Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, August 23, 202310:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 4:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 amOPENING KEYNOTERegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
12:00 pmBusiness Continuity: Succession Planning 101CISO, Veterans United Home LoansRegistration Level:Open Sessions
12:00 pm - 12:45 pmSession description to come.
12:00 pmDrive Profitability While Supporting Safe and Secure Manufacturing OperationsRegistration Level:Open Sessions
12:00 pm - 12:45 pmTechnology advancements increase “online” presence of operations in a business, they also create unintended cyber exposures which could potentially affect safety, quality and availability of production/manufacturing environments. Protecting business from adverse consequences requires collaboration between IT & OT to promote security awareness and unified protection efforts.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:00 pmDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Open Sessions
1:00 pm - 1:45 pm1:00 pmCloudy Days Ahead: Security Implications of the Expansion of IIoT/IoT in Industrial Control EnvironmentsRegistration Level:Open Sessions
1:00 pm - 1:45 pmIn recent years, business drivers requiring access to more near real time or real time data has compelled organizations to increase connectivity within their industrial control environments. That connectivity is not only to enterprise networks, however, as there has been an expansion of IIoT (Industrial Internet of Things) capability within these control environments, and a subsequent movement of data into the cloud for further enrichment. What does this mean for a domain that already has significant security challenges? This presentation will examine some of those challenges and what implications there are as IIoT continues to expand. 1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:00 pmIndustrial Control Systems and CybersecurityRegistration Level:Open Sessions
2:00 pm - 2:45 pmIndustrial Control Systems are everywhere and have an impact on our lives every day. If they are not protected properly, we could lose access to electricity, oil & gas, and even food. This presentation will look at what an Industrial Control System is, what the possible dangers are, and how to best protect them.
2:00 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
2:00 pm - 2:45 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
3:00 pmMitigating Data Privacy and Cybersecurity Risk Throughout the Supply ChainData Privacy Attorney, Octillo LawRegistration Level:Open Sessions
3:00 pm - 3:45 pmKey Take-Away:
Attendees will walk away with a practical understanding of how to involve key stakeholders at various points in the compliance program development process and the importance of third-party risk management concerning the overall data security and compliance culture within an organization.Businesses are increasingly built on a complex spiderweb of third-party providers that access a business’s systems, data, and other critical operations. This includes all manufacturing companies that rely on third parties—such as service providers, SAAS vendors, or contractors—to manage data and sensitive operations. Organizations typically have limited control over third parties, limited transparency into their security practices, and limited availability or resources to track third-party security upgrades. As owners and managers of portions of critical infrastructure, it is important for these companies to evaluate the current threat landscape and shift perspective on cyber threats from “if” to “when” as they examine preparedness, protocols, and employee education throughout upstream, midstream, and downstream operations.
Mitigating data privacy, cybersecurity, and technology risk throughout the supply chain should be a priority for organizations, and our presentation will touch on key considerations for third-party management, including due diligence, contractual terms, and ongoing compliance.
3:00 pmRansomware: How to Stay Off the Front PagesRegistration Level:Open Sessions
3:00 pm - 3:45 pm3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
4:00 pmDeveloping a Crisis Management PlaybookRegistration Level:Open Sessions
4:00 pm - 4:45 pmWhen a data breach or other cyber incident happens, having a plan in place can mean the difference between a quick recovery and unwanted headlines and irreparable harm to stakeholder trust.
4:00 pmSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Open Sessions
4:00 pm - 4:45 pmKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
- Randy RawCISO, Veterans United Home Loans
Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.
- Panel Discussion
- Dafina BuçajData Privacy Attorney, Octillo Law
Dafina Buçaj counsels and advises Octillo clients on the development and implementation of enterprise-wide data security and privacy programs and regulatory compliance under federal, state, and international privacy regulations. Her practice includes helping organizations build out data privacy and security regulatory assessments, information privacy and security protocols and policies, external policies, data collection, vendor risk assessments, contract development and review, and threat mitigation plans. With a global perspective, Dafina also helps organizations address compliance with number global regulations, including the GDPR, PIPIEDA, CASL, POPIA, LGDP, PIPL, and other emerging privacy and security laws.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!
