- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, December 11, 20248:30 amExhibitor Hall openRegistration Level:
- Open Sessions
8:30 am - 3:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:00 amOPENING KEYNOTERegistration Level:- Open Sessions
9:00 am - 9:45 am9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:00 amLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:00 amPig Butchering, BEC, and Artificial Intelligence: What the Secret Service Wants You to KnowRegistration Level:- Open Sessions
10:00 am - 10:45 amSession description to come.
10:00 amConverged Identity Platforms: The Power of OneRegistration Level:- Open Sessions
10:00 am - 10:45 amIdentity security has quickly become the keystone for strong cybersecurity programs. But many identity security programs suffer from the same challenges as others – a series of disjointed point solutions that do little to simplify management and governance, limiting overall program effectiveness. Lack of cohesive programs increase costs, complicate tech stacks, and limit buy-in from the rest of the organization which does little to minimize enterprise risk.
In this presentation, Saviynt Vice President of Product Management John Wang will discuss the key concepts that have proven successful for organizations adopting converged identity platforms and how they can streamline security programs, limit enterprise risk, and reduce total cost of ownership – all while increasing ROI.
Discussion topics for this session will include:
- Today’s identity security challenges
- Drawbacks of point solutions
- Defining convergence
- The business benefits of CIPs
- Choosing the right CIP for you
10:00 amSecurity Awareness: Cyber Hygiene from the Inside OutRegistration Level:- Open Sessions
10:00 am - 10:45 amWith proper training, employees are a huge asset, not a hinderance, when it comes to keeping organizations safe from within.
10:45 amNetworking BreakRegistration Level:- Open Sessions
10:45 am - 11:00 amVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:00 amIntroduction to Adversarial Machine LearningRegistration Level:- Open Sessions
11:00 am - 11:45 amWith the increased reliance and use of machine learning across all industries, the attack surface in many organizations’ environments has increased. Although machine learning has many benefits, it also leads to new risks. It is crucial to understand the new security risks that machine learning brings in order to protect systems that rely on these technologies. In this presentation, attendees will learn about the different types of attacks that machine learning is vulnerable to. In addition, attendees will gain an understanding of the difference between artificial intelligence and machine learning, what adversarial machine learning is, how machine learning attacks occur, real-world case studies, and an introduction to current open-source tools offered by the industry to ensure that machine learning has been secured. By the end of the presentation, attendees will have an understanding of machine learning and its contributions to the cyber threat landscape as well as some measures they can take to increase the security of machine learning.
11:00 amSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:- Open Sessions
11:00 am - 11:45 amKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
11:00 amDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:- Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:- Open Sessions
11:45 am - 12:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmSecuring the Supply ChainRegistration Level:- Open Sessions
12:00 pm - 12:45 pmA discussion of managing third-party risk and how to manage expectations and contracts with vendors.
12:00 pmLessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn SolesRegistration Level:- Open Sessions
12:00 pm - 12:45 pmIn a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.
12:00 pmTelling Your Cybersecurity Story: Meeting the SEC’s New Disclosure RequirementsRegistration Level:- Open Sessions
12:00 pm - 12:45 pmGroundbreaking new cybersecurity regulations from the U.S. Securities and Exchange Commission (SEC) now require companies to disclose critical information about their cybersecurity programs to investors and shareholders.
How can technology leaders effectively tell their company’s cybersecurity story now? What do investors want — and need — to know about cybersecurity?
This session will help attendees understand the new requirements, learn real-world examples of effective cybersecurity disclosure, and identify future initiatives.
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmSecure by Default: Evolving Security ExpectationsRegistration Level:- Open Sessions
1:00 pm - 1:45 pmCISA recently released their paper on “Secure by Design, Secure by Default” software that has support from seven major governments. It is meant to make significant, achievable improvements in software security. We will discuss the Secure by Default concept, why it is important, and what customers and vendors can do about it today.
1:00 pmHow to Manage AI Risk to Let Innovation ProsperRegistration Level:- Open Sessions
1:00 pm - 1:45 pmJoin this risk-and-compliance-crossover session to learn how to navigate the complexities of AI risk and create a secure environment for innovation. While AI is often seen for its tremendous benefits or doomsday scenarios, attorneys and regulators actually advocate for a balanced approach that treats AI risk like any other risk assessment—considering priorities, efficiencies, security, and more. This session will examine AI risk from legal, regulatory, technical, and cultural perspectives, offering strategies to balance these without hindering AI-driven advancements. We all aim to be the “first out of the gate” in AI, but we must get there safely.
1:00 pmCybersecurity as a Business DriverRegistration Level:- Open Sessions
1:00 pm - 1:45 pmSavvy would-be customers be research companies and typically prefer to do business with those who have good cyber hygiene. How can a strong security posture be a business driver for your organization?
1:45 pmNetworking BreakRegistration Level:- Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmCLOSING KEYNOTERegistration Level:- Open Sessions
2:00 pm - 2:45 pm
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Learn from cyber leaders on relevant, timely security topics. Reserve your spot today!