Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, February 25, 202610:30 amNetworking Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
11:00 am[Opening Keynote] Securing Autonomous Agents: The New Trust Frontier in HealthcareFocus Areas: Risk Management, Shadow IT, Shadow AI, Logic hijacking, GovernanceCloud Security Architect, Google CloudCloud AI Security Architect, Google CloudRegistration Level:
Open Sessions
11:00 am - 11:45 amThe healthcare and life science industry is transitioning from simple chatbots to Agentic AI—autonomous systems that take action. This shift introduces a systemic vulnerability: the “Agentic Gap.”
This session explores the evolution from data theft to logic hijacking. We examine how threat actors target “Shadow Agents” within workflows using indirect prompt injection to manipulate AI decision-making. In this era, attackers may not “hack” systems but rather “convince” agents to bypass instructions.
We provide strategic guidance for governing agents and establishing rules of engagement. Attendees will gain a holistic approach to securing autonomous tools, ensuring patient safety as teams are empowered by AI.
Learning Objectives:
- Distinguish “Shadow AI” from “Shadow Agents” to identify risks in autonomous workflows
- Assess logic hijacking and prompt injection for better AI risk evaluation
- Build a governance architecture to secure data and patient safety
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmWhat to Expect Post Incident from HHS OCRFocus Areas: Incident Response / SIEM; Privacy; Ransomware; MalwareCybersecurity and Privacy Attorney, Clark Hill PLCRegistration Level:
Open Sessions
12:00 pm - 12:45 pmMost healthcare entities have to report incidents that impact Protected Health Information to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR). What does the initial reporting look like? What comes next? Will HHS OCR have follow-up questions or audit our cybersecurity practices? If so, what will they look for? How do we survive these audits? What are the likely and potential penalties?
12:00 pmBeyond the Link: A Deep Dive into Telegram’s Shadow EconomyFocus Areas: Digital Forensics, Crypto Crime, Cyber Investigation, TelegramNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceRegistration Level:
Open Sessions
12:00 pm - 12:45 pmIn the modern threat landscape, a single malicious link is often just the entryway into a sophisticated, multi-layered financial ecosystem. For investigators, the trail doesn’t end at the malware execution; it leads into the increasingly complex world of encrypted messaging platforms that function as their own parallel networks.
This session provides a “play-by-play” forensic breakdown of a live cryptocurrency scam investigation. Led by a Network Intrusion Forensics Analyst from the U.S. Secret Service, we will deconstruct the anatomy of an attack from the initial infection vector to the final laundering stages.
Attendees will gain insight into:
- The Initial Pivot: How forensic artifacts from malware lead investigators directly into the heart of Telegram-based command and control structures.
- The Telegram Infrastructure: An exploration of the app’s evolution into a decentralized ecosystem, featuring its own internal currency and parallel network capabilities.
- The Crypto Lifecycle: How scammers leverage decentralized finance (DeFi) to move and obfuscate illicit funds.
- Investigative Methodology: Real-world techniques used by federal analysts to map out global scam networks operating within “untraceable” apps.
Join us for a deep dive into the digital underground, where we strip away the layers of encryption to reveal the machinery of modern financial crime.
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:00 pmLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmHealthcare's Data War Has BegunFocus Areas: Healthcare Security, Cloud Security, Artificial Intelligence, Data Governance, Leadership & StrategyCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Registration Level:
Open Sessions
1:00 pm - 1:45 pmHealthcare is living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how patient care is delivered and how Protected Health Information (PHI) is managed. In this new era, your most valuable asset—patient trust and data—is under constant threat, not just from cybercriminals targeting hospitals, but from the rapid digitization of your own clinical infrastructure.
In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots healthcare organizations face as they race to adopt clinical AI and migrate to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional hospital defenses, how AI is both a weapon against privacy and a shield for defense, and why the cloud isn’t inherently secure for medical data—unless you make it so.Whether you’re a CEO, CISO, or healthcare leader, this session will empower you with actionable frameworks to:-
Understand how AI and cloud reshape the cyber threat landscape for providers and payers.
-
Identify PHI exposure risks that live outside your control—and how to reclaim data sovereignty.
-
Shift from a perimeter model to identity- and data-centric security to protect connected care environments.
-
Build an AI-aware security posture that accelerates—not blocks—digital health innovation.
-
Win the new war for data ownership, visibility, and control in a highly regulated industry.
The convergence is already here. The question is, are you leading with confidence, or leaving your patient data on life support?1:00 pmPick Your Poison: The Healthcare Leadership Face-OffFocus Areas: Healthcare Security, Leadership & Strategy, Risk Management, Incident Response, IoT / Medical Device SecurityCISO, AdvarraCISO, Cambridge Health AllianceDeputy CISO, Collective HealthProfessor, University of DenverDigital Event Director, SecureWorldRegistration Level:
Open Sessions
1:00 pm - 1:45 pmIn the high-stakes world of healthcare cybersecurity, there are rarely perfect solutions—only difficult trade-offs. Join us for an unscripted, high-energy session where top Health Sector leaders face off on the industry’s toughest hypothetical scenarios.
Moderated in a rapid-fire game show format, our panelists will be presented with difficult “Would You Rather” choices ranging from ransomware dilemmas and legacy IoT risks to budget constraints and insider threats. They won’t just pick a side; they have to defend it.
Attendees will gain a unique window into the minds of security leaders, understanding how they weigh patient safety against data privacy, and operational uptime against regulatory compliance. Come ready to vote on who makes the best case for the worst situations.1:00 pmSpeaking the Language of Risk: Bridging the CISO-CFO DividevCISO, Cyber Risk Opportunities LLCFormer CFO; Founder of kept.proRegistration Level:
Open Sessions
1:00 pm - 1:45 pmFor years, the relationship between security leadership and finance has been defined by a fundamental “language barrier.” While the CISO talks in vulnerabilities and threat vectors, the CFO thinks in terms of ROI, capital allocation, and fiscal resilience. This session moves beyond the myth that “security is too expensive” to address the real issue: a lack of shared vocabulary. Join a veteran vCISO and a seasoned CFO for a candid conversation on how to align technical requirements with business objectives. Attendees will learn how to transform security metrics into financial risk data that commands boardroom respect and secures long-term investment. The problem isn’t the budget; it’s the dictionary.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmYour Weakest Link: Saying Goodbye to Vendor-Induced ChaosFocus Areas: PHI; Third-Party Risk; Vendor Management; Data BreachAssociate, Baker & Hostetler LLPRegistration Level:
Open Sessions
2:00 pm - 2:45 pmHealthcare continues to lead all sectors in third‑party data breaches, with large‑scale events like the Change Healthcare incident underscoring how deeply vendor failures can disrupt operations and expose PHI. In today’s increasingly interconnected world, third‑party incidents pose significant operational, security, and compliance risks.For InfoSec teams, this means incident readiness must extend beyond your own network. Proactive vendor‑risk management is critical: risk‑based vendor tiering, rigorous pre‑engagement security assessments, stronger BAA and contract terms, continuous monitoring of vendor controls, and routine reassessment of high‑risk partners. With regulators increasing scrutiny of vendor oversight and response timelines, organizations must also ensure alignment with evolving regulatory expectations.This session will give IT and security professionals a streamlined view of today’s third‑party threat landscape, practical guidance for managing and responding to vendor incidents, and actionable steps to build a more resilient vendor‑risk program before the next outage, breach, or supply‑chain event hits.2:00 pmHealthcare Cyber DebriefFocus Areas: Healthcare Security, Geopolitics & Cyber Warfare, Critical Infrastructure, Nation-State Threats, Operational ResilienceCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:
Open Sessions
2:00 pm - 2:45 pmHealthcare is no longer on the sidelines of global conflict; it is a primary target. This session connects the dots between global geopolitical volatility and the immediate risks to hospital operations and patient safety. We will examine how conflicts involving major players like Russia, China, and the EU are reshaping the cyber threat landscape, specifically targeting medical research, critical infrastructure, and the healthcare supply chain.
The discussion will pivot to the “internal” threat, analyzing the rapid evolution of AI in diagnostics and administration, and the resulting privacy minefield. From financially motivated ransomware gangs to state-aligned actors seeking to disrupt care, we will profile the adversaries threatening the sector. Join us for a 2026 outlook that moves beyond compliance, offering a battle-tested framework for maintaining resilience in the face of global instability.
2:00 pm[Panel] Threat Landscape: Defeating BEC, Ransomware, and Supply Chain Chaos in HealthcareDeputy Chief Analyst, Google Threat Intelligence GroupDirector, Cybersecurity Solution and Industry Marketing, Ping IdentityRegistration Level:
Open Sessions
2:00 pm - 2:45 pmFor today’s healthcare organizations, “security” is no longer about preventing a breach—it’s about ensuring clinical continuity. Business Email Compromise (BEC) and Ransomware have become industrialized, targeting the interconnected web of vendors and cloud services that hospitals rely on every day.
This session provides a pragmatic blueprint for securing the modern healthcare ecosystem against its most frequent attackers. We will move past the hype of “black swan” events to look at high-probability solutions for hardening the human element against BEC, exposing the “East-West” lateral movement used by ransomware, and leveraging cloud-native infrastructure for rapid recovery. Attendees will learn how to build a defense-in-depth strategy that ensures when the network is under fire, patient care doesn’t stop.
2:45 pmNetworking BreakRegistration Level:
Open Sessions
2:45 pm - 3:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmInside the Digital Mind: How Cyberpsychology Shapes Behavior, Risk, and the Cyber LandscapeFocus Areas: Social Engineering, Security Awareness & Culture, Human-Centric Security, Cyber Psychology, Risk ManagementAssociate CISO, St. Luke's University Health NetworkRegistration Level:
Open Sessions
3:00 pm - 3:45 pmThis session explores how human behavior in digital environments directly shapes modern cyber risk. Drawing from the research of forensic cyberpsychologist and author Mary Aiken, this talk reveals why people think, react, trust, click, overshare, and make decisions differently online — and how attackers exploit those predictable patterns. Participants will learn how digital psychology influences threat exposure, identity compromise, misinformation, social engineering, and organizational security culture. Attendees will walk away with practical, human-centered strategies for building safer digital environments and strengthening security programs by aligning controls with real human behavior.
3:00 pmResilience Is Not a Backup Plan: Designing Secure Health Systems That Can Adapt Under FireFocus Areas: Cyber Governance, Healthcare IT, Risk Management, Digital Transformation, Safety CultureCDO & CDTO | Board Member & Advisor | PodcasterRegistration Level:
Open Sessions
3:00 pm - 3:45 pmHealthcare organizations don’t fail because of cyber incidents — they fail when systems are brittle, fragmented, and unable to adapt under stress. This talk explores resilience as a design principle across people, technology, and governance, connecting cybersecurity decisions directly to patient safety and care continuity. Drawing on real healthcare leadership experiences, we’ll examine why resilience cannot be delegated to IT — and what leaders must do differently to build systems that bend instead of break.
3:00 pmAuthenticity, Uniqueness, and Credibility: Securing Healthcare Identity in the Age of AIEngineering Manager, LinkedInRegistration Level:
Open Sessions
3:00 pm - 3:45 pmAs Generative AI accelerates synthetic data creation, the healthcare sector faces critical risks in telemedicine fraud and provider impersonation. In this session, I will introduce the AUC Framework—a practical model for designing trust signals in identity systems. Drawing from large-scale infrastructure experience at LinkedIn and Oracle Health Sciences, we will explore leveraging metadata, cryptographic provenance, and AI-based verification to distinguish legitimate providers from synthetic actors. Attendees will gain architectural strategies to preserve trust and compliance within an increasingly AI-mediated healthcare ecosystem.
3:45 pmNetworking BreakRegistration Level:
Open Sessions
3:45 pm - 4:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pm[Closing Keynote] Critical Condition: The Health-ISAC Global Threat ReportFocus Areas: Healthcare Security; Cyber Threat Intelligence; Supply Chain Security; Patient Safety; Operational ResilienceStrategic Threat Analyst, Health-ISACRegistration Level:
Open Sessions
4:00 pm - 4:45 pmHealthcare is no longer just a target for data theft; it is a battleground for patient safety and operational resilience. In this exclusive session, the Health-ISAC (Health Information Sharing and Analysis Center) unpacks their Annual Global Threat Report, revealing the most dangerous trends facing the sector today. From the evolution of extortion tactics and supply chain vulnerabilities to the weaponization of AI, we will dissect the adversaries’ new playbook. Join us to move beyond the headlines and get the vital intelligence needed to immunize your digital estate against the next generation of cyber threats.
- Google Cloud SecurityBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- Health-ISACBooth: n/a
Health-ISAC (Health Information Sharing and Analysis Center) plays an essential role providing situational awareness around cyber and physical security threats to the Health Sector so that companies can detect, mitigate, and respond to ensure operational resilience.
The non-profit, private sector organization connects thousands of health security professionals globally to share peer insights, real-time alerts, and best practices in a trusted, collaborative environment.
As the go-to source for timely, actionable, and relevant information, Health-ISAC is a force-multiplier that enables global health organizations of all sizes to enhance situation awareness, develop effective mitigation strategies, and proactively defend against threats every single day.
- Ping IdentityBooth: n/a
Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.
Daniel GremaudCloud Security Architect, Google CloudAs a Google Cloud Security Architect, Daniel is a trusted advisor to HCLS customers and partners. Before Google, Daniel was a consultant at PricewaterhouseCoopers in their Cyber, Privacy and Forensics Practice. He is on the Board of Advisors to the University of Alabama Management Information Systems Department, serving the faculty and students brings him great joy. His goal is to not only secure his customer’s Google Cloud workloads, but also work to secure the entire sector.
Aleksandra SavicCloud AI Security Architect, Google CloudAleksandra blends security expertise, sales knowledge, and consultative skills to help companies establish and demonstrate cloud security. Aleksandra has a passion for learning new technologies and a commitment to customer service. She has contributed to the design and implementation of Bridgecrew's products, a leading security as code platform that was acquired by Palo Alto Networks. She has also supported and empowered customers and partners in various cloud computing environments, such as AWS, Azure, and GCP, with a focus on security, privacy, and regulatory compliance. Aleks is a public advocate of Google Cloud and cloud computing, and has participated in conferences, industry training, and related events.
Richard HalmCybersecurity and Privacy Attorney, Clark Hill PLCRick Halm guides clients in preparing for, responding to, recovering, and learning from cybersecurity and privacy incidents. Rick's breadth of experience within the incident response landscape—from leading incident response at the cyber insurance level, to experience at one of the nation’s largest health insurers, to his time in private practice—all blend together to allow him to approach cybersecurity and privacy incidents from a unique vantage point. As a U.S. Army veteran, he blends this vantage point with an ability to bring order and calm to complex and high-stress incidents.
Jared LobatoNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceWith a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification. Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.
Dr. Eric Cole, DPSCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Esmond KaneCISO, AdvarraEsmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.
Astrid LambertCISO, Cambridge Health AllianceAstrid Lambert is a seasoned leader with expertise in information security, healthcare analytics, database administration, and website development. Known for her forward-thinking leadership and innovative approach, she currently serves as CISO/Senior Director in the IT department at Cambridge Health Alliance, where she oversees strategic initiatives critical to the organization's success.
Astrid's expertise has enabled Cambridge Health Alliance to make data-driven decisions, driving efficiency and improvements across multiple domains. A strong advocate for information security, she implements robust measures to protect sensitive healthcare data and ensure compliance with regulatory standards. She holds degrees in Industrial-Organizational Psychology and Industrial Engineering and is a Certified Information Systems Security Professional (CISSP).
Beyond her professional accomplishments, Astrid is committed to making a positive impact on the broader healthcare community. She volunteers her time and expertise with various organizations, sharing her knowledge and helping others develop creative solutions to complex challenges.
Arpine LongDeputy CISO, Collective Health
Richard StayningsProfessor, University of DenverRichard Staynings is a globally renowned thought leader, author, public speaker, and advocate for improved cybersecurity across the Healthcare and Life Sciences industry. He has served on various industry and international cybersecurity committees and presented or lectured on cybersecurity themes or concerns all over the world. He has advised numerous government and industry leaders on their healthcare security strategy and defensive posture and has served as a subject matter expert on government Committees of Inquiry into some of the highest profile healthcare breaches.
Richard is currently Chief Security Strategist for Cylera, a pioneer in the space of medical device and HIoT security. He is also author of Cyber Thoughts, a leading healthcare cybersecurity blog, teaches postgraduate courses in cybersecurity, health informatics and healthcare management at the University of Denver University College, and is a retained advisor to a number of governments and private companies.
A recovering CISO, with more than 25 years’ experience of both cybersecurity leadership and client consulting in healthcare, Richard has lived in over 30 countries and delivered innovative solutions to organizations in all of them. When he’s not on a plane or speaking at an event, he can usually be found in the Rocky Mountains of Colorado, USA
Some of his more notable successes include work for: Amgen, Cisco, CSC (now DxC), PricewaterhouseCoopers, Intel, Microsoft, Zurich Financial, and a long list of hospital and health systems.
Tom Bechtold, ModeratorDigital Event Director, SecureWorldTom has been part of the SecureWorld team for more than 14 years, having launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the "Remote Sessions" webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.
Kip BoylevCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
James WheelerFormer CFO; Founder of kept.proJames Wheeler is a fractional CFO and the founder of kept.pro, which provides an outsourced accounting department model for growing companies with $2M–$50M in annual revenue. He brings 15+ years of executive finance leadership across services and technology businesses and was twice a finalist for the San Diego Business Journal’s CFO of the Year. James holds a BA in Economics and an MBA from UC San Diego, completed executive education at MIT Sloan, and has served on nonprofit and for-profit boards.
Stefanie FerrariAssociate, Baker & Hostetler LLPA member of the Healthcare Privacy and Compliance team, Stefanie Ferrari is consistently called on as a key team member when complex HIPAA issues arise. Stefanie works closely with clients across the healthcare industry on responding to cybersecurity and data privacy incidents, regulatory defense and state and federal privacy compliance. Her hands-on approach recognizes the importance of prioritizing patient care and dealing with the unique challenges healthcare providers face. When a breach occurs, Stefanie guides clients through the initial response and investigation, while helping to ensure their regulatory obligations are met. Stefanie also has significant experience in dealing with vendor-related breaches and appreciates the nuances that arise on both the healthcare provider and vendor sides.
Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCCedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.
Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.
Luke McNamaraDeputy Chief Analyst, Google Threat Intelligence GroupLuke McNamara is the Deputy Chief Analyst with Mandiant Intelligence, with more than a decade of experience in cyber threat intelligence focusing on emerging threats and trends. His research has appeared in Bloomberg, CNBC, CNN, The Hill, The Nikkei, Lawfare, and other media outlets. Luke has presented at security conferences such as RSAC and Black Hat and hosts Mandiant’s Defenders Advantage podcast.
In previous roles at FireEye, Luke led and produced research for FireEye's Strategic Analysis Team, delivering insights into macro cyber threat trends for executive clients. Before its acquisition by FireEye, Luke was an intelligence consultant and analyst at iSIGHT Partners. As a Cyber Espionage Analyst at iSIGHT Partners, his work involved tracking nation state threat activity targeting public and private sector enterprises from Russia, China, North Korea, and Iran. Prior to working in cybersecurity, he supported intelligence programs in the defense sector as a contractor, culminating in a tour on the counterinsurgency advisory group for the commander of the NATO/ISAF mission in Afghanistan.
Luke McNamara holds a master’s degree from Columbia University's School of International and Public Affairs and an undergraduate degree from Patrick Henry College.
Shasta TurneyDirector, Cybersecurity Solution and Industry Marketing, Ping IdentityDecorated professional and engaged team player specializing in B2B product, solution, and industry marketing within the cybersecurity, identity and access management (IAM), and high tech software industry. Highly creative and enjoy solving problems and attaining goals. Strong presenter bringing subject matter to life with examples in every-day terminology. Professional writer. Cross-functional collaborator with internal l teams (Digital and Field Marketing, AR/PR, Corporate Marketing, Product Management, Partner and Channel Management, Solution Engineering, Sales) and external stakeholders (Partners, Customers, Analysts) to achieve goals and objectives.
Krista ArndtAssociate CISO, St. Luke's University Health NetworkKrista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.
Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.
When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.
Amy YeeCDO & CDTO | Board Member & Advisor | PodcasterAmy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.
Shubham AnandaniEngineering Manager, LinkedInShubham Anandani is an Engineering Manager at LinkedIn, where he leads teams focused on AI and professional identity platforms. Previously, at Oracle Health Sciences, he architected pioneering SaaS infrastructure for clinical trial randomization, serving Tier-1 pharmaceutical companies and ensuring FDA 21 CFR Part 11 compliance.
He holds a Master’s in Software Engineering from Carnegie Mellon University and is a Senior Member of IEEE. Shubham combines deep expertise in distributed systems with a focus on responsible AI to solve complex security and identity challenges.
Ethan MuntzStrategic Threat Analyst, Health-ISACEthan Muntz is a Strategic Threat Analyst at Health-ISAC, where he specializes in identifying emerging threats to the global health sector and developing proactive risk mitigation strategies. With a strong background in Open Source Intelligence (OSINT) and dark web investigations, Ethan previously served as a task force member for the Anti-Human Trafficking Intelligence Initiative and led cybercrime operations at the Center for International Cyber Intelligence.
He holds a Master of Science in Cyber Security and Privacy from the University of Central Florida and a B.S. in Global Security and Intelligence Studies. His expertise spans machine learning, incident handling, and geopolitical analysis, supported by his specialization in Chinese and Asian studies.
