Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, August 23, 202310:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 4:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 amOPENING KEYNOTERegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
12:00 pmDrive Profitability While Supporting Safe and Secure Manufacturing OperationsRegistration Level:Open Sessions
12:00 pm - 12:30 pmTechnology advancements increase “online” presence of operations in a business, they also create unintended cyber exposures which could potentially affect safety, quality and availability of production/manufacturing environments. Protecting business from adverse consequences requires collaboration between IT & OT to promote security awareness and unified protection efforts.
12:00 pmBEC Attacks: The Stealthiest and Most Lucrative ThreatRegistration Level:Open Sessions
12:00 pm - 12:30 pm12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:00 pmDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Open Sessions
1:00 pm - 1:45 pm1:00 pmCloudy Days Ahead: Security Implications of the Expansion of IIoT/IoT in Industrial Control EnvironmentsRegistration Level:Open Sessions
1:00 pm - 1:45 pmIn recent years, business drivers requiring access to more near real time or real time data has compelled organizations to increase connectivity within their industrial control environments. That connectivity is not only to enterprise networks, however, as there has been an expansion of IIoT (Industrial Internet of Things) capability within these control environments, and a subsequent movement of data into the cloud for further enrichment. What does this mean for a domain that already has significant security challenges? This presentation will examine some of those challenges and what implications there are as IIoT continues to expand. 1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:00 pmIndustrial Control Systems and CybersecurityRegistration Level:Open Sessions
2:00 pm - 2:45 pmIndustrial Control Systems are everywhere and have an impact on our lives every day. If they are not protected properly, we could lose access to electricity, oil & gas, and even food. This presentation will look at what an Industrial Control System is, what the possible dangers are, and how to best protect them.
2:00 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
2:00 pm - 2:45 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
3:00 pmRansomware: How to Stay out off the Front PagesRegistration Level:Open Sessions
3:00 pm - 3:45 pm3:00 pmSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Open Sessions
3:00 pm - 3:45 pmKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
4:00 pmDeveloping a Crisis Management PlaybookRegistration Level:Open Sessions
4:00 pm - 4:45 pmWhen a data breach or other cyber incident happens, having a plan in place can mean the difference between a quick recovery and unwanted headlines and irreparable harm to stakeholder trust.
4:00 pmSecuring the Supply ChainRegistration Level:Open Sessions
4:00 pm - 4:45 pmA discussion of managing third-party risk and how to manage expectations and contracts with vendors.
- Panel Discussion

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!
