- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, October 16, 202410:30 amExhibitor Hall openRegistration Level:
- Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 am[Opening Keynote] Defending the Digital Frontier: An Update from the National Cybersecurity AllianceExecutive Director, National Cybersecurity AllianceRegistration Level:- Open Sessions
11:00 am - 11:45 amAs the digital world continues to expand and interconnect, so too do the threats and scams that target individuals, organizations, and governments. Join us for a comprehensive update on the current state of global cybersecurity threats, delivered by a leading expert from the National Cybersecurity Alliance.
In this thought-provoking keynote, discover:
- The new frontier of cybercrime: Learn about the latest cyberattacks, malware, and vulnerabilities that are pushing the boundaries of what’s possible.
- Global trends and hotbeds: Understand how threats are evolving across different regions and industries, and the implications for government agencies.
- Protecting critical infrastructure: Explore the specific challenges and strategies for safeguarding government systems and data.
- Staying ahead of the curve: Gain insights into the latest best practices and technologies for preventing and mitigating cyberattacks.
11:45 amNetworking BreakRegistration Level:- Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmInsider Threat, AI, and the New NormalSr. Director, Cyber Security, Acumatica, Inc.Registration Level:- Open Sessions
12:00 pm - 12:45 pmSession description to come.
12:00 pmInfraGard Meeting (Open to all attendees)Security Awareness Training that Sticks the Whole Year RoundRegistration Level:- Open Sessions
12:00 pm - 12:45 pmJoin chapter leaders as they give opening statements on things to come with the organization, and stay for the Security Awareness panel discussion.
12:00 pmHuman-Centric Cybersecurity for Higher EducationVP, Industry Solutions, ProofpointRegistration Level:- Open Sessions
12:00 pm - 12:45 pmHuman error is typically the starting point of most cyberattacks, and cybercriminals have become adept at using social engineering techniques to target individuals with highly persuasive, personalized messages. It is more important than ever to safeguard your faculty, students, and staff against increasingly sophisticated cyberattacks with a human-centric security strategy.
Please join us for a 45-minute live discussion with Proofpoint’s Vice President of Industry Solutions, Ryan Witt. He will cover new threat intelligence research in higher education that can help colleges and universities better understand today’s advanced attacks and how those attacks evolve with changing dynamics on campus.
We will explore:
- The prevalent cyberattacks experienced by colleges and universities
- New research on where we have observed the threat landscape is the most active in higher education and where to prioritize your protection efforts
- Which departments and individuals are most targeted
- Best practices for a more robust cybersecurity posture
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmCritical Security ControlsCISO, Dorf Nelson & Zauderer LLPRegistration Level:- Open Sessions
1:00 pm - 1:45 pmSession description coming soon.
1:00 pmAI: The New Guardian of Critical InfrastructureCybersecurity Advisor (CSA), Integrated Operations Division | Region 1, CISARegistration Level:- Open Sessions
1:00 pm - 1:45 pmAI is becoming essential in protecting critical infrastructure by improving threat intelligence. It helps detect vulnerabilities, predict threats, and respond quickly to keep vital systems secure. This discussion will explore how AI is changing the way we defend against cyber threats.
1:00 pm[Panel] How IT Can Make or Break Your Compliance ProgramDevSecOps Engineer, AutomoxRegistration Level:- Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:45 pmNetworking BreakRegistration Level:- Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmPig Butchering, BEC, and Artificial Intelligence: What the Secret Service Wants You to KnowFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:- Open Sessions
2:00 pm - 2:45 pmSession description to come.
2:00 pmNavigating the Privacy Patchwork Quilt of Laws and RegulationsCEO & Founder, Fischer Law, LLCRegistration Level:- Open Sessions
2:00 pm - 2:45 pmThe United States has become a patchwork of conflicting and overlapping data privacy regulations as individual states race to protect consumer rights and create comprehensive privacy laws. This presentation will delve into the complex landscape of state privacy laws, examining key provisions, compliance challenges, and potential impacts on businesses. We will explore how these varying regulations create an ever-changing environment for organizations operating across state lines, creating challenges for innovation and consumer trust. Additionally, the presentation will discuss the ways in which the United States is leveraging other laws (consumer protection, tort law, and older federal laws) to create privacy protections where no general state or federal privacy laws currently exist.
2:00 pmCyber Threats, CISA Tools, and Services for Your ConsiderationRegistration Level:- Open Sessions
2:00 pm - 2:45 pmAs the nation’s cyber defense agency, CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. Since the majority of our nation’s critical infrastructure is privately owned, ensuring the nation’s cybersecurity posture requires continued collaboration between government and the private sector. During this fireside chat, CISA will discuss the current cyber threat landscape, the agency’s latest initiatives to help critical infrastructure owners and operators protect and defend their networks, and the catalog of CISA services available to organizations to become more cyber resilient.
2:45 pmNetworking BreakRegistration Level:- Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmGuardians of the Ballot Box: Cybersecurity in ElectionsCybersecurity and Compliance Engineer, May MobilityRegistration Level:- Open Sessions
3:00 pm - 3:45 pmIn this presentation, we address the critical challenge of defending electoral processes against targeted campaigns, elections and social engineering tactics. As elections increasingly become targets for cyber interference, safeguarding against these threats is paramount. We examine how campaigns and elections are targeted by malicious actors, aiming to disrupt democratic practices and sway voter sentiment.
Through case studies and real-world examples, we illustrate the impact of social engineering on constituents, highlighting how misinformation and manipulation tactics can influence voter behavior and swing election outcomes. We also discuss strategies to prevent and mitigate these threats, including robust cybersecurity measures, public awareness campaigns, and enhanced education on recognizing and combating social engineering tactics.
By understanding the tactics used by malicious actors and implementing proactive defenses, we can better protect the integrity of electoral processes and ensure that voters are empowered to make informed decisions. Join us as we explore practical steps to defend against targeted campaigns and safeguard the democratic process.
3:00 pmTop 10 Worst Patch Management PracticesTechnical Product Engineer, Action1Registration Level:- Open Sessions
3:00 pm - 3:45 pm3:00 pm[Panel] The Current Threat LandscapeRegistration Level:- Open Sessions
3:00 pm - 3:45 pmIf we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?
It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.
3:45 pmNetworking BreakRegistration Level:- Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pm[Closing Keynote] Cyber Intel BriefingCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:- Open Sessions
4:00 pm - 4:45 pmSession description to come.
- Action1Booth:
Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works. With integrated real-time vulnerability discovery and automated remediation for both third-party software and OS, peer-to-peer patch distribution, and IT ecosystem integrations, it ensures continuous patch compliance and reduces security and ransomware risks—all while lowering costs. Action1 is certified for SOC 2/ISO 27001 and is trusted by thousands of enterprises managing millions of endpoints globally.
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- InfraGardBooth:
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- Menlo SecurityBooth:
The Menlo Security approach delivers 100% safety via isolation — stopping the never-ending search for risky content, while delivering a seamless end-user experience. Deployed in a public or private cloud, the Menlo Security Isolation Platform reduces security complexity and increases scale by eliminating end-point software and out-dated appliances.
- ProofpointBooth:
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- Lisa PlaggemierExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
- Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
- Ryan WittVP, Industry Solutions, Proofpoint
Ryan Witt is Proofpoint's VP, Industry Solutions, and responsible for the strategy and solutions for the company's healthcare and public sector business. Ryan is also the Chair of Proofpoint's Healthcare Advisory Board and an appointed member of HIMSS Cybersecurity, Privacy and Security Committee. Previously, Ryan was the healthcare leader for Fortinet and Juniper Networks where he also was the Chair for their respective Healthcare Customer Advisory Boards. Ryan was a contributor to the 2013 WEDI Report, a former Co-Chair of WEDI's Privacy & Security Workgroup and has been elected to the WEDI Board of Directors. Ryan was also elected to the Association for Executives in Health Information Security (AEHIS) Advisory Board. A graduate of San Jose State University, Ryan has spent much of his professional life in Europe, but he and his family now live in Silicon Valley.
- Chirag AroraCISO, Dorf Nelson & Zauderer LLP
Chirag Arora, an esteemed Cyber Security Executive Advisor and CISO at Dorf Nelson & Zauderer LLP in New York, is widely acclaimed for his outstanding contributions to the cybersecurity domain. With a distinguished career spanning more than 15 years, Mr. Arora has garnered numerous awards and accolades for his exemplary leadership and expertise in fortifying cybersecurity programs for global enterprises. His profound knowledge and research focus on Cyber Governance have positioned him as a trailblazer in the industry. Chirag's extensive experience includes conducting security gap assessments based on CIS Critical Controls, NIST CSF 2.0, and ISO 27001 frameworks, further solidifying his reputation as a cybersecurity thought leader. With an unwavering commitment to excellence, Chirag Arora continues to spearhead innovations and advancements in cybersecurity practices, ensuring the resilience and security of organizations worldwide.
- Monsurat OttunCybersecurity Advisor (CSA), Integrated Operations Division | Region 1, CISA
- Panel Discussion
- Tom BowyerDevSecOps Engineer, Automox
Tom Bowyer is a versatile Security Engineer who enjoys working with engineering, product, and infrastructure teams to ensure safe and efficient code lands in production. He has extensive experience deploying, securing and breaking SaaS applications on different operating systems and cloud hosting providers. Tom also enjoys building and breaking CI/CD pipelines, and automating away security work with Python.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Jordan FischerCEO & Founder, Fischer Law, LLC
Jordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.
Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.
With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).
Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.
Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.
In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.
Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.
Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.
HONORS & RECOGNITIONS
Lawyer on the Fast Track, The Legal Intelligencer (2023)
Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
European Union ERASMUS Grant Recipient, 2020ASSOCIATIONS & MEMBERSHIPS
American Bar Association, Business Law Fellow, 2020-2022
American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
California Bar Association
New Jersey Bar Association
Forbes Business Council Member, 2022
International Association of Privacy Professionals (IAPP), Member
University of California, Berkeley, Cybersecurity Lecturer
former Thomas R. Kline School of Law, Drexel University, Law Professor
former Chestnut Hill College, Adjunct Professor
West Chester Friends School, Board Member
Appointed Fulbright Specialist in Cybersecurity and Data PrivacyCERTIFICATIONS
Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP) - Hemanth TadepalliCybersecurity and Compliance Engineer, May Mobility
Hemanth Tadepalli is a Cybersecurity Compliance Engineer at May Mobility, excelling in the realm of autonomous transportation services. With a rich professional background spanning roles at AlixPartners, Mandiant, Google, and SensCy, he specializes in ensuring compliance with stringent standards like ISO 27001, SOC 2, ISO/SAE 21434, and others. Hemanth co-founded MYCAP (Michigan Young Cybersecurity Analysts and Professionals), fostering budding talents in the cybersecurity domain. Appointed by the Michigan Department of State in 2022, he served on the Collegiate Advisory Task Force, determined and implemented recommendations to improve voter education and engagement among universities across the state of Michigan. The task force played an important role in election security, integrity, and combatting the result of misinformation being spread.
Hemanth has presented at the Detroit Automotive Cybersecurity Conference and various other prominent industry events, showcasing his expertise and thought leadership. He holds a Computer Science degree with a cybersecurity concentration and minors in Pre-Law, Innovation, and Entrepreneurship from Kettering University. Currently pursuing a Master's in Cybersecurity at the University of California, Berkeley, he continues to drive innovation and excellence in the cybersecurity landscape.
- Panel Discussion
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.
With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.
VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.
VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!