Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, May 1, 202510:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 am[Opening Keynote] Google's Visibility into the Healthcare Cyber Threat LandscapePrincipal Analyst, Google Threat Intelligence GroupRegistration Level:Open Sessions
11:00 am - 11:45 amThis presentation will provide insight into the current cyber threat landscape affecting healthcare organizations, powered by Google’s leading visibility across a range of industries and regions. It will outline trends and operations by notable adversaries such as China and Russia, and the threat they pose to organizations, including critical enterprise deployments such as cloud platforms. It will also feature analysis of artificial intelligence (AI), and the challenges and opportunities its maturation poses to healthcare organizations. The presentation will conclude with practical guidance healthcare organizations can use to improve their cyber defenses and enterprise resiliency.
11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmBehavioral Profiling Approach to Ransomware Defense in HealthcareCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:Open Sessions
12:00 pm - 12:45 pm“Behavioral Profiling Approach to Ransomware Defense in Healthcare,” explores a critical but often overlooked dimensions of ransomware: Understanding ransomware threat actor behavior and group dynamics.
Unlike many cyberattacks, ransomware attacks actively engage victims—revealing offender behaviors and decision-making while under pressure. This talk delves into:
-Behavioral profiling of ransomware adversaries
-Group dynamics and negotiation behavior during ransomware incidents
-How cognitive biases and heuristics impact decision-making under time compression and uncertainty
-Strategies to anticipate and counter adversary tactics through behavioral scienceIn a threat landscape where ransomware attacks are becoming more tailored and manipulative, understanding the psychology of cyber attackers is no longer optional—it’s essential.
12:00 pm[Fireside Chat] Using DNS to Secure Healthcare Systems from Sophisticated CyberattacksSr. Director, Global Cybersecurity Engineering, InfobloxSr. Director, Information Security Operations / Deputy CISO, Temple University Health SystemRegistration Level:Open Sessions
12:00 pm - 12:45 pmHealthcare is under siege. In 2024 alone, the U.S. Department of Health and Human Services reported 598 major breaches due to cyberattacks—and 2025 is on track to be just as severe. The rapid expansion of connected devices—spanning traditional IT, IoT, and IoMT—has dramatically increased the attack surface, leaving healthcare organizations vulnerable to ransomware, data exfiltration, and disruptions that can impact patient care and erode public trust.
DNS is a critical yet often overlooked security control to preemptively stop cyberattacks. But what are the considerations? What does success look like? Join this fireside chat with Krishna Tangirala from Temple University Health System and Tom Grimes from Infoblox to gain insights into best practices to secure healthcare systems.
We’ll explore:
- Preemptively Thwart Threat Actors: Detect and block ransomware, phishing, and C2 communications using DNS
- Identify Compromised Devices: Identify devices and users that are the source of malicious activity to reduce Mean Time to Response (MTTR).
- Block Data Exfiltration: Prevent sensitive information from being siphoned off by cybercriminals via DNS tunneling.
- Protect Brand and Reputation: Detect and take down lookalike domains to safeguard reputation.
- See and Secure Everything, Everywhere: Comprehensive DNS-layer security to protect every device—PCs, servers, printers, healthcare IoT/OT machines, mobile devices—regardless of hardware, OS, or location.
* Reference: https://ocrportal.hhs.gov/ocr/breach/breach_report.jsf
12:00 pmFutureproof Your Healthcare Organization Against Tomorrow’s Threat LandscapeSr. Manager, Product Marketing, ProofpointVP, Industry Solutions, ProofpointRegistration Level:Open Sessions
12:00 pm - 12:45 pmThe human element is at the center of most cyberattacks, putting patients, and their personal data, at constant risk. Impersonation attacks, credential theft, and ransomware campaigns disproportionately target healthcare organizations due to the fast-paced nature of clinical work and the high value of protected health information (PHI). Your people have limited time to verify email legitimacy or other communication encounters.
Join this 45-minute live discussion with Proofpoint to explore how a human-centric cybersecurity platform can safeguard your clinicians, staff, and patients against today’s most advanced threats. You’ll gain insights from new healthcare threat intelligence research and discover practical strategies to strengthen your defenses.
We will explore:
- The prevalent cyberattacks experienced by healthcare companies
- New research on where we have observed healthcare’s Very Attacked People (VAPs)—and where to prioritize your threat prevention efforts and mitigate these risks
- How a multi-layered, adaptive email security service stops credential phishing, Business Email Compromise (BEC), ransomware, and other social engineering attacks in real time
- Best practices for deploying AI-driven email security to stop human-centric threats, prevent costly breaches, and enhance patient trust
12:00 pmAI-Enhanced SOC Operations: Real-Time Compliance and Threat ManagementSr. Information Security Engineer, Gemological Institute of AmericaRegistration Level:Open Sessions
12:00 pm - 12:45 pmSession details to come.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmHarnessing the Strengths of Neurodiversity in CybersecurityVP, Information Security, Centene CorporationRegistration Level:Open Sessions
1:00 pm - 1:45 pmNeurodiversity. What is it, what are the traits, and why are people with these traits attracted to the cybersecurity fields?
Rick Doten has managed technical cybersecurity staff for more than 25 years. He’s observed how we have special skills and abilities to perform the work we do; things like identifying patterns, spotting anomalies, learning new information quickly, troubleshooting, and being able to hyperfocus on a tasks until they’re resolved. Rick highlights how some traits help you naturally be good at some cybersecurity roles.
This has been a special interest of Rick’s for the last couple years, and he have taken dozens of hours of clinical training to become a certified clinical specialist in Autism and ADHD. He discusses topics such as executive functions, which are the cognitive skills that regulate emotions, impulse control, attention, time management and others, how to manage focus and distractions, and what motivates people.
He’ll talk about accommodating these executive functions, how to better gain motivation and focus, and even how people with neurodiversity can be better in interviews.
Rick provides techniques, tools, and even apps to help people with neurodiversity be more productive and successful. He lists apps and life hacks to help initiate tasks, manage time, working memory, and reduce procrastination.
Rick’s goal is to celebrate how it’s okay that we are different, because the cybersecurity community is a tribe of neurodivergent people who accept, support, and encourage each other.
1:00 pmHacking a Multi AI Agent System: How to Protect Patient Data in AI ApplicationsvCISO, ConfidentialRegistration Level:Open Sessions
1:00 pm - 1:45 pmIn this session, we’ll go over the code for a multi AI agent system that operates over patient data. We’ll go over what makes it insecure, demo exploits, and then take a look at how to mitigate these threats.
1:00 pmZero Trust Is a Good Start—Continuous Adaptive Trust Is the GoalField CTO, NetskopeRegistration Level:Open Sessions
1:00 pm - 1:45 pmLegacy network security models that assume a rigid perimeter and implicitly trust everything inside are vulnerable to attack. Unfortunately, this describes the state of many health care systems today. Because so many people with differing roles interact with healthcare data, zero trust principles can mitigate such vulnerabilities and bring health care systems into the modern age. However, zero trust principles are only a starting point. Ultimately, some trust must be extended or nothing happens. Context-aware continuous adaptive trust offers more flexibility than simple binary allow-or-block decisions. Context can change, so it should be continuously evaluated, which might require adapting the level of trust. By balancing trust against risk, well-secured health care systems can match the type of access to the value of protected information assets.
In this session, you’ll learn the following about zero trust strategies:
- the prerequisites and goals
- the importance of signals as a foundation
- why combining context and content is so effective
- a high-level framework for implementation
1:00 pmMapping Healthcare Risks: Medical Device Exposures TrendsDirector of International Sales, CensysSecurity Researcher, CensysRegistration Level:Open Sessions
1:00 pm - 1:45 pmThis session will provide an in-depth analysis of the current landscape of medical device exposures, leveraging insights from global scans and data trends. Attendees will explore the evolving attack surface in the healthcare sector, gain visibility into prevalent vulnerability trends, and uncover actionable strategies to enhance their cybersecurity posture. Designed for healthcare security executives, this session equips organizations to identify and prioritize exposure risks, ensuring patient safety and organizational resilience in the face of emerging threats.
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmFrom an Army of One to an Army of a Ton: Creating an Effective Security Awareness ProgramAssociate CISO, St. Luke's University Health NetworkRegistration Level:Open Sessions
2:00 pm - 2:45 pmThe human element of security is one of the most difficult to predictand therefore to secure. Additionally, one of our biggest challenges is building a security awareness program for those who may have never been subjected to one by understanding the aversion to buying into the security program. We have great written resources and guidance from things like NIST 800-53, but it’s much more challenging to overcome the sociological elements of the human factor that prevent success of security-aware cultures, such as aversion to technology, fear, uncertainty, doubt, and simply non-malicious human error. As security professionals, we may lose sight of the fact that the professionals we support also have other jobs. So learning and focusing on security controls can be stressful and daunting.
Incorporating change management methodologies rooted in the psychology of human behavior, such as ADKAR (Awareness, Desire, Knowledge, Ability, and Reinforcement), can assist us as security professionals in facilitating more impactful cultural change through understanding why employees we support act and react the way they do and what other environmental or social factors may influence their decision-making and thought processes. It can also help us gain buy-in from our leadership, nudging from the bottom up, while leading by example from the top down.
The ADKAR change model has been proven to help individuals understand and accept change so companies can successfully innovate and become more efficient. As security professionals, we have to be conscious that security program costs contribute to the rising costs of healthcare, goods, and services. And we often have to find unique and strategic ways to ingrain ownership of security functions within other departments to augment our limited resources. Building a security ambassador program using these change facilitation concepts will help drive cost-effective ownership of the security program throughout the entire organization, creating a deeper business resilience, reducing risk, and truly leading by example—proving we are stronger together.
2:00 pmSecure and Explainable AI in HealthcareCIO & CTO, Lightning StepRegistration Level:Open Sessions
2:00 pm - 2:45 pmHealthcare technology organizations are quickly adopting AI solutions to enhance clinical processes, patient engagement, and operational efficiency. Technology and cybersecurity leaders must embrace the challenge of securing AI solutions while maintaining ethical integrity and regulatory compliance. This session offers a step-by-step blueprint for designing, deploying, and sustaining AI systems in a secure, ethical, explainable, and compliant manner. Drawing on case studies, you will learn about proven strategies for integrating cybersecurity, privacy, and regulatory controls for ethical and explainable implementation of AI solutions in the healthcare industry.
2:00 pmDefend and Recover: How MHXDR Shields Healthcare from Its Most Visible ThreatsCo-Founder, Blackwell SecurityRegistration Level:Open Sessions
2:00 pm - 2:45 pmHealthcare is under siege—not only from ransomware, but from the systemic complexity that undermines fast, effective cyber defense. Traditional detection tools leave healthcare systems blind to gaps, siloed in response, and slow to adapt. It’s time for a shift. Join Blackwell Security for a strategic dive into Healthcare-Specific XDR (MHXDR) and how tailored threat operations create speed, precision, and resilience in the face of relentless threats.
This session will explore how our Helix threat operations team and Blackwell Pulse platform work together to unify telemetry, automate triage, and leverage both internal and external threat intelligence—including dark web monitoring—for real-time enrichment and contextual response. We’ll walk through how our Managed Detection & Response (MDR) offering ensures that every alert is relevant, every response is decisive, and every client benefits from collective intelligence. More importantly, we’ll cover how our ransomware resilience layer (Blackwell Aegis) enables near-immediate recovery from attacks that evade traditional EDR, with automated isolation, recovery, and response—because in healthcare, delays cost lives.
Whether you’re a CISO or security architect, this session will offer a pragmatic view of how to prevent what you can, respond faster when it counts, and recover without the chaos.
2:00 pm[Panel] The Current Threat Landscape in HealthcarePrivacy Officer & Director of Privacy Management, CHG HealthcareFinancial Fraud Investigator, ConfidentialGlobal Principal Solutions Architect - Cyber Intelligence & Risk, Google CloudDirector, Cyber Protection, AcronisRegistration Level:Open Sessions
2:00 pm - 2:45 pmJoin us as we dive into several of the top concerns in Healthcare. From deep web cards to BECs, ransomware, and more! Bring your questions for the panel.
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmHIPAA's Digital Evolution: Understanding the 2024 Security Rule OverhaulPartner - Data Protection, Privacy & Security Group, K&L GatesvCISO, Cyber Risk Opportunities LLCRegistration Level:Open Sessions
3:00 pm - 3:45 pmThe healthcare industry stands at the threshold of its most significant cybersecurity transformation in over a decade with the December 2024 HIPAA Security Rule update. This presentation unpacks the sweeping changes proposed in the Office of Civil Rights’ 330+ page Notice of Proposed Rulemaking, highlighting how these modifications will reshape healthcare cybersecurity practices.
At its core, the update eliminates the ambiguous “addressable” implementation specifications that have long allowed healthcare organizations to sidestep crucial security measures. The new rule mandates specific security controls including bi-annual vulnerability scanning, annual penetration testing, encryption requirements, multi-factor authentication, and network segmentation.
We’ll explore how these changes reflect the evolution from paper-based records to today’s digital healthcare ecosystem, and why traditional compliance approaches will no longer suffice. The presentation will detail practical implications for healthcare organizations, including new documentation requirements, specific timeframes for access management, and enhanced backup and contingency planning protocols.
Whether you’re a healthcare administrator, IT professional, or compliance officer, understanding these forthcoming requirements is crucial for maintaining HIPAA compliance and protecting patient data in an increasingly complex threat landscape.
3:00 pm[Panel] Challenges in Healthcare LeadershipAVP of IT & CISO, University of Health Sciences and Pharmacy in St. LouisVice President, Security, Net HealthVP, CISO, Associate CIO, Children's Hospital of PhiladelphiaRegistration Level:Open Sessions
3:00 pm - 3:45 pmHealthcare information security leadership faces a dynamic and intensifying threat landscape. This panel of experts will address critical challenges, including escalating ransomware attacks, stringent privacy regulations, and the complexities of managing insider threats. Discussions will explore strategies for mitigating risks associated with third-party vendors, addressing staffing shortages in cybersecurity, and finding downtime to recharge. Panelists will share insights on balancing patient safety with data protection, navigating compliance requirements, and building resilient security programs in an increasingly interconnected healthcare environment.
3:00 pmCyber Intel Briefing: HealthcareCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pm[Closing Keynote] Cyber-Resilient Remote Access for Healthcare WorkersDirector, Cyber Protection, AcronisRegistration Level:Open Sessions
4:00 pm - 4:45 pmHow to get remote healthcare workers back online from any outage in minutes. Healthcare is under assault from ransomware and other AI-enhanced threats. Healthcare IT leaders especially struggle to get large populations of remote workers back online in the wake of a cyberattack or other downtime event. A slow recovery of the remote workforce can expose your institution to crippling revenue losses, compliance penalties, and loss of productivity. How valuable would it be to empower your remote workers to get themselves back online after a cyberattack or other outage, without IT intervention, in a matter of minutes?
That kind of cyber resilience is exactly what leading healthcare institutions are deploying for their remote workers: the ability for any employee to restore their computer from a ransomware attack or other outage with push-button simplicity in a few minutes.
In this session, we will:
- Examine the range of cyberthreats confronting the healthcare industry, including new AI-enhanced ransomware attacks
- Provide a practical, real-time demonstration of how Acronis Cyber Protect enables One-Click Recovery for remote healthcare workers, enabling them to recover their own computers from any outage in a matter of minutes without IT intervention
- Examine how Acronis can provide additional cyber resilience across your institution with EDR, Active Protection against ransomware, HIPAA-compliant disaster recovery and more
Cybercriminals understand the life-and-death pressures on healthcare organizations to protect uptime and sensitive data, which makes the industry one of their favorite ransomware targets. Generative AI tools like ChatGPT are further improving the ingenuity and scale of these attacks. The probability of a successful ransomware or other cyberattack against your institution is only going up. Get ahead of this threat today by strengthening the cyber resilience of your remote workforce.
Join this session to learn how you can enable remote healthcare workers to quickly, reliably and simply restore their computers in minutes after any outage.
- AcronisBooth: n/a
Acronis unifies data protection and cybersecurity, delivering cyber protection that solves safety, accessibility, privacy, authenticity, and security (SAPAS) challenges.
Acronis offers antivirus, backup, disaster recovery, endpoint protection management solutions, and award-winning AI-based antimalware and blockchain-based data authentication technologies through service provider and IT professional deployment models. These solutions protect data, applications, and systems in any environment.
- Blackwell SecurityBooth: n/a
Blackwell Security offers managed security operations for healthcare organizations to deliver complete protection and rapid response. The company aids in enhancing an organization’s cybersecurity maturity by providing specialized guidance to streamline and bolster its security practices, address gaps in its cyber compliance posture, and proactively facilitate improvements across its program.
- CensysBooth: n/a
Censys is the one place to understand everything on the internet. We have built and operate the world’s largest internet scanning infrastructure and we empower organizations, individuals and security researchers by providing unparalleled visibility into the global internet landscape. We see more of the internet than anyone else, which gives us the most comprehensive internet visibility in the world. Our two main use cases are attack surface management and threat hunting with so many more on the horizon. Through our comprehensive internet data, we strive to enhance cybersecurity, facilitate data-driven decision-making, and reduce internet exposures for commercial and government organizations across the globe.
- Google CloudBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- InfobloxBooth: n/a
Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.
- NetskopeBooth: n/a
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.
- ProofpointBooth: n/a
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- Jason MillsPrincipal Analyst, Google Threat Intelligence Group
Jason Mills is a Principal Analyst at the Google Threat Intelligence Group where he addresses customer intelligence needs with customized analysis. Jason has over a decade of experience in international security industry. He also holds a CISSP certificate.
- Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.). - Krishna TangiralaSr. Director, Information Security Operations / Deputy CISO, Temple University Health System
- Ryan WittVP, Industry Solutions, Proofpoint
Ryan Witt is Proofpoint's VP, Industry Solutions, and responsible for the strategy and solutions for the company's healthcare and public sector business. Ryan is also the Chair of Proofpoint's Healthcare Advisory Board and an appointed member of HIMSS Cybersecurity, Privacy and Security Committee. Previously, Ryan was the healthcare leader for Fortinet and Juniper Networks where he also was the Chair for their respective Healthcare Customer Advisory Boards. Ryan was a contributor to the 2013 WEDI Report, a former Co-Chair of WEDI's Privacy & Security Workgroup and has been elected to the WEDI Board of Directors. Ryan was also elected to the Association for Executives in Health Information Security (AEHIS) Advisory Board. A graduate of San Jose State University, Ryan has spent much of his professional life in Europe, but he and his family now live in Silicon Valley.
- Nikhileswar Reddy MarapuSr. Information Security Engineer, Gemological Institute of America
Nikhileswar Reddy Marapu is a seasoned cybersecurity professional with nine years of hands-on experience in incident response and security engineering. A certified CISSP and CEH, he is recognized for expertise in threat hunting and proactive defense strategies. Nikhileswar's passion for cybersecurity and proven track record makes him a trusted leader in the field, dedicated to safeguarding organizations against evolving digital threats.
- Rick DotenVP, Information Security, Centene Corporation
Rick is VP of Information Security at Centene Corporation and CISO of the Medicaid healthplan based in Charlotte, NC.
In his prior role, Rick worked as Virtual CISO supporting international companies. During that time Rick educated corporate boards, developed and matured security programs, and created the curriculum for a Cybersecurity Master’s degree program for an International University.
Rick is a frequent speaker at cybersecurity conferences such as RSA, Secureworld, Bsides, and FutureCon, and guest on numerous cybersecurity podcasts, including The CyberWire Hashtable, CISO Series, Google Cloud, Elevate Your Career, and The Rsnake Show. Rick talks about topics ranging from cybersecurity and risk, to neurodiversity, leadership, and staffing.
He on the Cloud Security Alliance (CSA) CXO Trust Advisory Council, and the Boards of his local Charlotte ISC2 and CSA Chapters. He works with several Venture Capital and go-to-market firms reviewing security technology, as well as on the Board of Advisors for several startups.
Rick is on the CIS Critical Security Controls editorial panel and was a lead author on Version 8 of the Controls. He was also on the committee to update Cloud Security Alliance CCSK v5 study guide. Rick has a Cybersecurity YouTube channel where he has videos on the 18 CIS CSC v8 Controls, and other videos on cybersecurity topics.
Rick has alternated between being a cybersecurity management consultant and CISO throughout his 27+ year cybersecurity career, and has led ethical hacking, incident response and forensics, and risk management teams.
- Allie HowevCISO, Confidential
Allie is a vCISO that helps AI startups with SOC2 compliance and AI security. She has a software engineering background, a Masters in Cybersecurity, and is on the OWASP working group for Agentic AI.
- Celestine JahrenDirector of International Sales, Censys
Celestine Jahren is the Director of International Sales at Censys—the internet intelligence platform. Censys empowers governments, enterprises, and researchers with the most comprehensive, accurate, and up-to-date map of the internet to defend attack surfaces and hunt for threats. With a background in identify and access management and attack surface management, Celestine’s insights will focus on emerging threats, CVE trends, Zero Days, and how organizations can protect themselves.
- Himaja MotheramSecurity Researcher, Censys
Himaja Motheram is a security researcher at Censys, specializing in topics around Internet measurement, web entities, and tracking the Internet's response to major vulnerabilities using Censys' global Internet Map data.
- Krista ArndtAssociate CISO, St. Luke's University Health Network
Krista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.
Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.
When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.
- Dr. Martin IgnatovskiCIO & CTO, Lightning Step
Dr. Martin Ignatovski is a recognized leader in AI, technology, cybersecurity, and healthcare. With extensive experience guiding organizations, he focuses on implementing ethical, secure, and explainable solutions, safeguarding data, and driving innovation. He shapes industry best practices through his vast experience, speaking engagements, and research.
- Heather AllenPrivacy Officer & Director of Privacy Management, CHG Healthcare
Heather Allen is a distinguished privacy and compliance leader who has built comprehensive privacy programs from the ground up in the healthcare sector. At 1-800 Contacts, she architected and implemented the organization’s first comprehensive privacy and compliance program, establishing HIPAA compliance while supporting business growth. She is currently serving as the Privacy Officer & Director of Privacy at CHG Healthcare where Heather set the strategic tone in building and implementing the privacy program and integrating privacy-by design methodologies for product development, pioneered vendor risk management for 200+ third parties, and established governance structures that balance regulatory requirements with business objectives. Heather holds multiple prestigious certifications including CIPP/US, CIPM, FIP, CHPC, and CDPSE, and earned her MBA in Healthcare Administration from Western Governor’s University.
- Stephen DoughertyFinancial Fraud Investigator, Confidential
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Ryan RoobianGlobal Principal Solutions Architect - Cyber Intelligence & Risk, Google Cloud
- James SlabyDirector, Cyber Protection, Acronis
James R. Slaby is the Director of Cyber Protection at Acronis. Previously, James was an industry analyst covering cybersecurity, cloud computing, and networking at Forrester Research, HFS Research, Yankee Group, and The Info Pro. He has also held solutions, vertical, product, and campaign marketing roles at tech security and networking vendors including Sonus, Acme Packet, Bay Networks, and Motorola.
- Jake Bernstein, Esq.Partner - Data Protection, Privacy & Security Group, K&L Gates
Jake Bernstein is a practicing attorney and CISSP who counsels clients trying to understand their cybersecurity risks and the legal duties that arise from those risks. In his decade-plus of practice, Jake has acted as both regulator as an Assistant Attorney General with the Washington State Attorney General's Office and as private defense counsel representing companies subject to data security and privacy regulations enforced by federal, state, and international authorities.
- Kip BoylevCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Zachary LewisAVP of IT & CISO, University of Health Sciences and Pharmacy in St. Louis
Zach is a seasoned IT executive with a distinguished career spanning strategic IT management, cybersecurity, risk mitigation, and budget oversight. As the AVP IT and CISO for a private higher education institution, Zach has orchestrated transformative initiatives that have fortified the institution's cybersecurity landscape while driving strategic growth. His leadership in negotiating vendor contracts, managing multi-million-dollar budgets, and chairing the Enterprise Risk Management Committee has resulted in substantial cost savings and operational efficiencies.
With a focus on aligning IT strategies with organizational goals, Zach has led successful cloud migrations, implemented robust cybersecurity measures, and established a culture of transparency and collaboration. His expertise extends to compliance with GLBA and FERPA regulations, managing cybersecurity training programs, and optimizing network infrastructure. Zach's passion for innovation, user-centric approach, and ability to build cross-functional teams have been instrumental in driving organizational success, enhancing cybersecurity defenses, and positioning the institution as a leader in health education and operational excellence.
Zach is a 2X recipient of Cyber Defense Magazine’s Top Global CISOs, was named 40 Under 40 Security Leaders by CDO Magazine, and was St. Louis Non-Profit CISO of the Year. He’s a recent graduate of the FBI CISO Academy. Zach provides his industry expertise to others by speaking at conferences, webinars, and universities throughout the country.
- Keavy MurphyVice President, Security, Net Health
Keavy Murphy is a Boston-based security professional currently serving as the Vice President of Security at Net Health. Passionate about cybersecurity, especially for new and emerging companies, she prioritizes using soft skills to manage compliance and risk management effectively in parallel with business objectives. Previously, she served in information security roles at Starburst Data, Cambridge Mobile Telematics, Alegeus and State Street. She enjoys writing about and researching the benefits of effective communication within the security space. Her work has been published in Dark Reading and Info Security Magazine and presented at seminars including the Chief Data and Analytics Officers Conference and FutureCon. She is an active volunteer with Boston Cares, has served in the ISACA Engage Mentor program, and holds both CIPP and CIPM certifications.
- Monique St. JohnVP, CISO, Associate CIO, Children's Hospital of Philadelphia
Monique St. John is the Chief Information Security Officer (CISO) and Associate Chief Information Officer (ACIO) at the Children’s Hospital of Philadelphia (CHOP). In this role, Monique supports the organization’s mission and strategic plan with responsibility for the enterprise Information Security program. With over 25 years of experience in technology, security, and service delivery, Monique relies on a collaborative leadership approach to ensure solutions protect CHOP, provide value, and enable the business. She is a trusted advisor, partners with colleagues to manage risk, and strives to balance security with technology innovation.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.
With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.
VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.
VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.
- James SlabyDirector, Cyber Protection, Acronis
James R. Slaby is the Director of Cyber Protection at Acronis. Previously, James was an industry analyst covering cybersecurity, cloud computing, and networking at Forrester Research, HFS Research, Yankee Group, and The Info Pro. He has also held solutions, vertical, product, and campaign marketing roles at tech security and networking vendors including Sonus, Acme Packet, Bay Networks, and Motorola.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hear from cybersecurity leaders on strategies and best practices for defending healthcare.
