googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, December 11, 2024
    8:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 3:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:00 am
    OPENING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:00 am
    Pig Butchering, BEC, and Artificial Intelligence: What the Secret Service Wants You to Know
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Session description to come.

    10:00 am
    Converged Identity Platforms: The Power of One
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Identity security has quickly become the keystone for strong cybersecurity programs. But many identity security programs suffer from the same challenges as others – a series of disjointed point solutions that do little to simplify management and governance, limiting overall program effectiveness. Lack of cohesive programs increase costs, complicate tech stacks, and limit buy-in from the rest of the organization which does little to minimize enterprise risk.

    In this presentation, Saviynt Vice President of Product Management John Wang will discuss the key concepts that have proven successful for organizations adopting converged identity platforms and how they can streamline security programs, limit enterprise risk, and reduce total cost of ownership – all while increasing ROI.

    Discussion topics for this session will include:

    • Today’s identity security challenges
    • Drawbacks of point solutions
    • Defining convergence
    • The business benefits of CIPs
    • Choosing the right CIP for you
    10:00 am
    Security Awareness: Cyber Hygiene from the Inside Out
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    With proper training, employees are a huge asset, not a hinderance, when it comes to keeping organizations safe from within.

    10:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:00 am

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:00 am
    Introduction to Adversarial Machine Learning
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    With the increased reliance and use of machine learning across all industries, the attack surface in many organizations’ environments has increased. Although machine learning has many benefits, it also leads to new risks. It is crucial to understand the new security risks that machine learning brings in order to protect systems that rely on these technologies. In this presentation, attendees will learn about the different types of attacks that machine learning is vulnerable to. In addition, attendees will gain an understanding of the difference between artificial intelligence and machine learning, what adversarial machine learning is, how machine learning attacks occur, real-world case studies, and an introduction to current open-source tools offered by the industry to ensure that machine learning has been secured. By the end of the presentation, attendees will have an understanding of machine learning and its contributions to the cyber threat landscape as well as some measures they can take to increase the security of machine learning.

    11:00 am
    Securing Your Sensitive Assets in a Cloud-First World
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Key take-away: 
    How to rethink database security controls in a cloud-first world.

    For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:

    • Amount of data created, collected, and stored
    • Number of repositories storing sensitive data across clouds
    • Number of users and applications that need access to data
    11:00 am
    Demystifying Zero Trust and Its Role in Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Securing the Supply Chain
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    A discussion of managing third-party risk and how to manage expectations and contracts with vendors.

    12:00 pm
    Lessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn Soles
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.

    12:00 pm
    Telling Your Cybersecurity Story: Meeting the SEC’s New Disclosure Requirements
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Groundbreaking new cybersecurity regulations from the U.S. Securities and Exchange Commission (SEC) now require companies to disclose critical information about their cybersecurity programs to investors and shareholders.

    How can technology leaders effectively tell their company’s cybersecurity story now? What do investors want — and need — to know about cybersecurity?

    This session will help attendees understand the new requirements, learn real-world examples of effective cybersecurity disclosure, and identify future initiatives.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Secure by Default: Evolving Security Expectations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    CISA recently released their paper on “Secure by Design, Secure by Default” software that has support from seven major governments. It is meant to make significant, achievable improvements in software security. We will discuss the Secure by Default concept, why it is important, and what customers and vendors can do about it today.

    1:00 pm
    How to Manage AI Risk to Let Innovation Prosper
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Join this risk-and-compliance-crossover session to learn how to navigate the complexities of AI risk and create a secure environment for innovation. While AI is often seen for its tremendous benefits or doomsday scenarios, attorneys and regulators actually advocate for a balanced approach that treats AI risk like any other risk assessment—considering priorities, efficiencies, security, and more. This session will examine AI risk from legal, regulatory, technical, and cultural perspectives, offering strategies to balance these without hindering AI-driven advancements. We all aim to be the “first out of the gate” in AI, but we must get there safely.

    1:00 pm
    Cybersecurity as a Business Driver
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Savvy would-be customers be research companies and typically prefer to do business with those who have good cyber hygiene. How can a strong security posture be a business driver for your organization?

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    CLOSING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
Exhibitors
  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

Return to Agenda
Keynote Speakers
Speakers
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Learn and connect virtually

Learn from cyber leaders on relevant, timely security topics. Reserve your spot today!