructure was formed to empower women in cyber across the critical infrastructure community and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- Cerena CoughlinSpecial Agent, FBI
FBI Special Agent Cerena Coughlin is the Employment Recruiter and Applicant Coordinator for the Philadelphia Field Office and local Private Sector Coordinator overseeing InfraGard, a public/private partnership between the FBI and representatives of critical infrastructure. She was a member of the Los Angeles Innocent Images SAFE Team, where she participated in investigations of child exploitation, and was assigned to Counterterrorism squads in Los Angeles and Baltimore and Cyber in Philadelphia. Prior to joining the FBI in March 2001, Coughlin served as Director of Operations for an LA-based non-profit supporting students and educational institutions across the United States.
- Steven F. FoxDirector of Information Security & Regulatory Compliance, ETS
Creating value-add business outcomes through security and privacy design is the core of my professional mission. I prioritize understanding my clients’ organizational goals and culture to ensure their infrastructure and processes reflect their ethos. As an IT-to-business translator with extensive technical and business advisory experience, I have successfully led audits testing controls from standards such as NIST CSF, ISO 27001, GDPR, and PCI-DSS. My contributions to the security community include publications in ISSA Journal and CSOonline, and presentations at RSA Conference, Blackhat Executive Summit, and DefCon. As a member of the SecureWorld Expo Advisory Committee, I remain actively engaged in advancing the field of cybersecurity.
- Brian Myers, Esq.Litigation Attorney, Octillo Law
Brian is a seasoned litigation attorney representing clients of all sizes - from sole proprietorships to Fortune 500 companies - in complex litigation matters. He has guided clients through all stages of the litigation process, including trials and arbitrations in both state and federal courts and before multiple administrative agencies throughout the country. Brian has focused experience in cases involving professional liability and breach of contract claims in the design and construction industries and has represented clients in class action proceedings under BIPA, the Fair Debt Collection Practices Act, TCPA, and Fair Housing Act.
- David OrtegaPrincipal Solution Architect, Digital Identity and Security, Thales Cloud Security
David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expertise is in security advisory services, architecture and solutions engineering, and digital transformation data-centric solutions that drives business value and manages risks.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Sajed NaseemCISO, New Jersey Courts
Sajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters degrees from St. John's University and Columbia University. He routinely speaks at cybersecurity conferences nationally, in Europe, and with the New Jersey Bar Association. Sajed is also an Adjunct Professor at St. John's University in Information Security since 2010 and a native of New York City.
- Stanton GatewoodCyber Security Advisor & Georgia State Coordinator, DHS CISA
Stanton Gatewood is the US Department of Homeland Security /CISA - Region 4 Cyber Security Coordinator/Advisor - State of Georgia. Gatewood is the former Chief Information Security Officer (CISO) for the State of Georgia, Board of Regents of the University System of Georgia and the University of Georgia.
He has more than 35 years of cyber security/e-privacy experience in cyber security program management and strategic planning, executive leadership, including the U.S. federal, state, local, territorial, tribal governments, higher education, and several top-10 global corporations.
Gatewood is also a USAF veteran and has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University.
Stanton has built 2 centers of excellence, (1) cryptography and (2) cyber awareness & training.
- Monsurat OttunCybersecurity Advisor (CSA), Integrated Operations Division | Region 1, DHS CISA
- Joe DabrowskiDirector, Strategy & GTM, Rubrik
Joe leads America's Sales Strategy at Rubrik, working with enterprise customers and federal agencies on leveraging the Rubrik Data Security platform to drive cyber resiliency. Joe is an accomplished technology executive with 20 years’ experience. Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Joe resides in McLean, VA.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes