- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, October 25, 202310:30 amExhibitor Hall openRegistration Level:
- Open Sessions
10:30 am - 4:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 am[Opening Keynote] Lessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn SolesCISO, State of North DakotaRegistration Level:- Open Sessions
11:00 am - 11:45 amIn a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.11:45 amNetworking BreakRegistration Level:- Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmThreat Intelligence: Industrialization of Cyber Fraud and AIFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:- Open Sessions
12:00 pm - 12:45 pmThe presentation will cover the Secret Service’s view on current cybercrime trends to include the emergence of AI/ML in the cybercrime world. Investigator Dougherty will frame it in the lens of BEC (Business Email Compromise) and discuss the new and emerging advancements cybercriminals are using to victimize businesses in 2023 and beyond. Investigator Dougherty may even share a a deepfake of himself.
12:00 pmMaking Cybersecurity Your CareerDirector, Business Strategy and Growth, Raytheon BBNRegistration Level:- Open Sessions
12:00 pm - 12:45 pmCybersecurity is a field that has more jobs than the workforce to fill them. Despite that fact, to enter the cybersecurity field is not trivial and when you finally enter, it is hard to know what is next.
This session will give advice and best practices for how to enter the cybersecurity work space. Additionally, we will discuss how to move from entry level in your career. Lastly, we will discuss how employers can intake new employees without a cybersecurity background to fulfill these open roles.
12:00 pmHow the Private Sector Can Get Involved in the New Biden National Cybersecurity StrategyDirector, Integrated Cybersecurity Partners, LLCRegistration Level:- Open Sessions
12:00 pm - 12:45 pm12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmSecure by Default: Evolving Security ExpectationsCISO, AutomoxRegistration Level:- Open Sessions
1:00 pm - 1:45 pmCISA recently released their paper on “Secure by Design, Secure by Default” software that has support from seven major governments. It is meant to make significant, achievable improvements in software security. We will discuss the Secure by Default concept, why it is important, and what customers and vendors can do about it today.
1:00 pmTransforming Your Policy StackDirector of Information Security & Regulatory Compliance, ETSEnterprise IT Policy Manager, State of WashingtonRegistration Level:- Open Sessions
1:00 pm - 1:45 pmThis session explores lessons from the planning, missteps, and pivot points of a security policy stack transformation. Attendees will journey through the pain-points of an outdated, patchwork policy stack developed with little attention to industry standard. They will learn tactics to engage their community.. Attendees will learn: – How to identify industry frameworks to inform policy development. – How to structure and conduct a policy review working group to validate content. – How to coordinate document vetting at all staging of community and governance review. – How to use the policy stack to transition their organization to a risk-aware mindset.
1:00 pmWhy We Are Losing the CyberwarCEO, Blue Goat CyberRegistration Level:- Open Sessions
1:00 pm - 1:45 pmWe are not losing the cyberwar due to a lack of technical skills or a lack of frameworks. We are losing the cyberwar due to a lack of people skills (low EQ) with our highly rationally intelligent (high IQ) cybersecurity staff. Most cybersecurity staff want to feel significant by being “smarter” than others. This inhibits communication and collaboration. I offer a seven-step methodology to fix this challenge, as discussed in my book “The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity” (https://www.amazon.com/Smartest-Person-Room-Solution-Cybersecurity/dp/1544516215), which is based on my 30 years’ experience in cybersecurity, including my own journey with the first cybersecurity company (Alpine Security) that I built and sold in 2020.1:45 pmNetworking BreakRegistration Level:- Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmA Whole Lotta BS (Behavioral Science) About CybersecurityExecutive Director, National Cybersecurity AllianceRegistration Level:- Open Sessions
2:00 pm - 2:45 pmLet’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security. We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.
2:00 pmCyber Threats, CISA Tools, and Services for Your ConsiderationCyber Security Advisor & Georgia State Coordinator, DHS CISARegistration Level:- Open Sessions
2:00 pm - 2:45 pmAs the nation’s cyber defense agency, CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. Since the majority of our nation’s critical infrastructure is privately owned, ensuring the nation’s cybersecurity posture requires continued collaboration between government and the private sector. During this fireside chat, CISA will discuss the current cyber threat landscape, the agency’s latest initiatives to help critical infrastructure owners and operators protect and defend their networks, and the catalog of CISA services available to organizations to become more cyber resilient.
2:00 pmThe State of the State of U.S. Privacy Laws: Requirements and EnforcementSenior Counsel, Constangy, Brooks, Smith & ProphetePartner, Buffalo, Constangy, Brooks, Smith & Prophete, LLPRegistration Level:- Open Sessions
2:00 pm - 2:45 pmWith new U.S. state privacy laws coming into effect, evolving federal guidance from the Federal Trade Commission (FTC), and increasingly active EU data regulators, businesses are required to continually evolve and mature their privacy and information security strategies to meet changing requirements. Join Constangy partners Allison Prout and Sarah Rugnetta as they provide updates on key developments both within the U.S. and internationally in data privacy law.
This presentation will detail:
- Strategies for businesses to leverage the remaining months in 2023 to continue to develop their privacy regulatory compliance,
- Creating solutions that can be used to meet new and forthcoming legislative requirements, and
- Insights into practical privacy and information security solutions when required to meet multiple different regulatory requirements.
2:45 pmNetworking BreakRegistration Level:- Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pm[Closing Keynote] Cyber Intel Briefing: GovernmentCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:- Open Sessions
3:00 pm - 4:45 pmSession description to come.
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- CRESTBooth:
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- Michael GreggCISO, State of North Dakota
Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.
With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Yolanda ReidDirector, Business Strategy and Growth, Raytheon BBN
Passionate about addressing the problems related to cybersecurity and technology of the future. People speak about innovation, but Yolanda encourages innovation from workplace entry to developing new tools, solutions, and techniques. As a former U.S. Department of Defense civilian for more than 20 years, she has been "doing cyber" before we had the term, but started "doing innovation" since high school, where she worked at NASA and Exxon USA.
At Raytheon BBN Technologies, she supports the president with developing strategies to grow how BBN Technologies supports the Intelligence Community needs of today and the needs the IC will have in the near future. At BBN, the workforce is passionate and thrives in producing solutions to hard challenges and developing beyond state-of-the-art research and development. It's a dynamic environment with a constantly evolving portfolio of new projects, always aimed at solving tough problems for our customers. BBN's portfolio consists of these topics: advancing research with DNA, bio-technology, quantum, cybersecurity, AI/ML, acoustics, space, 5G, human language technologies, and secure computer networking devices.
As an experienced Electrical Engineer from Vanderbilt University, she demonstrated a history of providing strategic leadership to support the Intelligence Community through technology (microelectronics, cellular communications, high speed fiber networks, radio frequencies [RF], SCADA, satellites, cyber security, cloud technologies, and computer software development).
- Kurt SangerDirector, Integrated Cybersecurity Partners, LLC
- Jason KiktaCISO, Automox
Jason Kikta is the Chief Information Security Officer at Automox. He previously served for over 20 years in the United States Marine Corps, which included seven years at U.S. Cyber Command designing and managing the national counter-APT and counter-ransomware missions.
- Steven F. FoxDirector of Information Security & Regulatory Compliance, ETS
Creating value-add business outcomes through security and privacy design is the core of my professional mission. I prioritize understanding my clients’ organizational goals and culture to ensure their infrastructure and processes reflect their ethos. As an IT-to-business translator with extensive technical and business advisory experience, I have successfully led audits testing controls from standards such as NIST CSF, ISO 27001, GDPR, and PCI-DSS. My contributions to the security community include publications in ISSA Journal and CSOonline, and presentations at RSA Conference, Blackhat Executive Summit, and DefCon. As a member of the SecureWorld Expo Advisory Committee, I remain actively engaged in advancing the field of cybersecurity.
- Samantha ZeeEnterprise IT Policy Manager, State of Washington
As Washington State’s Enterprise IT Policy Manager, Samantha Zee shepherds the IT policy updates and waiver requests. She previously managed a 24/7 answering service, leveraging the latest technology to encourage human connections serving government, private, and non-profit clients. She earned her MBA while serving as Western Washington University’s Travel Program Specialist, leading a campus-wide effort to replace the electronic travel system. She loves seeing tangible improvements in everyday actions, learning how to use new tools and systems, and feeling chaos resolve into functional organization. In her spare time, she makes art, practices yoga, bikes, and hikes with her family.
- Christian EspinosaCEO, Blue Goat Cyber
Christian Espinosa is the CEO & Founder of Blue Goat Cyber and a Cybersecurity Professor at Maryville University. He holds over 25 certifications, including the CISSP, CCISO, and PMP. Christian is a U.S. Air Force veteran with a BS in Engineering from the U.S. Air Force Academy and an MBA from Webster University. He holds multiple patents on cybersecurity attack and defense. Major recent projects include penetration testing and assessments of commercial aircraft, medical device penetration testing, and numerous incident response projects. When Christian isn’t protecting us from cybercriminals, he climbs mountains, travels the world, teaches outdoor wilderness survival, and competes in Ironman triathlons.
- Lisa PlaggemierExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
- Stanton GatewoodCyber Security Advisor & Georgia State Coordinator, DHS CISA
Stanton Gatewood is the US Department of Homeland Security /CISA - Region 4 Cyber Security Coordinator/Advisor - State of Georgia. Gatewood is the former Chief Information Security Officer (CISO) for the State of Georgia, Board of Regents of the University System of Georgia and the University of Georgia.
He has more than 35 years of cyber security/e-privacy experience in cyber security program management and strategic planning, executive leadership, including the U.S. federal, state, local, territorial, tribal governments, higher education, and several top-10 global corporations.
Gatewood is also a USAF veteran and has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University.
Stanton has built 2 centers of excellence, (1) cryptography and (2) cyber awareness & training.
- Allison K. Prout, Esq.Senior Counsel, Constangy, Brooks, Smith & Prophete
Allison Prout is Senior Counsel at Constangy, where she represents clients, including SaaS providers, data aggregators, and healthcare-covered entities, in complex technology transactions with a specialized focus on data privacy and security contractual requirements. She develops and implements contracting procedures for clients, including international businesses that span multiple legal jurisdictions. With business goals in mind, Allison also works with clients to develop data security and privacy programs to address compliance with data protection regulations, including the GDPR, CCPA, and other state, federal, and global privacy laws.
- Sarah RugnettaPartner, Buffalo, Constangy, Brooks, Smith & Prophete, LLP
Sarah serves as a vice chair of the Constangy Cyber Team and practices in New York. She leads the provision of compliance advisory services for the Cyber Team, advising clients on strategies to mitigate risk associated with data privacy and security through business-oriented approaches. Sarah has more than 15 years of experience working in the privacy law area. She is a former privacy officer, a former state regulator, and has extensive experience serving as outside counsel for businesses in the fields of health law, data privacy, regulatory compliance, and risk management. She is well-versed in advising clients on the scope and applicability of domestic and international data privacy laws. A former Assistant General Counsel with the Vermont Department of Financial Regulation, Sarah regularly interfaces with state and federal agencies in response to investigations, enforcement actions and compliance audits. Sarah holds the Certified Information Privacy Professional for European law (CIPP/E) credential. She received her J.D. from the University of Buffalo and is admitted to practice in New York and Vermont.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.
With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.
VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.
VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes