Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 17, 2023
    9:00 am
    [PLUS Course] Real-World Cyber Risk Management and Resilience Planning
    • session level icon
    speaker photo
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Key components covered include:

    1) Lifecycle for investigating and responding to a cyberattack (such as a ransomware attack)
    2) The legal, compliance, and regulatory issues that arise from such attacks
    3) Legal and regulatory requirements for cyber risk management programs
    4) Assessing and understanding the real-world business impact cyber risk has on the company
    5) Prioritizing risks and developing a strategic action plan to execute
    6) Implementing simple and cost-effective strategies that take into account legal, compliance, and regulatory requirements
    7) The role of cyber insurance in overall resilience and incident response preparation

  • Thursday, May 18, 2023
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:30 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:50 am

    Participating professional associations and details to be announced.

    8:00 am
    Advisory Council Roundtable Breakfast – (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:50 am

    This roundtable discussion is for our Advisory Council members only.

    9:00 am
    [Opening Keynote] CISO Panel: Lessons Learned and Advice for the Next Generation of Cybersecurity Professionals
    • session level icon
    speaker photo
    CISO & Fellow Emeritus, Schlumberger
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Session description coming soon.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:15 am
    Transformational and Change Efforts: Why Do They Fail?
    • session level icon
    speaker photo
    Principal, CI5O Advisory Services LLC
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Incredible risk and disruption are driving the need for companies to adopt and drive transformational and change efforts. However, the track record and return on these investments are horrible. Success requires different skill sets. Traditional approaches are not transformative or agile enough. Oftentimes, management appears to be going through the motions on these efforts or setting them up for failure. Traditional approaches of handling cyber, analytics, edge and others as separate IT projects and not addressing these needs as various pieces of a major holistic change effort (including many non-technology aspects) are causing them to fail outright or have poor results.

    As the winner of the 2022 Orbie Leadership and 2019 Superglobal CIO of the Year Awards, Al Lindseth has been a thought leader within the energy sector and IT profession for many years. He left Plains All American in mid-2022 to support organizations with what he describes as the crunch issue of how growing risks like supply chain and cybersecurity, and other major disruptive forces, are managed amid a need to democratize and expand technology within an increasingly connected workplace.

    Focusing on technology-driven disruption or change efforts, Lindseth will posit five specific reasons why these efforts fail with a goal for attendees to learn how to avoid these issues with the right approach.

    Incredible risk and disruption are driving the need for companies to adopt and drive transformational and change efforts. However, the track record and return on these investments are horrible. Success requires different skill sets. Traditional approaches are not transformative or agile enough. Oftentimes, management appears to be going through the motions on these efforts or setting them up for failure. Traditional approaches of handling cyber, analytics, edge and others as separate IT projects and not addressing these needs as various pieces of a major holistic change effort (including many non-technology aspects) are causing them to fail outright or have poor results.

    As the winner of the 2022 Orbie Leadership and 2019 Superglobal CIO of the Year Awards, Al Lindseth has been a thought leader within the energy sector and IT profession for many years. He left Plains All American in mid-2022 to support organizations with what he describes as the crunch issue of how growing risks like supply chain and cybersecurity, and other major disruptive forces, are managed amid a need to democratize and expand technology within an increasingly connected workplace.

    Focusing on technology-driven disruption or change efforts, Lindseth will posit five specific reasons why these efforts fail with a goal for attendees to learn how to avoid these issues with the right approach.

    10:15 am
    [SentinelOne] The Future of Cybersecurity Is Autonomous
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Session description coming soon.

    10:15 am
    [Winmill] Software Development and DevOps
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Session description coming soon.

    11:10 am
    Cybersecurity Really Is a Team Sport
    • session level icon
    speaker photo
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Why strategic leadership and an understanding of roles, personalities, and psychology is important for building and managing effective cybersecurity teams.

    11:10 am
    [Exabeam] Goodbye SIEM Effectiveness Gap
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Session description coming soon.

    12:00 pm
    [Lunch Keynote] CISA Services for Cybersecurity Resilience
    • session level icon
    speaker photo
    Director, Region 6, CISA
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session description coming soon.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Sponsored by Skybox Security
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Discussion topic and moderator to be announced.

    Sponsored by:

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:15 pm
    [Panel] What Academia Is Doing to Prepare Next-Gen Cybersecurity Professionals
    • session level icon
    speaker photo
    Director, Global Cybersecurity Program, University of St. Thomas
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:15 pm

    Session description to come.

    1:15 pm
    [Panel] There’s a Bad Moon on the Rise – Are You Ready?
    • session level icon
    Identifying the Current Threat Landscape
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:15 pm

    Like the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.

    The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.

    Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.

    2:15 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:15 pm - 2:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:30 pm
    Democratizing Threat Modeling Across the Enterprise
    • session level icon
    speaker photo
    VP, Threat Modeling Center of Excellence, JPMorgan Chase & Co.
    speaker photo
    Vice President & Security Architect, JPMorgan Chase & Co.
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    Key Take-Away: Understand how to better plan, deliver, and execute Threat Modeling across the enterprise.

    This presentation will help answer the following questions and more:

    • How do you apply governance principles to Threat Modeling?
    • How to apply Threat Modeling across multiple engagement types?
    • How do you develop and execute the best training plan for your organization?
    • How do you ensure enterprise stakeholders including cybersecurity teams and different lines of business benefit from Threat Modeling as a service on an ongoing basis?
    2:30 pm
    An Honest Peer-Driven Conversation About Cyber Insurance
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:30 pm - 3:15 pm

    Cyber insurance is no longer a “do I need it?” but a must-have for organizations. This conversation among cybersecurity peers will discusse how to properly assess insurance programs, including a candid look into how the organization should drive what is and is not covered, not the insurance provider.

    2:30 pm
    Demystifying Zero Trust and Its Role in Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:30 pm - 3:15 pm
    3:15 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 3:45 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    [Closing Keynote] The CISO: Chief in Name Only
    • session level icon
    speaker photo
    CISO, Speaker, Advisory Board Member; Founder, Cyber Point Advisory
    Registration Level:
    • session level iconConference Pass
    3:45 pm - 4:30 pm
    Today’s CISO is expected to be a unicorn – developing roadmap and strategy and executing them, establishing rapport within and outside IT, leading the team to cultivate and retain talents, staying up to date with the latest cybersecurity news and trends, communicating with the board, being a salesperson pitching solutions, putting out fires, and on and on. In some cases, they are not given the appropriate authority or the resources, resulting in making security decisions purely based on economic reasons versus risk-based. This session explores how to navigate being a CISO and figuring out how to truly be the “Chief” of infosec, a critical thread that affects every piece of the organization.
Exhibitors
  • AuditBoard, Inc
    Booth: TBD

    AuditBoard is the leading cloud-based platform transforming how enterprises manage risk. Its integrated suite of easy-to-use audit, risk, and compliance solutions streamlines internal audit, SOX compliance, controls management, risk management, and security compliance. AuditBoard’s clients range from prominent pre-IPO to Fortune 50 companies

    looking to modernize, simplify, and elevate their functions. AuditBoard is the top-rated audit management and GRC software on G2, and was recently ranked for the second year in a row as one of the 100 fastest-growing technology companies in North America by Deloitte.

  • Cloudflare
    Booth: TBD

    Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

    Secure your websites, APIs, and Internet applications.
    Protect corporate networks, employees, and devices.
    Write and deploy code that runs on the network edge.

  • CREST
    Booth: n/a

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence and Security Operations Centre (SOC) services.

  • Exabeam
    Booth: TBD

    Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.

  • Okta
    Booth: TBD

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

  • SentinelOne
    Booth: TBD

    SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks.

  • Skybox Security
    Booth: TBD

    Skybox arms security teams with a powerful set of security management solutions that extract insight from security data silos to give unprecedented visibility of the attack surface, including all Indicators of Exposure (IOEs). With Skybox, security leaders can quickly and accurately prioritize and address vulnerabilities and threat exposures.

  • TechTarget
    Booth: n/a

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Winmill Software
    Booth: TBD

    Winmill is a technology services company that provides expert consulting services in Application Development, Application Security, PPM, Data Center & Cyber Security, and Identity & Access Management.

    Founded in 1994, Winmill is a technology services company headquartered in New York City. We have five core practices: Software Development, Cyber Security, DevOps, Data Center, and Cloud. We support the entire technology lifecycle. We are dedicated to providing exceptional service by building systems that make our clients more competitive. One of our hallmarks is a knowledge transfer process that maximizes the skills and intellect of your own team.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Shawn E. Tuma, Instructor
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Mario Chiock, Moderator
    CISO & Fellow Emeritus, Schlumberger

    Mario Chiock possesses over 37 years of experience in Oil Field operations, IT, Security, Risk, Privacy and Auditing. Prior to his current role as Schlumberger Fellow, Mario was the CISO at Schlumberger where he was responsible for developing the company’s worldwide, long-term cyber security strategy. He is recognized for his leadership and management in all aspects of cybersecurity throughout the company as well as within the community.

    Through his vision, he successfully transitioned Schlumberger from legacy firewalls to a more robust infrastructure based on next-generation firewalls. His experience in successfully deploying advanced technologies and approaches also spans Incident Response, Advance Threat Prevention, Digital Right Management to watermark & fingerprint sensitive documents. He also implemented federation services to minimize 3rd party risk and created the extended security team to foster collaboration with other IT groups. Mario is also known for applying his Lean Six Sigma expertise for measuring performance and creating

    Outside of Schlumberger, Mario has been an active member of the Information Systems Security Association (ISSA) for over 20 years; he has held numerous board positions in the Austin, Capital of Texas Chapter, as well as the South Texas Chapter in Houston. He was president of the South Texas Chapter in 2007, bringing in the “Chapter of the Year” award. He continues to serve on the board. Mario is also an active volunteer trainer for Security Certifications such as CISM, CISA & CRISC certifications, and has mentored many successful CSO & CISO in Austin & Houston area. He is also very active with Evanta as speaker and instructor for their CISO Institute. In 2015 he was a speaker for the SPE and API conference and in 2016 he was a panelist at the GEO2016 conference in Bahrain. In 2018 was awarded the South Central Region InfraGard Award for “INMA Leadership!”.

    Mario was recognized as one of the top 25 out of more than 10,000 security executives in the ExecRank 2013 Security Executive Rankings, he also won the 2012 Central Information Security Executive (ISE) “People Choice Award”, in 2014 he is a recipient of the CSO40 – 2014 award, named “ISSA Fellow”, won ISC2 Americas Information Security Leadership Awards (ISLA) and won the “ISSA Honor Roll” award. In 2017 he received the Infragard Houston award of excellence for the Private-Public Partnership in Cybersecurity. He is an active member of the Houston Security community and gives security talks, training and volunteers his IT security expertise to local non-profit organizations. He is currently a board member of the Houston InfraGard Chapter, has served in Executive & Technical Advisory boards of many security companies such as WatchFire (Now IBM), ISS (now IBM), Qualys, and currently is active on the Palo Alto Networks advisory board, he is also serving in the Google Cloud Platform advisory board and strategic advisor to Onapsis as well as Board member.

    Mario has a CISSP, CISM & CISA Certifications, and is past chair for the American Petroleum Institute Information (API) Security Sub-Committee and was involved in the formation of the Oil & Gas ISAC. Co-Author of "Navigating the Digital Age, Second Edition."

  • speaker photo
    Panel Discussion
  • speaker photo
    Al Lindseth
    Principal, CI5O Advisory Services LLC
  • speaker photo
    Shawn E. Tuma
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Harvey Perriott
    Director, Region 6, CISA

    Harvey O. Perriott currently serves as the Regional Director for the Cybersecurity and Infrastructure Security Agency (CISA), Region VI headquartered in Irving, TX. His staff overseas risk management, and both physical and cyber security activities for private and public sector partners across five states including Arkansas, Louisiana, New Mexico, Oklahoma, and Texas. He regularly interacts with state and local Homeland Security officials and is the CISA Director’s representative to Region VI stakeholders.

    Prior to this assignment, he served as the Chief, Protective Security for CISA Region VI providing leadership and management to a team of 13 Protective Security Advisors (PSAs) across 5 states. His PSAs supported infrastructure risk management and acted as emergency management and physical security advisors to Federal, State, local, and Tribal officials. Prior to this assignment, he served as the Protective Security Advisor for the North Texas District from 2006-2017.

    From November 2004 until June 2006, Mr. Perriott served as the Staff Director for the Office of Infrastructure Protection’s Risk Management Division located in Washington, DC. In this capacity he facilitated the daily operations of a division consisting of 130 federal and contract personnel.

    Mr. Perriott brings extensive experience and training to the agency in the fields of security, counterterrorism, and special operations. With over 25 years’ experience in U.S. Special Operations, Mr. Perriott has been involved in various military operations directed at counterterrorism activities. Mr. Perriott was recognized for his contributions to Operation ENDURING FREEDOM with a Bronze Star Medal. He has served within CISA or its predecessors for 17 years.

    Mr. Perriott holds a Bachelor’s Degree in Human Resource Management and a Physical Security Professional certification with the ASIS; he has an in-depth knowledge of technical and physical security, threat and vulnerability assessments, analysis of requirements, and the development of operational plans. He has been married for over 33 years, with two children and one grandson.

  • speaker photo
    Panel Discussion
  • speaker photo
    Eric C. Botts
    Director, Global Cybersecurity Program, University of St. Thomas

    Eric Botts is Director, Global Cybersecurity Program and Assistant Professor of International Studies at the University of St. Thomas teaching courses on Cyber Warfare, Cyber Ethics, Geopolitical Risk, Digital Governance, and Introduction to Enterprise Cybersecurity. Mr. Botts is a lecturer at the Women’s Institute of Houston teaching a course entitled The World According to Eric dealing with current events in geopolitics. Mr. Botts received his Bachelor of Arts degree in Political Science from St. Mary’s University and Master of Security Management from the University of Houston Downtown. After serving for 31 years in the U.S. Department of State as a Foreign Service Officer (Santo Domingo, Seoul, Dublin, and Nassau), Assistant Director of the Houston Passport Agency and an Information Systems Security Officer. During his federal career he served as Program Chairman of the Gulf Coast Federal Safety Council, and as a member of the Federal Executive Board. Mr. Botts teaching experience includes the University of Houston Downtown for courses in cybersecurity and organizational resilience in the Masters of Security Management Program.

    Mr. Botts retired and went to work in the private sector. In the private sector Mr. Botts worked as a security project manager and consultant for Swailes & Co. Inc. specializing in cyber security, risk management, business continuity, due diligence, travel security, and investigations until 2020. Mr. Botts is a founding board member of the Foreign Policy Alliance and has spoken on foreign policy issues to civic groups, colleges, and the media. In the cyber security community, he sits on the Secure World Advisory Council, is a member of the Internet Governance Forum USA. He authored and published two novels Conversations with An Alien (2004) and The Circle - Portrait of an American Family (2015).

  • speaker photo
    Panel Discussion
  • speaker photo
    Karen Harris
    VP, Threat Modeling Center of Excellence, JPMorgan Chase & Co.

    Karen Harris is a seasoned banking and threat modeling pro, with over 20 years global technical delivery and development expertise, as well as five plus years working in the risk and threat modeling space. Karen was previously with Capital One and Bank of America, where as senior architect and threat modeling manager she helped implement new threat modeling tools, policies, and guidelines, as well as developing and executing introductory and advanced bootcamp threat modeling training courses. Karen is a native New Yorker and enjoys tennis and photography equally.

  • speaker photo
    Annie Jamshed
    Vice President & Security Architect, JPMorgan Chase & Co.
  • speaker photo
    Dd (Catharina) Budiharto, Moderator
    CISO, Speaker, Advisory Board Member; Founder, Cyber Point Advisory
  • speaker photo
    Panel Discussion
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Grow in person!

Join your cybersecurity community for learning and professional growth. Sign up today!