googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 16, 2024
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Opening Keynote] Are You in a Dysfunctional Relationship with the HR Department?
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    When HR and security teams understand their respective roles, value each other, and have an open, productive partnership, life is good. They can help each other be more effective and complement each other’s functions. Unfortunately, that symbiotic state can be hard to achieve. For security teams, HR folks can be hard to understand. Sometimes they seem like a great advocate for security, and at other times they can seem more like a blocker of our efforts to better secure the organization.

    For HR professionals, dealing with the security team can be a challenge. For example, the security team might send out an emotionally-triggering simulated phish to everyone in the organization, causing numerous employee complaints that HR has to manage. So what can you do if you don’t have the best relationship with the HR team?

    This talk, based on years of experience navigating the relationship between HR and security teams, will cover the issues that cause the biggest disconnects between HR and security. We’ll look at the issues from both sides and cover proposed solutions for each. Improving the relationships for both departments can lead to happier HR and security professionals who are more effective in their roles, and a company that’s better protected and prepared against cyber threats.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    InfraGard Meeting (Open to all attendees)
    • session level icon
    Three Risks that Security Leaders in Government and Education Sectors Must Address
    speaker photo
    VP, Cybersecurity Advocacy, Zscaler
    speaker photo
    Sr. Strategic Advisor & vCISO, Sentinel Technologies
    speaker photo
    Director, Information Security Office / Deputy CISO, Rice University
    speaker photo
    CISO, Executive Advisors Group, LLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session description coming soon.

    12:00 pm
    SEC Disclosure Update: What You Really Need to Know Now!
    • session level icon
    speaker photo
    VP, Litigation and Enforcement, Woodruff Sawyer
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session description coming soon.

    12:00 pm
    Human-Centric Cybersecurity for Higher Education
    • session level icon
    speaker photo
    VP, Industry Solutions, Proofpoint
    speaker photo
    Solutions Architect, Proofpoint
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Human error is typically the starting point of most cyberattacks, and cybercriminals have become adept at using social engineering techniques to target individuals with highly persuasive, personalized messages. It is more important than ever to safeguard your faculty, students, and staff against increasingly sophisticated cyberattacks with a human-centric security strategy.

    Please join us for a 45-minute live discussion with Proofpoint’s Vice President of Industry Solutions, Ryan Witt. He will cover new threat intelligence research in higher education that can help colleges and universities better understand today’s advanced attacks and how those attacks evolve with changing dynamics on campus.

    We will explore:

    • The prevalent cyberattacks experienced by colleges and universities
    • New research on where we have observed the threat landscape is the most active in higher education and where to prioritize your protection efforts
    • Which departments and individuals are most targeted
    • Best practices for a more robust cybersecurity posture
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    A Path to Cyber Maturity Using CIS Controls
    • session level icon
    speaker photo
    CISO, Dorf Nelson & Zauderer LLP
    speaker photo
    Executive Vice President & General Manager, Center for Internet Security
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    This presentation, led by Curtis Dukes and Chirag Arora, focuses on the strategic implementation and benefits of the CIS Controls framework and enterprise security controls. It outlines the importance of cybersecurity maturity through structured assessments and the use of CIS Controls to enhance organizational security posture.

    Key topics include the integration of the CIS Controls ecosystem, the role of gap analysis in developing security maturity roadmaps, and the utility of the CIS Controls Self-Assessment Tool (CSAT) for continuous improvement. Additionally, the presentation emphasizes how enterprise security controls, aligned with industry standards, can identify, assess, and mitigate security risks, enhancing overall risk management. The deck also highlights real-world applications and the incentivization of best practices to achieve robust cyber defense mechanisms.

    1:00 pm
    AI: The New Guardian of Critical Infrastructure
    • session level icon
    speaker photo
    Cybersecurity Advisor (CSA), Integrated Operations Division | Region 1, CISA
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    AI is becoming essential in protecting critical infrastructure by improving threat intelligence. It helps detect vulnerabilities, predict threats, and respond quickly to keep vital systems secure. This discussion will explore how AI is changing the way we defend against cyber threats.

    1:00 pm
    [Panel] How IT Can Make or Break Your Compliance Program
    • session level icon
    speaker photo
    Director of Security and IT, Automox
    speaker photo
    CISO & Assistant Vice President, Boston University
    speaker photo
    Member, Data Privacy & Cybersecurity, Clark Hill Law
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session description to come.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    An Interview with the CISO
    • session level icon
    speaker photo
    CISO, USC
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Join SecureWorld Digital’s Tom Bechtold as he chats with Sandy Taylor from USC about her path to cybersecurity, what campus life and work are like, dealing with threats, security awareness, and securing what seems to be its very own small town/nation.

    2:00 pm
    Unpacking Third-Party Risk Management Essentials
    • session level icon
    speaker photo
    Security GRC Lead, Plaid
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Third-Party Risk Management (TPRM) is an essential component of contemporary business operations, pivotal in managing security risks associated with vendors and partners. However, the complexity of TPRM can be daunting due to the diverse nature of risks and the need for cross-functional collaboration, including the rise in supply chain attacks.

    This presentation proposes a multifaceted approach to simplify TPRM, thereby boosting return on investment and enhancing security postures. We will also discuss some recent supply chain attacks and strategies to reduce such risks.

    2:00 pm
    Navigating the Privacy Patchwork Quilt of Laws and Regulations
    • session level icon
    speaker photo
    CEO & Founder, Fischer Law, LLC
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    The United States has become a patchwork of conflicting and overlapping data privacy regulations as individual states race to protect consumer rights and create comprehensive privacy laws. This presentation will delve into the complex landscape of state privacy laws, examining key provisions, compliance challenges, and potential impacts on businesses. We will explore how these varying regulations create an ever-changing environment for organizations operating across state lines, creating challenges for innovation and consumer trust. Additionally, the presentation will discuss the ways in which the United States is leveraging other laws (consumer protection, tort law, and older federal laws) to create privacy protections where no general state or federal privacy laws currently exist.

     

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Guardians of the Ballot Box: Cybersecurity in Elections
    • session level icon
    speaker photo
    Cybersecurity and Compliance Engineer, May Mobility
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    In this presentation, we address the critical challenge of defending electoral processes against targeted campaigns, elections and social engineering tactics. As elections increasingly become targets for cyber interference, safeguarding against these threats is paramount. We examine how campaigns and elections are targeted by malicious actors, aiming to disrupt democratic practices and sway voter sentiment.

    Through case studies and real-world examples, we illustrate the impact of social engineering on constituents, highlighting how misinformation and manipulation tactics can influence voter behavior and swing election outcomes. We also discuss strategies to prevent and mitigate these threats, including robust cybersecurity measures, public awareness campaigns, and enhanced education on recognizing and combating social engineering tactics.

    By understanding the tactics used by malicious actors and implementing proactive defenses, we can better protect the integrity of electoral processes and ensure that voters are empowered to make informed decisions. Join us as we explore practical steps to defend against targeted campaigns and safeguard the democratic process.

    3:00 pm
    Top 10 Worst Patch Management Practices
    • session level icon
    speaker photo
    Technical Product Engineer, Action1
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    Cyber Intel Briefing
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Session description to come.

    4:00 pm
    From the Inside Out: How Personal Security Drives Organizational Resilience
    • session level icon
    speaker photo
    Associate Director, Digital Intelligence, Fortalice Solutions, LLC
    speaker photo
    Partner & Chief Strategy Officer, Fortalice Solutions, LLC
    speaker photo
    First Female White House CIO, CEO of Fortalice Solutions, and 2019 Woman Cybersecurity Leader of the Year
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    In today’s digital age, email has become an essential tool for both personal and professional communication. However, the rise of sophisticated phishing attacks has made it increasingly vulnerable to exploitation. Personal Email Compromise (PEC) often serves as a gateway to Business Email Compromise (BEC), leading to significant financial losses and reputational damage.

    This session will explore strategies to safeguard your domain from these threats. Attendees will learn about the latest phishing tactics, deep fakes, best practices for identifying and avoiding malicious emails, and how to implement robust security measures to protect both personal and corporate data and executives. By the end of this session, participants will be equipped with the knowledge and tools to strengthen their defenses against PEC and BEC, ensuring the security and integrity of their digital communications.

Exhibitors
  • Action1
    Booth:

    Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works. With integrated real-time vulnerability discovery and automated remediation for both third-party software and OS, peer-to-peer patch distribution, and IT ecosystem integrations, it ensures continuous patch compliance and reduces security and ransomware risks—all while lowering costs. Action1 is certified for SOC 2/ISO 27001 and is trusted by thousands of enterprises managing millions of endpoints globally.

  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • InfraGard National Members Alliance
    Booth:

    InfraGard is a partnership between the Federal Bureau of Investigation (FBI) and members of the private sector for the protection of U.S. Critical Infrastructure. Through seamless collaboration, InfraGard connects owners and operators within critical infrastructure to the FBI, to provide education, information sharing, networking, and workshops on emerging technologies and threats. InfraGard’s vetted membership includes: business executives, entrepreneurs, lawyers, security personnel, military and government officials, IT professionals, academia and state and local law enforcement—all dedicated to contributing industry-specific insight and advancing national security.

    The InfraGard National Members Alliance, a nonprofit 501(c)3 organization, is comprised of 74 chapters across the country.

  • Fortalice Solutions LLC
    Booth:

    Fortalice is fortified security. Our goal is to make sure our clients are prepared for an attack and resilient to future threats. Established by former White House Chief Information Officer (CIO), Theresa Payton, our skilled team of industry practitioners has worked in a broad range of public and private sectors. We value collaboration and provide world-class service to our clients.

    We create personalized solutions to protect organizations and individuals. We give our clients the tools and confidence to fortify their interests and maintain a strategic advantage over adversaries. We do this through our interdisciplinary team of cybersecurity practitioners. We have assembled a team of cybersecurity experts from the disciplines of security engineering, incident response and intelligence, ethical hacking/red teaming, risk and compliance, and strategic communications.

    Fortalice Solutions is proud to be a National Certified Woman-Owned Small Business (certified through the Women’s Business Enterprise National Council (WBENC).

  • Menlo Security
    Booth:

    The Menlo Security approach delivers 100% safety via isolation — stopping the never-ending search for risky content, while delivering a seamless end-user experience. Deployed in a public or private cloud, the Menlo Security Isolation Platform reduces security complexity and increases scale by eliminating end-point software and out-dated appliances.

  • National Cybersecurity Alliance
    Booth:

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Proofpoint
    Booth:

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Rob Sloan
    VP, Cybersecurity Advocacy, Zscaler

    Rob Sloan is the Vice President of Cybersecurity Advocacy at cloud security company Zscaler. Rob began his career in cybersecurity in 2002 working for the UK government and led some of the earliest investigations into state sponsored cyber attacks before moving to a London-based security consultancy to set up and lead an incident response division, before moving to Dow Jones and The Wall Street Journal in 2014 where he was tasked with helping an executive and board-director audience better understand cyber risk.

  • speaker photo
    Arvin Verma
    Sr. Strategic Advisor & vCISO, Sentinel Technologies

    Arvin Verma is a highly motivated cybersecurity professional, with over 14 years of experience across a multitude of cyber and IT domains. He has worked in multiple industries spanning over 5 Fortune 500 companies and Big 4 consulting. He is currently a vCISO within the SMB segment.
    In addition, Arvin proudly served in the US Navy Reserves as a Cryptologic Warfare Officer. He also serves as a research fellow with the Cybersecurity Forum Initiative where he has co-authored several research papers in new cyber trends and best practices.
    Arvin holds several leadership positions with InfraGard Chicago and InfraGard National. He currently serves as the National Sector Chief for the Information Technology Sector, National Sector Security and Resilience Program of InfraGard National.

    He also serves as an advisor to several private and public entities, several startup organizations and is a guest lecturer at several universities across the State of Illinois.
    Arvin is ISC2 CISSP certified, CompTIA Security+ certified, ISO 27001 Lead Auditor certified and a CMMC Registered Practitioner.

  • speaker photo
    Kim Woodruff
    Director, Information Security Office / Deputy CISO, Rice University

    Kim Woodruff currently serves as a Director on the InfraGard National Members Alliance (INMA) Board and previously served as the Houston InfraGard Chapter President from 2018 to 2023. With over 20 years of work experience, her background includes roles in cybersecurity management and strategic consulting at Texas Children’s, MD Anderson, and several Big 4 Accounting Firms. Today, she leads cybersecurity teams as the Deputy CISO in the areas of Governance, Risk, & Compliance, Cybersecurity Operations, and Monitoring & Incident Response, focusing on building and maturing a world-class cybersecurity program at Rice University. Kim holds a Bachelor’s degree in Computer Science from the University of Houston and a Master's in Business Administration from Rice University. She is also a Certified Information System Security Professional (CISSP) and Certified Information Security Manager (CISM).

  • speaker photo
    Matt Stamper, Moderator
    CISO, Executive Advisors Group, LLC

    Matt Stamper is a multi-time CISO with extensive experience in cybersecurity, information security, cloud security, IT audit, risk management, privacy, and governance. Matt is a former research director and security analyst at Gartner (NYSE:IT) and has extensive experience in cloud services and IT service management including international experience in Latin America and China. Matt has spoken to 1000s of CISOs and CIOs as well as other corporate leaders and boards of directors throughout his career.

    Matt’s experience includes early-stage startups to large, multi-national public companies spanning multiple industries including managed services, managed security services, global telecom, and advisory. Matt excels at conveying complex cybersecurity and technology concepts to boards of directors, executive management, as well as professional service providers and vendors in the cybersecurity industry.

  • speaker photo
    Walker Newell
    VP, Litigation and Enforcement, Woodruff Sawyer
  • speaker photo
    Ryan Witt
    VP, Industry Solutions, Proofpoint

    Ryan Witt is Proofpoint's VP, Industry Solutions, and responsible for the strategy and solutions for the company's healthcare and public sector business. Ryan is also the Chair of Proofpoint's Healthcare Advisory Board and an appointed member of HIMSS Cybersecurity, Privacy and Security Committee. Previously, Ryan was the healthcare leader for Fortinet and Juniper Networks where he also was the Chair for their respective Healthcare Customer Advisory Boards. Ryan was a contributor to the 2013 WEDI Report, a former Co-Chair of WEDI's Privacy & Security Workgroup and has been elected to the WEDI Board of Directors. Ryan was also elected to the Association for Executives in Health Information Security (AEHIS) Advisory Board. A graduate of San Jose State University, Ryan has spent much of his professional life in Europe, but he and his family now live in Silicon Valley.

  • speaker photo
    Chris Montgomery
    Solutions Architect, Proofpoint

    Chris Montgomery is a Solutions Architect at Proofpoint where he is responsible for the implementation and integration of all threat intelligence and intrusion detection solutions. In this role, he can be found consulting with security practitioners and OEM suppliers focused on utilizing threat intelligence to improve cyber security situational awareness and the overall risk posture of an organization. Mr. Montgomery is a CISSP and holds several other industry certifications.

  • speaker photo
    Chirag Arora
    CISO, Dorf Nelson & Zauderer LLP

    Chirag Arora, an esteemed Cyber Security Executive Advisor and CISO at Dorf Nelson & Zauderer LLP in New York, is widely acclaimed for his outstanding contributions to the cybersecurity domain. With a distinguished career spanning more than 15 years, Mr. Arora has garnered numerous awards and accolades for his exemplary leadership and expertise in fortifying cybersecurity programs for global enterprises. His profound knowledge and research focus on Cyber Governance have positioned him as a trailblazer in the industry. Chirag's extensive experience includes conducting security gap assessments based on CIS Critical Controls, NIST CSF 2.0, and ISO 27001 frameworks, further solidifying his reputation as a cybersecurity thought leader. With an unwavering commitment to excellence, Chirag Arora continues to spearhead innovations and advancements in cybersecurity practices, ensuring the resilience and security of organizations worldwide.

  • speaker photo
    Curtis Dukes
    Executive Vice President & General Manager, Center for Internet Security
  • speaker photo
    Monsurat Ottun
    Cybersecurity Advisor (CSA), Integrated Operations Division | Region 1, CISA
  • speaker photo
    Tom Bowyer
    Director of Security and IT, Automox

    Tom Bowyer is a versatile Security Engineer who enjoys working with engineering, product, and infrastructure teams to ensure safe and efficient code lands in production. He has extensive experience deploying, securing and breaking SaaS applications on different operating systems and cloud hosting providers. Tom also enjoys building and breaking CI/CD pipelines, and automating away security work with Python.

  • speaker photo
    Eric Jacobsen
    CISO & Assistant Vice President, Boston University
  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Data Privacy & Cybersecurity, Clark Hill Law

    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.

  • speaker photo
    Sandy Taylor
    CISO, USC

    Strategic and people centric information security leader with 20+ years of experience with notable success in designing, planning, analysis, and implementation of large and complex security initiatives across federated organizations. Strength in providing comprehensive and practical security risk reduction plans and roadmaps to the business. Impactful record of efficiently evaluating and reducing / mitigating risks, protecting high value systems, and ensuring usability in lieu of high friction controls.

  • speaker photo
    Kenneth Moras
    Security GRC Lead, Plaid

    Kenneth Moras is a recognized leader in the cybersecurity Governance, Risk, and Compliance (GRC) space, with extensive experience in building GRC teams from the ground up at Plaid and scaling large GRC programs at notable organizations such as Meta and Adobe. His expertise also extends to cybersecurity consulting for Fortune 500 companies during his tenure at KPMG. He holds various certifications, including CISSP, CISA, ISO 27001 LA, CDPSE, CEH, CHFI, and CCNA. Kenneth enjoys staying up-to-date with offensive strategies used by attackers and building proactive risk management programs that serve as business enablers.

  • speaker photo
    Jordan Fischer
    CEO & Founder, Fischer Law, LLC

    Jordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.

    Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.

    With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.

    Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.

    In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.

    Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.

    Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.

    HONORS & RECOGNITIONS
    Lawyer on the Fast Track, The Legal Intelligencer (2023)
    Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
    Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
    ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
    SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
    Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
    Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
    European Union ERASMUS Grant Recipient, 2020

    ASSOCIATIONS & MEMBERSHIPS
    American Bar Association, Business Law Fellow, 2020-2022
    American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
    Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
    California Bar Association
    New Jersey Bar Association
    Forbes Business Council Member, 2022
    International Association of Privacy Professionals (IAPP), Member
    University of California, Berkeley, Cybersecurity Lecturer
    former Thomas R. Kline School of Law, Drexel University, Law Professor
    former Chestnut Hill College, Adjunct Professor
    West Chester Friends School, Board Member
    Appointed Fulbright Specialist in Cybersecurity and Data Privacy

    CERTIFICATIONS
    Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
    Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
    Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP)

  • speaker photo
    Hemanth Tadepalli
    Cybersecurity and Compliance Engineer, May Mobility

    Hemanth Tadepalli is a Cybersecurity Compliance Engineer at May Mobility, excelling in the realm of autonomous transportation services. With a rich professional background spanning roles at AlixPartners, Mandiant, Google, and SensCy, he specializes in ensuring compliance with stringent standards like ISO 27001, SOC 2, ISO/SAE 21434, and others. Hemanth co-founded MYCAP (Michigan Young Cybersecurity Analysts and Professionals), fostering budding talents in the cybersecurity domain. Appointed by the Michigan Department of State in 2022, he served on the Collegiate Advisory Task Force, determined and implemented recommendations to improve voter education and engagement among universities across the state of Michigan. The task force played an important role in election security, integrity, and combatting the result of misinformation being spread.

    Hemanth has presented at the Detroit Automotive Cybersecurity Conference and various other prominent industry events, showcasing his expertise and thought leadership. He holds a Computer Science degree with a cybersecurity concentration and minors in Pre-Law, Innovation, and Entrepreneurship from Kettering University. Currently pursuing a Master's in Cybersecurity at the University of California, Berkeley, he continues to drive innovation and excellence in the cybersecurity landscape.

  • speaker photo
    Sean Carroll
    Technical Product Engineer, Action1
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.

    With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.

    VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.

    VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.

  • speaker photo
    Julie Meunier
    Associate Director, Digital Intelligence, Fortalice Solutions, LLC
  • speaker photo
    Melissa O'Leary
    Partner & Chief Strategy Officer, Fortalice Solutions, LLC
  • speaker photo
    Theresa Payton
    First Female White House CIO, CEO of Fortalice Solutions, and 2019 Woman Cybersecurity Leader of the Year

    Payton is the cybersecurity expert that organizations turn to for discreet help during data breaches and to improve IT systems and strategies. She made history as the first female to serve as White House Chief Information Officer and currently helps organizations in both the public and private sectors protect their most valuable resources.

    Managing cybersecurity risk is what Payton knows and does best. Before overseeing IT operations as CIO for President George W. Bush and his administration, she held executive roles in banking technology for two of the country’s top financial institutions. After serving in the White House, she went on to co-found Dark3, a cybersecurity product company, and Fortalice Solutions, a world-class cybersecurity consulting firm ranked a Top 5 Most Innovative Cybersecurity Company in Northern Virginia, Maryland and Washington, D.C.

    Named one of the Top 25 Most Influential People in Security by Security Magazine, Payton was also featured in the book 100 Fascinating Women Fighting Cybercrime and honored as the 2019 Woman Cybersecurity Leader of the Year. Business Insider named her one of the top 50 Cybersecurity Leaders of 2020, CISO Magazine named her Cybersecurity Crusader of the Year in 2020, and Awards Magazine named her one of the Top 50 Women in Tech in 2021. She is the author of several publications on IT strategy and cybersecurity, including Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth, released in 2020. Cyber Security Experts named her one of the 100 Most Influential People in Cyber Security in 2021.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Learn and connect virtually

Join your InfoSec peers for high-quality training and collaboration. Sign up today!