- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, December 13, 20238:30 amExhibitor Hall openRegistration Level:
- Open Sessions
8:30 am - 3:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:00 am[Opening Keynote] Privacy Update: Sorting Surveillance Benefits from Harms in an IoT WorldThe Privacy Professor; CEO, Privacy & Security BrainiacsRegistration Level:- Open Sessions
9:00 am - 9:45 amTracking technologies are proliferating at an increasingly high rate in apps, IoT devices, websites, and in a wide range of files. They are not only impacting privacy in wider and more harmful ways, but they have also extended far beyond the digital world and are also impacting physical safety. Such tools can certainly be very beneficial, when used responsibly and with informed awareness of the cybersecurity and privacy risks. However, when they are used without establishing technical and non-technical boundaries, and without taking risk mitigation actions, the associated surveillance activities can, and have, brought physical harms. I was an expert witness for a case a couple of years ago involving a stalker’s use of his victim’s smart car to find and almost fatally assault her. I’m currently an expert witness for two separate cases involving the use of Meta Pixels, Conversion APIs, cookies, and other types of tracking tech for surveillance of online activities. Virtually daily there are news articles reporting privacy invasions by digital trackers, drones, security cameras, and more. I will provide several real-life use cases, and provide discussion for the technical and non-technical capabilities that possibly could have been identified through risk assessment activities prior to making such products publicly available and informed the needed associated security and privacy capabilities, that would have supported privacy and cybersecurity protections and physical safety.
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:00 amLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:00 amThreat Intelligence: Industrialization of Cyber Fraud and AIFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:- Open Sessions
10:00 am - 10:45 amThe presentation will cover the Secret Service’s view on current cybercrime trends to include the emergence of AI/ML in the cybercrime world. Investigator Dougherty will frame it in the lens of BEC (Business Email Compromise) and discuss the new and emerging advancements cybercriminals are using to victimize businesses in 2023 and beyond. Investigator Dougherty may even share a a deepfake of himself.
10:00 amPAM Back to BasicsChief Security Scientist & Advisory CISO, DelineaRegistration Level:- Open Sessions
10:00 am - 10:45 amWith so many high-profile breaches accomplished through compromising passwords on privileged accounts, PAM is a top priority for organizations of all sizes. Join Delinea’s Chief Security Scientist Joseph Carson, as he takes you on a brief journey through the PAM lifecycle to get you quickly up to speed and understand the PAM matrix of all the different types of privileged accounts that exist across all your different IT domains, often referred to as your privileged account attack surface.
10:45 amNetworking BreakRegistration Level:- Open Sessions
10:45 am - 11:00 amVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:00 amInsider Threat: Clever Tactics Your Adversaries Use to Infiltrate Your OrganizationCEO & Founder, Center for Threat IntelligenceRegistration Level:- Open Sessions
11:00 am - 11:45 amThe insider threat landscape continues to evolve and change. Organizations can expect to see increases in volume and severity. To achieve their goals, threat actors will use complex activities and recruitment strategies to achieve their goals. In order to anticipate and prevent insider threat, you need to know their activities and recruitment strategies!
11:00 amSecure by Default: Evolving Security ExpectationsCISO, AutomoxRegistration Level:- Open Sessions
11:00 am - 11:45 amCISA recently released their paper on “Secure by Design, Secure by Default” software that has support from seven major governments. It is meant to make significant, achievable improvements in software security. We will discuss the Secure by Default concept, why it is important, and what customers and vendors can do about it today.
11:45 amNetworking BreakRegistration Level:- Open Sessions
11:45 am - 12:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmSafeguarding Ethical Development in AI and Other LLMsA Comprehensive Approach to Integrating Security, Psychological Considerations, and GovernanceChapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin CollegeRegistration Level:- Open Sessions
12:00 pm - 12:45 pmSession description coming soon.
12:00 pm[Panel] Security on the Horizon: Current Threats and Future ProjectionsDirector, Solutions Engineering and Alliances, AutomoxRegional Vice President of Sales, ForgeRockRVP, Sales Engineering Strategy, RubrikRegistration Level:- Open Sessions
12:00 pm - 12:45 pmWith the rapid advancement of technology, the ever-expanding digital footprint, and the sophistication of cyber adversaries, understanding current threats is crucial for developing proactive defense strategies. This panel will bring together experts and thought leaders to discuss the state of cybersecurity, analyze prevalent threats, and forecast potential cyber threats and trends for the coming year. By examining the latest tactics, techniques, and procedures used by threat actors, and leveraging collective expertise, the panel endeavors to provide actionable insights to bolster cyber resilience and safeguard critical digital assets in the face of evolving cyber threats. Join our panel and get actionable items that you can start doing now!
12:00 pmDebate: Does the Profit Motive of Vendors Make Security Harder for CISOs?Co-Founder & Podcast Host, Colorado = SecurityCISO, Uplight; Co-Host, Colorado = Security podcastRegistration Level:- Open Sessions
12:00 pm - 12:45 pm12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmMitigating AI Risks: New Solutions to Address AI/ML LiabilityMember, Data Privacy & Cybersecurity, Clark Hill LawHead of AI Policy and Assurance, Armilla AssuranceGlobal Privacy and InfoSec Attorney, eBayRegistration Level:- Open Sessions
1:00 pm - 1:45 pm2023 has seen the emergence of class action lawsuits filed against businesses for their use of AI/ML technologies. Other actions are sure to follow as plaintiffs firms find novel ways to fit the use of AI tools into existing legal regimes prohibiting discrimination and requiring product safety, transparency and fairness. This presentation will give an overview of some of the litigations and enforcement actions seen in the AI/ML space to date, with legal strategies for how businesses can work to develop a legally defensible compliance program, including AI assessments, in line with emerging AI regulatory and risk management frameworks. The presentation will feature Philip Dawson from Armilla Assurance, the first company to offer a warranty product backed by major insurers that seeks to verify and warrant certain features of an AI tool.
1:00 pmEmerging Human Risk Trends of 2023Threat Operations Lead, HoxhuntContent Marketing Lead, HoxhuntProduct Marketing, HoxhuntRegistration Level:- Open Sessions
1:00 pm - 1:45 pmKeeping up to date on real-world cyber threats is an important part of understanding the evolving landscape of cyber-attacks and preventing your next big breach. In this webinar, the Hoxhunt Threat team recaps some of the biggest threats they’ve seen so far in 2023 and showcases the results of a recent QR phishing experiment. Then, experts explain how to shape your cybersecurity agenda based on threat insights.
1:45 pmNetworking BreakRegistration Level:- Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmLessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn SolesCISO, State of North DakotaRegistration Level:- Open Sessions
2:00 pm - 2:45 pmIn a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.
2:00 pmA Whole Lotta BS (Behavioral Science) About CybersecurityExecutive Director, National Cybersecurity AllianceRegistration Level:- Open Sessions
2:00 pm - 2:45 pmLet’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security. We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.
2:00 pmTriad of Trust: Executive, Vendor, and Team Dialogue in Risk ManagementTechnical Sales Engineer, Trend MicroRegistration Level:- Open Sessions
2:00 pm - 2:45 pmExplore the intricacies of what it takes to achieve risk-resilient communication within your organization’s framework. Learn how a collaborative dialogue between executive leadership, cybersecurity teams, and vendors fosters a unified front against emergent security risks. Expand your knowledge towards attack surfaces and the pivotal role of XDR technologies and Zero Trust Architecture in managing and mitigating risks.
2:45 amNetworking BreakRegistration Level:2:45 am - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pm[Closing Keynote] Cyber Intel BriefingCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:- Open Sessions
3:00 pm - 3:45 pmThis presentation will provide a comprehensive overview of the current cyber landscape, focusing on both global and domestic government-related threats and incidents. We will delve into recent high-profile attacks, explore emerging trends, and discuss the evolving tactics employed by cybercriminals and nation-states. Additionally, the presentation will examine the ongoing challenges faced by governments in protecting critical infrastructure, securing sensitive data, and mitigating the risks posed by cyber espionage. By understanding the latest developments in the cyber threat environment, attendees will gain valuable insights into safeguarding government networks and systems.
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- CRESTBooth:
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- DelineaBooth:
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
- ForgeRock / Ping IdentityBooth:
ForgeRock is a global leader in digital identity that delivers modern and comprehensive identity and access management solutions for consumers, employees, and things to simply and safely access the connected world. Using ForgeRock, more than 1,300 global customer organizations orchestrate, manage, and secure the complete lifecycle of identities from dynamic access controls, governance, APIs, and storing authoritative data—consumable in any cloud or hybrid environment. The company is headquartered in San Francisco, California, with offices around the world.
For more information and free downloads, visit www.forgerock.com or follow ForgeRock on social media.
- HoxhuntBooth:
Data breaches start with people, so Hoxhunt does too. We combine cognitive automation with the human touch to create individualized adaptive training experiences employees love, and a managed service model enterprises depend on.
- National Cybersecurity AllianceBooth:
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- RubrikBooth:
Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.
- Trend MicroBooth:
Trend Micro, a global leader in cybersecurity, is passionate about making the world safe for exchanging digital information, today and in the future. Artfully applying our XGen™ security strategy, our innovative solutions for consumers, businesses, and governments deliver connected security for data centers, cloud workloads, networks, and endpoints. www.trendmicro.com.
- Rebecca HeroldThe Privacy Professor; CEO, Privacy & Security Brainiacs
Rebecca Herold has more than 30 years of security, privacy, and compliance experience. She is founder of The Privacy Professor Consultancy (2004) and of Privacy & Security Brainiacs SaaS services (2021) and has helped hundreds of clients throughout the years. Rebecca has been a subject matter expert (SME) for the National Institute of Standards and Technology (NIST) on a wide range of projects since 2009, including: seven and a half years leading the smart grid privacy standards creation initiative, and co-authoring those informative references and standards; two years being a co-author of and a SME member of the team that created the Privacy Framework (PF) and associated documents; and three years as a SME team member, and co-author of the Internet of Things (IoT) technical and non-technical standards and associated informative references; and performing throughout the years proof of concept (PoC) tests for a variety of technologies, such as field electricity solar inverters, PMU reclosers, and associated sensors. Rebecca has served as an expert witness for cases covering HIPAA, privacy compliance, criminals using IoT devices to track their victims, stolen personal data of retirement housing residents, tracking apps and website users via Meta Pixels and other tracking tech, and social engineering using AI. Rebecca has authored 22 books, and was adjunct professor for nine and a half years for the Norwich University MSISA program. Since early 2018, Rebecca has hosted the Voice America podcast/radio show, Data Security & Privacy with the Privacy Professor. Rebecca is based in Des Moines, Iowa, USA. www.privacysecuritybrainiacs.com
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Joseph CarsonChief Security Scientist & Advisory CISO, Delinea
Joseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical infrastructure, financial, and maritime industries.
- Janet LawlessCEO & Founder, Center for Threat Intelligence
Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge holistic threat intelligence program including assessments, consulting and training. Janet’s former leadership roles at Microsoft and Cisco, creating and managing global programs focused on compliance and security, in addition to her work at a cyber-security start-up, brings a wealth of knowledge in security services. Janet is currently the Chair for ASIS International Puget Sound Chapter, and former Committee Chair for Women in Security. She is Chair Emeritus for the Pacific Coast Analyst Roundtable and a former Board Member for the American Red Cross. She is also a member of InfraGard, the United States Secret Service Cyber Fraud Task Force and the Washington State Fusion Center.
- Jason KiktaCISO, Automox
Jason Kikta is the Chief Information Security Officer at Automox. He previously served for over 20 years in the United States Marine Corps, which included seven years at U.S. Cyber Command designing and managing the national counter-APT and counter-ransomware missions.
- Kimberly KJ HaywoodChapter VP, ISC2 Dallas-Ft. Worth; Adjunct Cybersecurity Professor, Collin College
Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.
- Katherine ChipdeyDirector, Solutions Engineering and Alliances, Automox
Katherine Chipdey has spent her career in Cybersecurity, consulting on how to simplify our understanding of the threat landscape and building programs for thousands of customers around EDR, SOAR, and MDR. At Automox, she helped build out the Solutions Engineer Team, where she focused on automating IT operations, reducing risk, and bridging that gap between security and IT for prospects and customers alike. Katherine now manages the technical channel relationships, enabling other IT and Security experts on how to use Automox in order to help their customers meet business needs and critical security goals like never before. Katherine has most enjoyed the opportunity to use her background and experiences in the the field to meet security/ IT teams, and enable them to be as successful as possible with their initiatives. Where a relationship can be made, she will try, as those meaningful interactions and the growth, learning, and connection they bring are invaluable to her. Outside of work, she could spend forever talking about her travels, archery, and pups.
- Connie GlaspieRegional Vice President of Sales, ForgeRock
RVP of Sales serving Western North America & LATAM for the global digital leader ForgeRock. Leading a team of security sales professionals, responsible for managing some the world’s largest enterprises throughout Western Canada & USA, Argentina, Chile, Peru, Columbia, Mexico and Brazil.
Connie brings over 19+ years of digital identity industry experience (identity, access management, directory, API management, App Sec, & data masking), strong leadership skills required for coaching high-performing sales organizations to deliver the expected business outcomes of leading global enterprises.
Her passion is helping organizations leverage digital identity as a competitive advantage to drive top-line revenue, while mitigating risk and driving down cost. Connie has worked for several start-ups including ForgeRock – leading global digital identity industry; Veracode – cloud-Application Risk Management leader; Delphix – leading Data Masking provider; and 19+ years in identity, access management, advanced auth, and directory, at CA Technologies and most recently www.forgerock.com.
- Robb ReckCo-Founder & Podcast Host, Colorado = Security
Robb Reck, MBA, CISSP, is an information security and risk professional, with over 20 years of experience in IT, Compliance, and Information Security. Reck has created comprehensive application security programs for multiple financial institutions.
- Alex WoodCISO, Uplight; Co-Host, Colorado = Security podcast
Alex Wood is currently the CISO for Uplight and has more than 18 years of experience in information security. Previously, he has had managerial, program, and technical roles at several major companies in different verticals. Additionally, Alex has served on the Board of Directors for ISSA International and is a host of the Colorado = Security podcast. Alex is a CISSP and has an MAS in Information Security from the University of Denver.
- Myriah V. Jaworski, Esq., CIPP/US, CIPP/EMember, Data Privacy & Cybersecurity, Clark Hill Law
Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.
- Philip DawsonHead of AI Policy and Assurance, Armilla Assurance
- Benjamin BenhanGlobal Privacy and InfoSec Attorney, eBay
With over six years of experience in privacy and data governance, Ben is a passionate and driven global privacy and infosec attorney at eBay, where he helps the company navigate the complex and evolving regulatory landscape of data protection and cyber security. He has a strong background in computer science, cyber security, network engineering, and law, as well as multiple certifications that demonstrate his proficiency and credibility in the field. He is motivated by the challenge of balancing the needs and interests of various stakeholders while ensuring the highest standards of compliance, ethics, and risk management. He values diversity, innovation, and collaboration, and enjoys working with a dynamic and cross-functional team that shares his vision of creating a safe and trusted online marketplace for millions of users worldwide.
In his current role, he advises eBay on global privacy and infosec matters, including developing and implementing policies, procedures, and best practices in privacy, security, and data governance. He leads global efforts in vendor risk management and data processing agreements, and has experience conducting privacy impact assessments, responding to data breaches and incidents, and liaising with regulators, customers, and partners. He leverages his skills in cyber policy, data privacy, and legal aspects to provide practical and strategic solutions that align with the company's business objectives and values. He also contributes to the continuous improvement and education of the privacy and infosec programs by staying updated on the latest trends, developments, and standards in the industry, and by sharing his insights and expertise with his colleagues and peers.
- Michael GreggCISO, State of North Dakota
Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.
With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.
- Lisa PlaggemierExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
- Scarlett MenendezTechnical Sales Engineer, Trend Micro
Scarlett Menendez is a cybersecurity professional with a specialization in cyber threat intelligence and programming in Seattle. Holding a distinguished position at Trend Micro, she has dedicated herself to providing insights on the evolving landscape of cyber threats, and offers strategic counsel on fortifying organizational infrastructures with Trend Micro's solutions. Scarlett is the founder of the TechShe Committee: a Tech Empowerment Initiative for Women at Trend Micro. Furthermore, her philanthropic efforts extend to Neural Oceans, an initiative dedicated to offering open-source technology education to schools in economically challenged communities. As the global landscape pivots towards Generative AI and decentralization, Scarlett promotes thought leadership on pen-testing with AI, and ensuring robust cybersecurity measures within the industry.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.
With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.
VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.
VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes