Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, October 28, 20259:00 am[PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and ApplicationsSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmLocation / Room: O'Neill (4th Floor)AI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.
Lesson 1: What is Artificial Intelligence?
Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.Lesson 2: What are the AI threats?
Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.Lesson 3: What are the AI vulnerabilities?
Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.Lesson 4: What are AI security controls?
Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.Lesson 5: What is AI risk management?
Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data CardsLesson 7: What are the AI governance, AI compliance, AI audit requirements?
Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.Lesson 8: Building an AI security program
Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College - Wednesday, October 29, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:30 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amLocation / Room: Music Box/MajesticModerated discussion for SecureWorld Advisory Council members. By invite only.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Once Upon a Time in the Big Apple: CISOs on the Frontlines of Cyber EvolutionSVP, CIO & CISO, OTC Markets Group Inc.CISO, OneMain FinancialCISO, Aikido SecurityRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterCybersecurity in New York City is anything but ordinary. As one of the world’s most targeted and interconnected regions, the Big Apple has long been a proving ground for innovation, regulation, and resilience in the face of relentless cyber threats.
In this keynote panel, top CISOs from New York’s diverse industries will share the pivotal moments that shaped their cybersecurity journeys—from navigating legacy risk to embracing AI and zero trust. You’ll hear real-world stories of what worked, what didn’t, and how leadership, collaboration, and adaptation are writing the next chapter of cyber defense in the city that never sleeps.
Whether you’re a practitioner, leader, or building your own cybersecurity story, this session sets the tone for the day, grounded in experience, rich with insight, and driven by the evolving narrative of risk in modern times.
9:45 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
10:15 amRewriting the Security Story: Empowering Agility in a Digital-First WorldGlobal CISO, OPKO HealthRegistration Level:
Conference Pass
10:15 am - 10:50 amLocation / Room: PlymouthCybersecurity has long been cast as the cautious guardian—protecting the kingdom but often slowing the quest for innovation. But the modern tale is changing. In this insightful session, Afzal Khan, Global CISO at OPKO Health, will explore how forward-thinking organizations are transforming security from a restrictive legacy function into a flexible force for business agility.Attendees will follow the arc of cybersecurity’s evolving role, uncovering how to embed security into fast-paced development cycles, enable secure-by-design principles, and align risk management with business momentum. With lessons from the past and a vision for what’s next, this session offers a roadmap to help you turn the page—and make cybersecurity a trusted partner in your organization’s growth story.10:15 amStrengthening Cybersecurity with CIS Controls v8CIO, Mandelbaum Barrett PCRegistration Level:
Open Sessions
10:15 am - 10:50 amLocation / Room: RoyaleIn today’s rapidly evolving threat landscape, businesses of all sizes face increasing pressure to safeguard their digital assets. The Center for Internet Security (CIS) Controls v8 offers a practical, prioritized framework designed to help organizations improve their cybersecurity posture. This live training session will provide a comprehensive overview of the CIS Controls v8, focusing on its 18 critical security controls that align with modern systems and workflows.
Participants will learn how these controls can be tailored to fit their organization’s risk profile, resource availability, and operational needs. We’ll explore how implementing CIS Controls can reduce exposure to common cyber threats, support regulatory compliance, and enhance overall resilience. Real-world examples and case studies will illustrate how businesses have successfully adopted these controls to protect sensitive data, streamline security operations, and foster a culture of cyber awareness.
Whether you’re just beginning your cybersecurity journey or looking to refine your existing strategy, this session will equip you with actionable insights and tools to make informed decisions. Join us to discover how CIS Controls v8 can empower your business to proactively defend against cyber risks and build a more secure future.
10:15 amCollective Resilience in Crypto: A Fireside Chat with Justine BoneExecutive Director, Crypto ISACFormer CISO, RobinhoodRegistration Level:
Open Sessions
10:15 am - 10:50 amLocation / Room: Shubert/UrisIn an industry where innovation and risk move at on-chain speed, collaboration isn’t optional—it’s essential. In this candid fireside chat, Justine Bone, Executive Director of Crypto ISAC, shares how the crypto sector is transforming collective defense for a decentralized world.From the ISAC’s formation and early lessons to the evolving threat landscape of digital assets, Justine explores how blockchain’s defining traits—decentralization, transparency, immutability, and programmability—power both innovation and complexity.The discussion also looks ahead to how Web2 security practices are adapting for Web3, what organizational trust means when there’s no central authority, and how crypto’s growing integration with traditional finance is reshaping the definition of security maturity.10:50 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
11:10 amBuilding a Secure Enterprise AI ProgramDirector, Global Head of Product Security, BlackRockRegistration Level:
Conference Pass
11:10 am - 11:45 amLocation / Room: RoyaleSession details to come.
11:10 amAdvisory Council Roundtable Discussion (VIP / Invite Only)CISO as a Business Enabler vs. Gatekeeper: Shifting Perception and DeliveryAVP, Security Engineering & Operations, Vantage Risk CompaniesRegistration Level:
VIP / Exclusive
11:10 am - 11:45 amLocation / Room: Music Box/MajesticModerated discussion for SecureWorld Advisory Council members. By invite only.
In today’s hyper-connected, innovation-driven landscape, the Chief Information Security Officer can no longer operate solely as the organization’s “risk referee.” The modern CISO must evolve into a strategic business enabler—someone who embeds security into innovation pipelines, accelerates digital transformation, and communicates risk in business language that drives informed decisions rather than fear-based caution.
This session explores how security leaders can reframe their influence—from enforcing compliance and blocking risky initiatives, to empowering innovation through secure-by-design principles, intelligent automation, and partnership across business units. Panelists will discuss how they measure success beyond vulnerability counts, how they align security roadmaps with corporate OKRs, and what cultural shifts are needed to transform the perception of security from a cost center to a competitive differentiator.
By the end of this discussion, attendees will gain actionable strategies for balancing protection with progress, redefining the CISO role as a catalyst for growth, trust, and organizational resilience.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceCo-Founder & CEO, Dune SecuritySr. Manager, Systems Engineering - Americas, HPEDirector, Sales Engineering, U.S., Arctic WolfExecutive Director, Head of IT Security, Natixis Corporate & Investment BankingRegistration Level:
Open Sessions
11:10 am - 11:45 amLocation / Room: Shubert/UrisToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] You Are Not a CISO, You Are a 'CO IS'Cybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
12:45 pmNetworking Break & Cyber ConnectProactive by Design: Anticipating Threats Before They StrikeRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallThe days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.
Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.
1:15 pmSecuring Enterprise AI: Practical Data Protection Strategies for AI AdoptionHead of Enterprise Security, BoxRegistration Level:
Conference Pass
1:15 pm - 1:50 pmLocation / Room: Royale1:15 pmMirror, Mirror, on the Wall, Who’s the Most Vulnerable of All?CISO, Aikido SecurityRegistration Level:
Open Sessions
1:15 pm - 1:50 pmLocation / Room: PlymouthThis presentation explores the evolving complexities of third-party risk management in today’s connected IT and IoT world. We will explore third-party risk management and the future of continuous monitoring and detection capabilities for modern and holistic cybersecurity resilience programs. Just like the magic mirror reveals hidden truths, continuous monitoring unveils vulnerabilities within our systems.
1:15 pm[Panel] Proactive Security: Building Digital Fortresses Against Modern DragonsSolutions Engineer, Sumo LogicSVP, Technical Sales & Strategic Accounts, SeceonDirector, Solutions Architecture, CohesityProfessor, Cybersecurity, Yeshiva UniversityRegistration Level:
Open Sessions
1:15 pm - 1:50 pmLocation / Room: Shubert/UrisSession details to come.
1:50 pmNetworking Break & Cyber ConnectCyber Talent Crisis: Recruiting, Retaining, and Reskilling Your TeamRegistration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallThe cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.
Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.
2:10 pmStretching Your Envelope to Supercharge Your CareerDistinguished Fellow, ISSA Hall of FameRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: RoyaleCorporate culture in America is fraught with the stifling of creativity. The fear of failure is preventing many from reaching their full potential. It is time for all of us to embrace stretching the envelope and getting uncomfortable. We all have so much to offer, that will lead to innovation and better ways to solve problems, if only our culture would stop judging and beating down good ideas that just happen to fail. We will learn more from failure than success, and until we can get past that fear of failure, we will never realize our full potentials.
2:10 pmAligning Compliance with ISO 27001 and 42001: A Unified Approach to InfoSec and AI GovernanceTechnical Lead, ISO, SchellmanDirector, ISO Certification Services, SchellmanRegistration Level:
Conference Pass
2:10 pm - 2:45 pmLocation / Room: PlymouthIn an evolving regulatory and technological landscape, organizations must manage both information security and responsible AI use. This presentation explores how aligning with ISO/IEC 27001 and ISO/IEC 42001 supports existing compliance efforts while strengthening governance, risk management, and operational resilience. Whether you’re enhancing cybersecurity or deploying AI systems, this unified approach positions your organization to meet stakeholder expectations and stay ahead of regulatory demands.
Attendees will gain insights into the synergies between these two standards, practical steps for implementation, and how certification can streamline audits, reduce risks, and demonstrate accountability.
2:10 pm[Panel] The Sorcerer's Apprentice: Taming AI in CybersecurityFormer Global COO of Cybersecurity, BNY | Founder, ELA Executive Solutions, Inc.Board Member, ISACA New York Metropolitan Chapter; CISO, Align CommunicationsAnalyst, IT Audit, NasdaqRegistration Level:
Open Sessions
2:10 pm - 2:45 pmLocation / Room: Shubert/UrisAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityFormer Global COO of Cybersecurity, BNY | Founder, ELA Executive Solutions, Inc.VP, CIO & CISO, International SeawaysGlobal Cybersecurity ExecutiveRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.Expect candid insights on topics such as:-
The toughest decisions CISOs face daily
-
Emerging threats and how security leaders are preparing
-
The future of security operations, compliance, and resilience
-
Strategies for bridging the gap between security teams and executive leadership
-
Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.3:45 pmDash for Prizes and Happy HourRegistration Level:
Open Sessions
3:45 pm - 4:15 pmLocation / Room: Networking HallStick around after the closing keynote as we announce the winners of SecureWorld’s Dash for Prizes giveaways—did your name make the list? Then raise a glass with us during Happy Hour as we celebrate a successful day of learning, networking, and collaboration.
- Aikido SecurityBooth: 450
Aikido Security (Founded 2022, Ghent) is the developer-first security platform that outperforms best-in-breed point solutions in one “no BS” platform. Aikido is built by developers for developers, consolidating code quality, code security, cloud security, runtime protection and autonomous penetration testing. The platform’s proprietary AI capabilities cut noise by 95% and provide one-click fixes that save developers 10+ hours per week. Meanwhile, Aikido Intel monitors and uncovers vulnerabilities in open source packages before they are disclosed. Aikido secures 50,000+ organizations including n8n, Niantic, Visma, Soundcloud, 8sleep, Montblanc, and GoCardless.
- Arctic Wolf NetworksBooth: 100
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- BlinkOpsBooth: 270
Automate all things security in the Blink of AI.
BlinkOps is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless.
Whether you prefer code, low-code, or no-code, BlinkOps has you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt.
Use BlinkOps as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.
- Canary TrapBooth: 440
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Cohesity, IncBooth: 340
We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. The company develops software that allows IT professionals to backup, manage, and gain insights from their data across multiple systems or cloud providers.
- Crypto ISACBooth: n/a
The Crypto ISAC is a leading industry organization dedicated to fortifying the crypto and blockchain space. Founded by pillar organizations of the crypto industry, the Crypto ISAC enables members to share and analyze real time intelligence and stop malicious actors on a fully tested and proven platform. A highly vetted membership community, that supports collaboration with the broader industry, offers the opportunity to learn through expert content and foster relationships with industry peers. The Crypto ISAC’s strong relationships with governments and NGOs enable the public-private partnerships that are required for the growth and security of the crypto industry.
- Dune SecurityBooth: 460
Security Awareness Training is Dead.
Dune Security is replacing legacy phishing simulations and security awareness training tools with a unified, automated User Adaptive Risk Management platform. It delivers User Adaptive Testing, Training, and Security to reduce administrative burden and mitigate risk. Unlike one-size-fits-all SAT models, Dune tailors security measures to each individual using intrinsic data (role, tenure), behavioral insights (red team testing), and analytics from a broad range of integrations (IDAM, EDR, DLP).
- HackNoticeBooth: 280
HackNotice not only unifies your threat intel needs in one place, but optimizes and maximizes your threat defenses in ways that no other platform can.
Whether that’s searching for any term you need, tracking the full range of compromised PII, getting real-time alerts for every hack and leak, or any of our other advantages, HackNotice is the industry standard for threat intel.
- HPEBooth: 360
Hewlett Packard Enterprise (HPE) is a global technology company that focuses on developing intelligent solutions for capturing, analyzing, and acting upon data. They operate in areas like networking, hybrid cloud, and AI, helping customers create new business models and improve operational performance.
- InfraGard New York MetroBooth: n/a
The New York City Metro InfraGard Members Alliance (NYM-IMA) is a local program of the INMA. The New York Metro InfraGard Chapter holds regular meetings and provides members with a forum for information sharing within a secure environment, while focusing on protecting the critical infrastructure of New York City and surrounding areas.
Member’s alliance are part of a national network of FBI-vetted volunteers who are critical infrastructure SME in one or more sectors. It provides a trusted forum for the real-time exchange of information, training and expertise related to the protection of critical infrastructure and key resources from both physical and cyber threats.
- IntelHawkBooth: 430
IntelHawk merges OSINT, dark web data, and vulnerability intelligence into one platform. Gain a complete, real-time view of your digital footprint, from leaked credentials to exposed infrastructure—all in a single dashboard. Driven by advanced AI, IntelHawk automatically analyzes and validates vulnerabilities and IOCs, ranking them by risk and relevance. Your team focuses on the most critical threats, cutting noise and response time. IntelHawk processes millions of signals daily while maintaining compliance and privacy standards. Scalable, secure, and always ready to defend. Your team focuses on the most critical threats, cutting noise and response time.
IntelHawk merges OSINT, dark web data, and vulnerability intelligence into one platform. Gain a complete, real-time view of your digital footprint—from leaked credentials to exposed infrastructure—all in a single dashboard.
- ISACA New York Metropolitan ChapterBooth: 480
Our Mission: As a leading ISACA chapter, our mission is to serve our membership by providing world-class training, networking opportunities, and guidance while contributing to the profession both locally and internationally. Today, ISACA is a worldwide organization with over 200 chapters and the New York Metropolitan Chapter has grown to be one of the largest ISACA chapters in the world.
Our Membership: The New York Metropolitan Chapter has over 3,800 members, from the information systems audit/assurance, information security, IT risk management, and governance professions. Our members represent a wide array of industries including financial services, accounting and consulting, legal services, education, entertainment, health care, retail, public utilities, and government/regulatory entities – and hold positions ranging from entry level staff to senior management.
- ISC2 New York City & Long IslandBooth: 140
ISC2 is based out of Palm Harbor, Florida and consists of over 80,000 members worldwide. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques.
Membership
Our members consist of ISC2 credentialed professionals who hold either a SSCP, CAP, CSSLP, and/or a CISSP or advanced concentration certification. Our chapter program is focused on sharing knowledge and exchanging ideas among security professionals in the local area. Ultimately, we want to advance the field of information security by educating practitioners and the public at large on how to protect and defend against security threats. Learn more about the benefits of becoming a Chapter Member, visit our Membership page. - ISC2 Philadelphia ChapterBooth: 130
Welcome to the ISC2 Philadelphia Chapter, your trusted hub for cybersecurity excellence in the City of Brotherly Love. As a local chapter of the esteemed International Information System Security Certification Consortium (ISC2), we are dedicated to advancing the cybersecurity profession and building a robust community of security enthusiasts, professionals, and experts in the Greater Philadelphia area. We come from a wide range of industries but share a passion of promoting cybersecurity knowledge, facilitating professional growth, and fostering connections among individuals who share a passion for safeguarding our digital world.
- JitBooth: 220
Jit enables you to automate product security by quickly enabling full-stack scanning coverage, prioritizing the real risks, and empowering developers to deliver secure code faster.
- Legato SecurityBooth: 250
Our mission is to provide comprehensive, customer-centric managed cyber security services that effectively manage and mitigate cyber risks on behalf of our customers. We continually adapt and innovate our services to stay ahead of emerging threats and evolving technologies, delivering peace of mind and enabling our customers to focus on their core business objectives. With a team of dedicated experts and cutting-edge technologies, we strive to build trusted partnerships, deliver exceptional value, and safeguard our customers’ digital assets with unwavering commitment.
- ProjectDiscoveryBooth: 300
ProjectDiscovery helps security teams detect real, exploitable vulnerabilities without the noise. We combine open source power with enterprise-grade scale, starting with Nuclei, our fast, customizable vulnerability scanner trusted by thousands of engineers. Nuclei delivers attacker-like detections using conditional logic, enabling teams to move beyond version matching and catch what truly matters. Trusted by teams at Elastic, Vercel, and thousands more, ProjectDiscovery brings open-source flexibility to enterprise workflows, enabling full visibility and faster remediation in minutes with zero setup friction. Start with Nuclei. Scale with ProjectDiscovery.
- Radiant SecurityBooth: 110
Radiant Security’s Adaptive AI SOC platform is designed for enterprise security teams that want to address 100% of the alerts they receive from any tool or sensor. Ingesting, understanding, and triaging alerts from any security vendor or data source, Radiant ensures no real threats are missed, provides automated remediation, cutting response time from days to minutes, enabling analysts to focus on true positives and proactive security. Unlike other AI SOC solutions, which are constrained to predefined security use cases, Radiant dynamically addresses all security alerts, eliminating analyst burnout and the inefficiency of switching between multiple tools. Additionally, Radiant delivers affordable, high-performance log management directly from customers’ existing storage, dramatically reducing costs and eliminating vendor lock-in associated with traditional logging solutions.
- Reach SecurityBooth: 120
Reach is defining AI-Native Exposure Management by bridging the gap between knowing where you’re exposed and taking action to fix it. We help organizations reduce risk by making better use of the tools they already have delivering clarity, prioritization, and automation to turn understanding into results.
- Seceon Inc.Booth: 210
Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.
What Sets Seceon Apart:
- Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
- AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
- Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
- Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.
Why Organizations Choose Seceon:- Cut cybersecurity costs by 60% by replacing siloed tools
- Stop threats faster with AI-powered detection and automated response.
- Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.
Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.
- Sumo LogicBooth: 370
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
- Tevora + ProcessUnityBooth: 260
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.
ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources. For more information, visit https://www.processunity.com.
- ThreatLockerBooth: 230
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- WallarmBooth: 380
Wallarm is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their APIs and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service. Customers can deploy Wallarm to protect legacy and brand new cloud-native APIs. Wallarm’s multi-cloud platform delivers capabilities to secure businesses against existing and emerging API threats.
- WiCyS NY Metro AffiliateBooth: n/a
Women in CyberSecurity (WiCyS) NY Metro Chapter was established in 2019 to promote engagement, encouragement and support for women in cybersecurity throughout NY, NJ, and CT. We are the local chapter of the premier organization with national reach dedicated to bringing together women and allies in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring. Once a month, people in the information security community gather to discuss the latest trends in the industry and forge connections with other individuals in the community.
- ZeroFoxBooth: 200
Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.
Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.
Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson CyberLarry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
Vlad BrodskySVP, CIO & CISO, OTC Markets Group Inc.Vlad Brodsky is the SVP, Chief Information Officer and Chief Information Security Officer at OTC Markets Group, a regulated publicly traded financial institution that operates the world’s largest OTC equity electronic marketplace. His responsibilities include leading the firm’s information security strategy, program, and processes as well as running the firm’s IT operations and infrastructure. Vlad has expertise in Information Security, Risk Management, IT Infrastructure Management and Financial Services. He serves as a board member of the New York chapter of the Society for Information Management (SIM), acts as an advisor to multiple organizations, and invests in early-stage tech companies.
Jane DomboskiCISO, OneMain FinancialJane Domboski currently serves as the Chief Information Security Officer (CISO) for OneMain Financial. She is both an attorney and cybersecurity practitioner, having served in the public and private sectors. In the public sector, Ms. Domboski investigated cybercrime, cyber terrorism, and cyber espionage as an FBI Agent for more than 20 years. Her private sector experience includes running the global Cyber Operations for SC Johnson and Cyber Strategy, Governance, and Compliance for Deloitte Global.
Mike WilkesCISO, Aikido SecuritySenior professional with broad experience designing, building, and securing high-availability mission critical infrastructures for the infosec, financial services, energy, healthcare, travel, media, and retail sectors.
Afzal KhanGlobal CISO, OPKO HealthAfzal Khan is a distinguished leader in the field of technology security and risk management, bringing over 26 years of expertise to his role. Currently serving at OPKO, he provides strategic direction and guidance on technology risk management, IT, OT, and cybersecurity, ensuring compliance with IT regulatory standards across domestic and international entities. Afzal's extensive experience includes notable positions such as the Global Head of IT Security, Risk Management & Compliance at Everest Reinsurance, where he led critical projects and built robust organizational teams. He holds 7 security and risk management certifications, including CISSP, CISA, and CRISC, underscoring his deep knowledge in the field. Afzal is renowned for his visionary approach, aiming to establish a secure technology platform aligned with business objectives, emphasizing a business-focused and risk-based approach to security decisions. His dedication to operational excellence and adaptability in the face of disruptive technologies have made him a trusted leader in the industry.
Tom BrennanCIO, Mandelbaum Barrett PCTom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrastructure Security Agency’s 16 critical infrastructure sectors which are vital to U.S. security, national economy, and public health and safety. As CREST USA Chairman, Brennan spearheads strategic plans for CREST USA’s organizational growth while also serving as an industry evangelist and educator on the value of using accredited cybersecurity products and professionals to improve consumer privacy, security, and protection worldwide.
As a proud U.S. Marine veteran, Brennan became involved with CREST International in 2016 while serving the Global Board of Directors for the Open Web Application Security Project (OWASP). Seeing similar goals, he became more active in the CREST organization and was nominated to lead the organization’s U.S. Advisory in 2019. Over his career, Brennan has amassed security expertise across the cybersecurity spectrum, including penetration testing, vulnerability assessment, application security, threat intelligence, and more. In addition to being CREST USA Chairman, he is the Chief Information Officer of the national law firm Mandelbaum Barrett, overseeing critical infrastructure, privacy, and security operations. He is also an Advisory Board Member of the information services advisory Gerson Lehrman Group, a Cyber Fellows Advisory Council Member, a Member of the Information Technology Advisory Committee of the County College of Morris, a Senior Advisor and Industry Advisory Board Member of the New Jersey Institute of Technology, and a Cyber Fellows Advisory Council Member of the NYU Tandon School of Engineering.
Justine BoneExecutive Director, Crypto ISACJustine Bone is the Executive Director of Crypto ISAC, leading global collaboration on threat intelligence and resilience for the cryptocurrency and blockchain ecosystem. A recognized leader in cybersecurity and risk management, she has driven major enterprise security initiatives at Bloomberg LP and Dow Jones, and previously served as CEO of Immunity Inc. and MedSec, where her team’s research led to industry-shifting FDA recalls.
Justine serves on the Black Hat Review Board and Black Hat Financial Services Summit Advisory Board, and is a faculty member at the Institute for Applied Network Security (IANS). A dual U.S.–New Zealand citizen, she continues to advise organizations worldwide on building resilience and trust in emerging technologies.
David SchwedFormer CISO, Robinhood
Praveen NallasamyDirector, Global Head of Product Security, BlackRock
Joseph Brown, ModeratorAVP, Security Engineering & Operations, Vantage Risk Companies
David DellaPelleCo-Founder & CEO, Dune SecurityDavid DellaPelle is the Co-Founder and CEO of Dune Security. With a visionary yet pragmatic approach, he leads Dune in tackling one of today's most pressing enterprise challenges: employee-based cyber risks. David holds a BS in Economics and Management from Cornell University and an MBA from NYU, where he received the prestigious Andre Koo Tech Scholarship. He drove security product innovation and revenue growth at leading cybersecurity and AI companies, including Perimeter 81, At-Bay, and Waycare, following an early career in management consulting at EY.

Ravi PatelDirector, Sales Engineering, U.S., Arctic WolfRavi Patel is a seasoned technology leader with more than two decades of experience driving innovation and excellence in sales engineering across the cybersecurity and data management industries. Currently serving as Director of Sales Engineering at Arctic Wolf, Ravi leads a highly specialized team at one of the most disruptive cybersecurity companies in the world.
Prior to Arctic Wolf, Ravi held strategic leadership roles at Cohesity, Informatica, and Code42 (acquired by Mimecast), where he built and scaled high-performing technical teams, spearheaded digital transformation initiatives, and served as a trusted advisor to executive stakeholders. His tenure at Hitachi Data Systems as Global Technical Alliance Director saw him managing global partnerships and developing methodologies for building hybrid sales and technical teams.
Known for his ability to blend deep technical knowledge with strategic vision, Ravi is passionate about mentoring talent, fostering innovation, and delivering customer-centric solutions that drive business outcomes.
Peter Tse, ModeratorExecutive Director, Head of IT Security, Natixis Corporate & Investment BankingWith more than 25 years of experience in financial services, information security, and information technology, Peter has expertise in cybersecurity governance, risk management, and cybersecurity technologies.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Akhila NamaHead of Enterprise Security, BoxAkhila Nama leads the Enterprise Security organization at Box where she oversees security design, strategy, architecture and risk management, with a focus on securing modern enterprise environments while driving business growth. With more than a decade of experience, Akhila has worked through multiple roles and domains, helping organizations navigate complex threats while building security programs and teams that scale.
Mike WilkesCISO, Aikido SecuritySenior professional with broad experience designing, building, and securing high-availability mission critical infrastructures for the infosec, financial services, energy, healthcare, travel, media, and retail sectors.
Jeff DingSolutions Engineer, Sumo LogicJeff brings more than a decade of experience across software engineering, solutions architecture, and application security. Before joining Sumo Logic, he was a hands-on practitioner and power user of multiple logging and SIEM platforms, including Sumo. Today, Jeff leverages that background to partner with customers as a trusted advisor, helping them optimize their security posture, modernize detection strategies, and design resilient defenses against evolving threats.

Stephen GyarmatiDirector, Solutions Architecture, CohesityStephen Gyarmati is a Director of Solutions Architecture at Cohesity responsible for the eastern United States and Canada. In his current role, he interfaces with large enterprise industry professionals to accelerate their adoption of the Cohesity data security and management platform. Stephen has worked in Systems Engineering roles in the New York City metro area, including at both Cohesity and Commvault. Stephen has 13 years of experience in data protection and storage technologies, and he holds an MS in Information Systems degree from Drexel University.
Alexander Abramov, ModeratorProfessor, Cybersecurity, Yeshiva UniversityAlex Abramov is a senior leader in Technology and Cyber Governance, Risk, and Compliance with a strong track record of accomplishments across all three lines of defense—Controls, Risk, and Audit. He has created and led highly-effective IT and Cyber risk management programs that addressed regulatory requirements and enabled business growth, expansion, and acquisitions.
Previously, Alex has served as the Head of Information and Cyber Risk at Santander Capital Markets, Director of Information Risk at Bank of New York Mellon, Technology Risk Controller and Lead IRM at JP Morgan, Practice Leader for IT Governance and Compliance, and IT Audit Lead at EY, and a Head of Application Development and a DISO at Bristol-Myers Squibb.
Alex has served as the President of ISACA New York Metropolitan Chapter 2017-2019, and as a member of the Board of Directors since 2007. He is a recipient of the 2022 and 2023 ISACA NYM Helping Hands Awards for “Outstanding Service for the President, Board, and Membership.”
Richard GreenbergDistinguished Fellow, ISSA Hall of FameRichard Greenberg, a well-known Cyber Security leader, evangelist, advisor, and speaker, has over 30 years of management experience, including 15 years as a CISO. He is an ISSA International Distinguished Fellow and has been inducted into their Hall of Fame. He is president of the ISSA LA Chapter. You may have heard Richard’s interview as a Cyber Security expert on Will Ferrell’s Ron Burgundy podcast: https://www.iheart.com/podcast/the-ron-burgundy-podcast-30270227/episode/cyber-security-47951911/. Richard is the Founder and CEO of Security Advisors LLC, offering security risk assessments, software security testing, and penetration testing, allowing organizations to continuously assess their cyber risk posture and meet compliance requirements.
Indre GrigaityteTechnical Lead, ISO, SchellmanIndre Grigaityte is based out of Jersey City, NJ, and specializes in ISO certification services at Schellman. With more than a decade of professional experience in information security and compliance, Indre has served clients in numerous industries, often navigating large and complex control environments, scopes, and requirements. Indre is passionate about empowering organizations to identify meaningful control improvements and implement solutions that make compliance both effective and sustainable.
Jason LamDirector, ISO Certification Services, Schellman
Elizabeth AgostoFormer Global COO of Cybersecurity, BNY | Founder, ELA Executive Solutions, Inc.
Alex BazayBoard Member, ISACA New York Metropolitan Chapter; CISO, Align Communications
Krishnan IyerAnalyst, IT Audit, Nasdaq
Elizabeth AgostoFormer Global COO of Cybersecurity, BNY | Founder, ELA Executive Solutions, Inc.
Amit BasuVP, CIO & CISO, International SeawaysAmit is a Maritime IT and Cybersecurity leader with more than 30 years of global experience driving digital transformation, operational efficiency, and enterprise risk management. As CIO & CISO of one of the world’s largest energy transportation companies, I lead multi-cloud strategies, AI-driven innovation, and cybersecurity programs that safeguard critical operations worldwide.
Yonesy NúñezGlobal Cybersecurity ExecutiveYonesy Núñez serves as Managing Director and Chief Cybersecurity Risk Officer at The Depository Trust & Clearing Corporation (DTCC), reporting into the Group Chief Risk Office (GCRO). In this role, Yonesy leads the second line of defense for cybersecurity oversight, responsible for cybersecurity policies, standards, risk assessments, monitoring, and independent validation across the enterprise. His team provides independent challenge to cybersecurity controls, enhances cyber risk management effectiveness, and supports a proactive security posture aligned to DTCC’s regulatory and operational resiliency objectives.
Prior to assuming his current role, Yonesy served as DTCC’s Chief Information Security Officer, leading the firm’s Information Security and Technology Risk Management efforts as it advanced its modernization strategy. Before joining DTCC, he was CISO at Jack Henry & Associates and held senior cyber roles at Wells Fargo, Citi, and PricewaterhouseCoopers.
He is President Emeritus and co-founder of the InfraGard Chapter of Long Island, New York. He currently serves on the Boards of Directors for Pentegra Retirement Services, Chain Bridge Bancorp, Chain Bridge Bank N.A., the STEM Advisory Board for Mercy College, and the Hispanic Security Executive Council (Hi-SEC). He is also a member of the Latino Corporate Directors Association and the Black Board Initiative and holds numerous industry certifications.
Yonesy earned a Doctorate in Computing from Pace University, a Master of Science in Information Systems Engineering from NYU Tandon School of Engineering, and a Bachelor of Science in Finance and Computer Information Systems from Manhattan College. He has been recognized on the Hispanic IT Executives Council’s list of the Top 100 Most Influential Hispanic Leaders in Technology.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes













