googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, November 15, 2023
    8:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 3:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:00 am
    [Opening Keynote] Privacy Update: Sorting Surveillance Benefits from Harms in an IoT World
    • session level icon
    speaker photo
    The Privacy Professor; CEO, Privacy & Security Brainiacs
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am

    Tracking technologies are proliferating at an increasingly high rate in apps, IoT devices, websites, and in a wide range of files. They are not only impacting privacy in wider and more harmful ways, but they have also extended far beyond the digital world and are also impacting physical safety. Such tools can certainly be very beneficial, when used responsibly and with informed awareness of the cybersecurity and privacy risks. However, when they are used without establishing technical and non-technical boundaries, and without taking risk mitigation actions, the associated surveillance activities can, and have, brought physical harms. I was an expert witness for a case a couple of years ago involving a stalker’s use of his victim’s smart car to find and almost fatally assault her. I’m currently an expert witness for two separate cases involving the use of Meta Pixels, Conversion APIs, cookies, and other types of tracking tech for surveillance of online activities. Virtually daily there are news articles reporting privacy invasions by digital trackers, drones, security cameras, and more. I will provide several real-life use cases, and provide discussion for the technical and non-technical capabilities that possibly could have been identified through risk assessment activities prior to making such products publicly available and informed the needed associated security and privacy capabilities, that would have supported privacy and cybersecurity protections and physical safety.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:00 am
    Threat Intelligence: Industrialization of Cyber Fraud and AI
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    The presentation will cover the Secret Service’s view on current cybercrime trends to include the emergence of AI/ML in the cybercrime world. Investigator Dougherty will frame it in the lens of BEC (Business Email Compromise) and discuss the new and emerging advancements cybercriminals are using to victimize businesses in 2023 and beyond. Investigator Dougherty may even share a a deepfake of himself.

    10:00 am
    Converged Identity Platforms: The Power of One
    • session level icon
    speaker photo
    VP, Product Management - Platform, Saviynt
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Identity security has quickly become the keystone for strong cybersecurity programs. But many identity security programs suffer from the same challenges as others – a series of disjointed point solutions that do little to simplify management and governance, limiting overall program effectiveness. Lack of cohesive programs increase costs, complicate tech stacks, and limit buy-in from the rest of the organization which does little to minimize enterprise risk.

    In this presentation, Saviynt Vice President of Product Management John Wang will discuss the key concepts that have proven successful for organizations adopting converged identity platforms and how they can streamline security programs, limit enterprise risk, and reduce total cost of ownership – all while increasing ROI.

    Discussion topics for this session will include:

    • Today’s identity security challenges
    • Drawbacks of point solutions
    • Defining convergence
    • The business benefits of CIPs
    • Choosing the right CIP for you
    10:00 am
    How the Private Sector Can Get Involved in the New Biden National Cybersecurity Strategy
    • session level icon
    speaker photo
    Director, Integrated Cybersecurity Partners, LLC
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am
    10:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:00 am

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:00 am
    Introduction to Adversarial Machine Learning
    • session level icon
    speaker photo
    Sr. Security Researcher, Nokia
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    With the increased reliance and use of machine learning across all industries, the attack surface in many organizations’ environments has increased. Although machine learning has many benefits, it also leads to new risks. It is crucial to understand the new security risks that machine learning brings in order to protect systems that rely on these technologies. In this presentation, attendees will learn about the different types of attacks that machine learning is vulnerable to. In addition, attendees will gain an understanding of the difference between artificial intelligence and machine learning, what adversarial machine learning is, how machine learning attacks occur, real-world case studies, and an introduction to current open-source tools offered by the industry to ensure that machine learning has been secured. By the end of the presentation, attendees will have an understanding of machine learning and its contributions to the cyber threat landscape as well as some measures they can take to increase the security of machine learning.

    11:00 am
    Why We Are Losing the Cyberwar
    • session level icon
    speaker photo
    CEO, Blue Goat Cyber
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    We are not losing the cyberwar due to a lack of technical skills or a lack of frameworks. We are losing the cyberwar due to a lack of people skills (low EQ) with our highly rationally intelligent (high IQ) cybersecurity staff. Most cybersecurity staff want to feel significant by being “smarter” than others. This inhibits communication and collaboration. I offer a seven-step methodology to fix this challenge, as discussed in my book “The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity” (https://www.amazon.com/Smartest-Person-Room-Solution-Cybersecurity/dp/1544516215), which is based on my 30 years’ experience in cybersecurity, including my own journey with the first cybersecurity company (Alpine Security) that I built and sold in 2020.
    11:00 am
    CISO Perspectives on the SEC's New Cyber Rules
    • session level icon
    speaker photo
    CISO Advisor, Hoxhunt
    speaker photo
    CISO, Americas, Zscaler
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    In late July, the U.S. Securities & Exchange Commission (SEC) finally announced its long-anticipated cybersecurity updates. With the new rules, public companies operating in the U.S. will have to adapt the way they manage cybersecurity incidents and reporting.

    Benjamin Corll and Petri Kuivala will discuss the new rules and explain how security teams need to adapt their processes to make sure their organizations meet compliance.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Safeguarding Ethical Development in AI and Other LLMs
    • session level icon
    A Comprehensive Approach to Integrating Security, Psychological Considerations, and Governance
    speaker photo
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session description coming soon.

    12:00 pm
    Lessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn Soles
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.

    12:00 pm
    Telling Your Cybersecurity Story: Meeting the SEC’s New Disclosure Requirements
    • session level icon
    speaker photo
    Vice President, Government Affairs, BitSight
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Groundbreaking new cybersecurity regulations from the U.S. Securities and Exchange Commission (SEC) now require companies to disclose critical information about their cybersecurity programs to investors and shareholders.

    How can technology leaders effectively tell their company’s cybersecurity story now? What do investors want — and need — to know about cybersecurity?

    This session will help attendees understand the new requirements, learn real-world examples of effective cybersecurity disclosure, and identify future initiatives.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Secure by Default: Evolving Security Expectations
    • session level icon
    speaker photo
    CISO, Automox
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    CISA recently released their paper on “Secure by Design, Secure by Default” software that has support from seven major governments. It is meant to make significant, achievable improvements in software security. We will discuss the Secure by Default concept, why it is important, and what customers and vendors can do about it today.

    1:00 pm
    Mitigating AI Risks: New Solutions to Address AI/ML Liability
    • session level icon
    speaker photo
    Member, Data Privacy & Cybersecurity, Clark Hill Law
    speaker photo
    Head of AI Policy and Assurance, Armilla Assurance
    speaker photo
    Global Privacy and InfoSec Attorney, eBay
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    2023 has seen the emergence of class action lawsuits filed against businesses for their use of AI/ML technologies.  Other actions are sure to follow as plaintiffs firms find novel ways to fit the use of AI tools into existing legal regimes prohibiting discrimination and requiring product safety, transparency and fairness.  This presentation will give an overview of some of the litigations and enforcement actions seen in the AI/ML space to date, with legal strategies for how businesses can work to develop a legally defensible compliance program, including AI assessments, in line with emerging AI regulatory and risk management frameworks.  The presentation will feature Philip Dawson from Armilla Assurance, the first company to offer a warranty product backed by major insurers that seeks to verify and warrant certain features of an AI tool.

    1:00 pm
    A Whole Lotta BS (Behavioral Science) About Cybersecurity
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Let’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security.  We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.

     

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    [Closing Keynote] Cyber Intel Briefing
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    This presentation will provide a comprehensive overview of the current cyber landscape, focusing on both global and domestic government-related threats and incidents. We will delve into recent high-profile attacks, explore emerging trends, and discuss the evolving tactics employed by cybercriminals and nation-states. Additionally, the presentation will examine the ongoing challenges faced by governments in protecting critical infrastructure, securing sensitive data, and mitigating the risks posed by cyber espionage. By understanding the latest developments in the cyber threat environment, attendees will gain valuable insights into safeguarding government networks and systems.

Exhibitors
  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • BitSight
    Booth:

    BitSight transforms how organizations manage cyber risk. The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help organizations manage their own security performance; mitigate third party risk; underwrite cyber insurance policies; conduct financial diligence; and assess aggregate risk. With over 2,100 global customers and the largest ecosystem of users and information, BitSight is the Standard in Security Ratings. For more information, please visit www.bitsight.com, read our blog, or follow @BitSight on X.

  • CREST
    Booth:

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

  • Hoxhunt
    Booth:

    Data breaches start with people, so Hoxhunt does too. We combine cognitive automation with the human touch to create individualized adaptive training experiences employees love, and a managed service model enterprises depend on.

  • National Cybersecurity Alliance
    Booth:

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Saviynt
    Booth:

    Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rebecca Herold
    The Privacy Professor; CEO, Privacy & Security Brainiacs

    Rebecca Herold has more than 30 years of security, privacy, and compliance experience. She is founder of The Privacy Professor Consultancy (2004) and of Privacy & Security Brainiacs SaaS services (2021) and has helped hundreds of clients throughout the years. Rebecca has been a subject matter expert (SME) for the National Institute of Standards and Technology (NIST) on a wide range of projects since 2009, including: seven and a half years leading the smart grid privacy standards creation initiative, and co-authoring those informative references and standards; two years being a co-author of and a SME member of the team that created the Privacy Framework (PF) and associated documents; and three years as a SME team member, and co-author of the Internet of Things (IoT) technical and non-technical standards and associated informative references; and performing throughout the years proof of concept (PoC) tests for a variety of technologies, such as field electricity solar inverters, PMU reclosers, and associated sensors. Rebecca has served as an expert witness for cases covering HIPAA, privacy compliance, criminals using IoT devices to track their victims, stolen personal data of retirement housing residents, tracking apps and website users via Meta Pixels and other tracking tech, and social engineering using AI. Rebecca has authored 22 books, and was adjunct professor for nine and a half years for the Norwich University MSISA program. Since early 2018, Rebecca has hosted the Voice America podcast/radio show, Data Security & Privacy with the Privacy Professor. Rebecca is based in Des Moines, Iowa, USA. www.privacysecuritybrainiacs.com

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    John Wang
    VP, Product Management - Platform, Saviynt

    John Wang currently serves as Saviynt’s VP of Product Management for its Enterprise Identity Cloud Platform, the industry’s most complete identity security solution. In this role, John is responsible for supporting the platforms IGA, PAM, AppGRC, and third-party identity security capabilities. He has more than 20 years of product development and management experience with leading vendors such as Fastly, RingCentral, and Proofpoint. He has a patent in applied cryptography for strong authentication and has presented AI/ML research to the National Institute of Standards and Technology (NIST) and the American Bar Association (ABA).

  • speaker photo
    Kurt Sanger
    Director, Integrated Cybersecurity Partners, LLC
  • speaker photo
    Anmol Agarwal
    Sr. Security Researcher, Nokia

    Anmol Agarwal is a security researcher at a Fortune 500 Company and is focused on securing AI and Machine Learning in 5G and 6G. She holds a doctoral degree in cybersecurity analytics from George Washington University and a master’s degree in computer science from the University of Texas at Dallas. She previously worked at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in the High Value Asset Program Management Office. In her free time, she enjoys giving back to the community and is an active industry mentor.

  • speaker photo
    Christian Espinosa
    CEO, Blue Goat Cyber

    Christian Espinosa is the CEO & Founder of Blue Goat Cyber and a Cybersecurity Professor at Maryville University. He holds over 25 certifications, including the CISSP, CCISO, and PMP. Christian is a U.S. Air Force veteran with a BS in Engineering from the U.S. Air Force Academy and an MBA from Webster University. He holds multiple patents on cybersecurity attack and defense. Major recent projects include penetration testing and assessments of commercial aircraft, medical device penetration testing, and numerous incident response projects. When Christian isn’t protecting us from cybercriminals, he climbs mountains, travels the world, teaches outdoor wilderness survival, and competes in Ironman triathlons.

  • speaker photo
    Petri Kuivala
    CISO Advisor, Hoxhunt

    With more than 25 years of experience, Kuivala was most recently the Vice President of General IT and User Experience at NXP Semiconductors. Prior to this role, Kuivala was a long-time security executive at Nokia, serving as the company's CISO and CSO throughout his tenure of more than a decade. He helped form a streamlined and co-operative security management structure among product security, IT-security, product safety, and corporate security. Following this, Kuivala was Senior Director of Global Security at Microsoft.

  • speaker photo
    Benjamin Corll
    CISO, Americas, Zscaler

    Ben is a 25-year veteran in the cybersecurity industry with a passion to protect enterprise organizations. He has spent his career establishing security programs for companies of all types and sizes, from 500 to 50,000. Ben has held just about every technical security role, from AV, firewall, SIEM, and DLP management, to security architect, and CISO roles.

    Prior to joining Zscaler, Ben was the VP/Head of Cybersecurity (CISO) for Coats, a global manufacturer of industrial thread. This was a newly created role that allowed Ben to build a program: from policies, creating and refining processes, to choosing technology controls. Ben is passionate about engaging with both security practitioners and business leaders on the value of digital transformation and preparing businesses to defend against threats. Much of his time is spent focusing teams on the fundamental practices or basics and doing them well before pivoting to more advanced solutions.

  • speaker photo
    Kimberly KJ Haywood
    Chapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

  • speaker photo
    Jake Olcott
    Vice President, Government Affairs, BitSight

    Jacob (Jake) Olcott has been in the cybersecurity industry since 2005 and currently serves as the Vice President of Communications and Government Affairs for BitSight. In his role, he helps organizations benchmark their cybersecurity programs using quantitative metrics and provides thought leadership and recommendations regarding the role of directors, officers, and executives in cyber risk management.

    Prior to BitSight, Jake served as cybersecurity attorney to the US Senate Commerce Committee and US House of Representatives Homeland Security Committee. He also consulted with Fortune 1000 executives on cyber risk management and served as an adjunct professor at Georgetown University.

    Jake holds degrees from the University of Texas at Austin and the University of Virginia School of Law.

  • speaker photo
    Jason Kikta
    CISO, Automox

    Jason Kikta is the Chief Information Security Officer at Automox. He previously served for over 20 years in the United States Marine Corps, which included seven years at U.S. Cyber Command designing and managing the national counter-APT and counter-ransomware missions.

  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Data Privacy & Cybersecurity, Clark Hill Law

    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.

  • speaker photo
    Philip Dawson
    Head of AI Policy and Assurance, Armilla Assurance
  • speaker photo
    Benjamin Benhan
    Global Privacy and InfoSec Attorney, eBay

    With over six years of experience in privacy and data governance, Ben is a passionate and driven global privacy and infosec attorney at eBay, where he helps the company navigate the complex and evolving regulatory landscape of data protection and cyber security. He has a strong background in computer science, cyber security, network engineering, and law, as well as multiple certifications that demonstrate his proficiency and credibility in the field. He is motivated by the challenge of balancing the needs and interests of various stakeholders while ensuring the highest standards of compliance, ethics, and risk management. He values diversity, innovation, and collaboration, and enjoys working with a dynamic and cross-functional team that shares his vision of creating a safe and trusted online marketplace for millions of users worldwide.

    In his current role, he advises eBay on global privacy and infosec matters, including developing and implementing policies, procedures, and best practices in privacy, security, and data governance. He leads global efforts in vendor risk management and data processing agreements, and has experience conducting privacy impact assessments, responding to data breaches and incidents, and liaising with regulators, customers, and partners. He leverages his skills in cyber policy, data privacy, and legal aspects to provide practical and strategic solutions that align with the company's business objectives and values. He also contributes to the continuous improvement and education of the privacy and infosec programs by staying updated on the latest trends, developments, and standards in the industry, and by sharing his insights and expertise with his colleagues and peers.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.

    With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.

    VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.

    VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes