Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 6, 20267:30 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 1Associate Cyber Risk Analyst , Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 9:00 amCome join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.
Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
Why this course? Imagine your CEO just asked about AI security. Do you have an answer?
While you’re counting vulnerabilities, your competitors are deploying AI at scale.
Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
And your cybersecurity team? Still writing policies nobody reads.
You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation.7:30 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 1vCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 9:00 amThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
7:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 4:30 pmLocation / Room: Registration Desk / LobbyCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:30 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amSimple Daily Habits to Strengthen Your Security PostureRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] The State of Cybersecurity in 2026: Threats, Trends, and What Comes NextRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterSession details to come.
9:45 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
9:45 am - 10:10 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
10:10 amQuantum Readiness: Preparing Your Organization for a Post-Quantum FutureRegistration Level:
Conference Pass
10:10 am - 10:45 amSession details to come.
10:10 amIdentity Security Beyond MFA: Continuous Verification and Risk-Based ControlsRegistration Level:
Conference Pass
10:10 am - 10:45 amSession details to come.
10:10 amThreat Hunting with AI: Turning Noise into Actionable IntelligenceRegistration Level:
Open Sessions
10:10 am - 10:45 amSession details to come
10:10 amModern Ransomware: Double Extortion, Data Destruction, and Targeted CampaignsRegistration Level:
Open Sessions
10:10 am - 10:45 amSession details to come.
10:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
10:45 am - 11:10 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
11:10 amSecuring Cloud-Native Environments: Containers, Kubernetes, and ServerlessRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 amThe Rise of AI Assistants: New Insider Threat and Data Exposure ChallengesRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 amThird-Party Risk: Managing Exposure Across Expanding Vendor EcosystemsRegistration Level:
Open Sessions
11:10 am - 11:45 amSession details to come.
11:10 am[Panel] Navigating the Evolving Digital BattlefieldRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] AI-Accelerated Attacks and Defenses: Preparing for Machine-Speed ThreatsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession details to come.
12:45 pmNetworking Break & Cyber ConnectProactive by Design: Anticipating Threats Before They StrikeRegistration Level:
Open Sessions
12:45 pm - 1:10 pmLocation / Room: Networking HallThe days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.
Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.
1:10 pmZero Trust in Practice: What Real-World Implementations Look Like NowRegistration Level:
Conference Pass
1:10 pm - 1:45 pmSession details to come.
1:10 pmBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Conference Pass
1:10 pm - 1:45 pmSession details to come.
1:10 pmThreat Modeling for Modern Architectures: From Cloud to EdgeRegistration Level:
Open Sessions
1:10 pm - 1:45 pmSession details to come.
1:10 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseRegistration Level:
Open Sessions
1:10 pm - 1:45 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:45 pmNetworking Break & Cyber ConnectCyber Talent Crisis: Recruiting, Retaining, and Reskilling Your TeamRegistration Level:
Open Sessions
1:45 pm - 2:10 pmLocation / Room: Networking HallThe cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.
Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.
2:10 pmAPI Security: Managing the Fastest-Growing Attack SurfaceRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pmBuilding Incident Response Plans for Highly Distributed WorkforcesRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pmData Privacy in 2026: Navigating New Regulations and Compliance PressuresRegistration Level:
Open Sessions
2:10 pm - 2:25 pmSession details to come.
2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking BreakRegistration Level:
Open Sessions
2:45 pm - 3:15 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
3:15 pm[Closing Keynote] Building High-Trust Security Cultures in an Era of Constant DisruptionRegistration Level:
Open Sessions
3:15 pm - 4:00 pmLocation / Room: Keynote TheaterSession details to come.
4:00 pmHappy HourRegistration Level:
Open Sessions
4:00 pm - 5:00 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
4:00 pm[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 2Associate Cyber Risk Analyst , Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
4:00 pm - 5:30 pmCome join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.
Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
Why this course? Imagine your CEO just asked about AI security. Do you have an answer?
While you’re counting vulnerabilities, your competitors are deploying AI at scale.
Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
And your cybersecurity team? Still writing policies nobody reads.
You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation.4:00 pm[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 2vCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
4:00 pm - 5:30 pmThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Thursday, May 7, 20267:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 3Associate Cyber Risk Analyst , Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 9:00 amCome join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.
Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
Why this course? Imagine your CEO just asked about AI security. Do you have an answer?
While you’re counting vulnerabilities, your competitors are deploying AI at scale.
Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
And your cybersecurity team? Still writing policies nobody reads.
You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation.7:30 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 3vCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 9:00 amThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amSecurity Awareness: How to Help Your Loved Ones Protect ThemselvesRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] The Death of the Perimeter and Rise of the Federated Identity FabricRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterSession details to come.
9:45 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
10:15 amFrom Alert Fatigue to Adaptive Defense: Operationalizing AI in the SOCRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 amRansomware Resilience: Building a True Immutable Backup StrategyRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 amSecuring the SaaS Jungle: Access Control and Shadow Data in the CloudRegistration Level:
Open Sessions
10:15 am - 10:50 amSession details to come.
10:15 amBeyond the Signature: Advanced Endpoint Detection and HardeningRegistration Level:
Open Sessions
10:15 am - 10:50 amSession details to come.
10:50 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
11:10 amUnpacking the New SEC Rules: Transitioning from Manual Reporting to Continuous ComplianceRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 amOT/ICS Security: Bridging the Air Gap and Achieving Visibility in Critical InfrastructureRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 amThe New Era of Phishing: Defending Against Deepfakes and AI-Driven DeceptionRegistration Level:
Open Sessions
11:10 am - 11:45 amSession details to come.
11:10 am[Panel] The Human Layer: Insider Risk, Social Engineering, and Behavioral AnalyticsRegistration Level:
Open Sessions
11:10 am - 11:45 amThe human element remains the most targeted and least predictable part of every security program—now intensified by AI-powered social engineering. This panel examines how attackers weaponize synthetic voice and video deepfakes, personalized phishing, MFA fatigue, session hijacking, and multi-channel lures across email, mobile, chat, and collaboration apps.
Experts in insider risk, UEBA, identity security, and DLP will discuss how behavioral analytics detect subtle anomalies while maintaining privacy guardrails for employees. Panelists will also address how privileged access governance is evolving in cloud-heavy environments. Attendees will leave with practical guidance for reducing user friction, improving detection, countering AI-driven lures, and building a resilient workforce that remains the strongest defense against evolving attacker tactics.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] Resilience over Reaction: Securing Critical Functions in an Age of Systemic RiskRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession details to come.
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmThe Developer as a Defender: Integrating Security into CI/CD PipelinesRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pmQuantifying Security Debt: Communicating Risk and Driving Remediation with the CFORegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pmData Minimization: Turning ROT Data into Risk Reduction and SavingsRegistration Level:
Open Sessions
1:15 pm - 1:50 pmSession details to come.
1:15 pm[Panel] Resilience Engineering: Incident Response, Business Continuity, and Cyber InsuranceRegistration Level:
Open Sessions
1:15 pm - 1:50 pmResilience has shifted from a compliance task to a vital business skill. This panel explores how organizations prepare for disruptive cyber incidents involving multi-cloud setups, SaaS dependencies, supply chain issues, and rapid ransomware attacks. With experts in incident response, digital forensics, MDR, insurance, and crisis management, the panel emphasizes developing response playbooks that mirror current operational dependencies.
Panelists will explore insurer-driven requirements for identity security and MFA, lessons from major SaaS outages, and how to communicate effectively with executives and boards when downtime impacts revenue-critical operations. Attendees will gain a comprehensive understanding of how to engineer resilience—not just respond—and how to align IR, continuity planning, insurance, and business priorities into a unified, enterprise-wide strategy.
1:50 pmNetworking Break & Cyber ConnectCyber Talent Crisis: Recruiting, Retaining, and Reskilling Your TeamRegistration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallThe cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.
Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.
2:10 pmLeveraging the CTI Ecosystem: Actionable Intelligence for Regional ThreatsRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pmThe Talent Multiplier: Automation and Orchestration Strategies for Understaffed TeamsRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pmOT/ICS Incident Response: Specialized Triage for Critical Infrastructure BreachesRegistration Level:
Open Sessions
2:10 pm - 2:45 pmSession details to come.
2:10 pm[Panel] The Great Consolidation: Rationalizing the Security StackRegistration Level:
Open Sessions
2:10 pm - 2:45 pmSecurity teams are under increasing pressure to reduce tool sprawl, streamline SOC workflows, and demonstrate measurable ROI—fueling a wave of consolidation across the industry. This panel explores the shift toward unified detection and response platforms, integrated identity and data controls, AI-enabled SOC copilots that unify telemetry, and architectural simplification that reduces operational drag.
Panelists from XDR, SIEM, platform security, and MSSP providers will discuss frameworks for evaluating ROI, navigating contract consolidation, avoiding visibility gaps, and deciding where consolidation strengthens or weakens security posture. Ideal for leaders facing budget constraints or platform migrations, this session offers practical guidance for optimizing spending without sacrificing coverage.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:
Open Sessions
3:00 pm - 3:15 pmLocation / Room: Networking HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:15 pm[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 4Associate Cyber Risk Analyst , Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
3:15 pm - 4:45 pmCome join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.
Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
Why this course? Imagine your CEO just asked about AI security. Do you have an answer?
While you’re counting vulnerabilities, your competitors are deploying AI at scale.
Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
And your cybersecurity team? Still writing policies nobody reads.
You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation.3:15 pm[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 4vCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
3:15 pm - 4:45 pmThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- ASIS Greater PhiladelphiaBooth: TBD
ASIS International is the preeminent organization for security professionals, with more than 38,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests.
- Canary TrapBooth: TBD
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Cloud Security Alliance Delaware Valley Chapter (CSA-DV)Booth: TBD
Cloud Security Alliance Delaware Valley Chapter (CSA-DV) is a not-for-profit organization for people interested in education, training and possible certification in cloud security. We seek to improve the understanding of cloud security and to promote the interaction of both professionals and students in order to discuss current trends and topics within the industry.
OUR PURPOSE:To promote cloud security best practices within the Greater Philadelphia region, to educate about cloud computing, identify its risks, methods to secure it, and to continually provide opportunities for the development of cloud security professionals.
- Cloud Security Alliance Lehigh Valley ChapterBooth: TBD
The Cloud Security Alliance is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is comprised of many subject matter experts from a wide variety disciplines, united in our objectives:
- Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance.
- Promote independent research into best practices for cloud computing security.
- Launch awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions.
- Create consensus lists of issues and guidance for cloud security assurance.
- Philadelphia InfraGard Members AllianceBooth: TBD
InfraGard is a partnership between the FBI and the private sector. It is an association of people from businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S. Philadelphia InfraGard Members Alliance (IMA) provides a forum for the exchange of information between the government, the owners and operators of the national infrastructure, and others concerned with the protection of the national infrastructure. Philadelphia IMA supports eastern Pennsylvania and southern New Jersey. Membership is free and new members are welcome.
- ISACA PhiladelphiaBooth: TBD
The Philadelphia Chapter of ISACA has a membership base of more than 1,600 individuals primarily located in the Philadelphia and the surrounding suburbs, extending into Delaware and Southern New Jersey. The membership of the Chapter includes professionals working in various industries and capacities. From students through experienced C-level executives, the Philadelphia Chapter provides, training, networking and social events to this diverse group who share the common goal of providing expertise in IT audit, security, risk, and governance topics to their colleagues. The Chapter conducts events on a monthly basis led by an active, vibrant and dedicated group of volunteers and is actively seeking business partners to help provide value and knowledge to its members.
- ISC2 Philadelphia ChapterBooth: TBD
Welcome to the ISC2 Philadelphia Chapter, your trusted hub for cybersecurity excellence in the City of Brotherly Love. As a local chapter of the esteemed International Information System Security Certification Consortium (ISC2), we are dedicated to advancing the cybersecurity profession and building a robust community of security enthusiasts, professionals, and experts in the Greater Philadelphia area. We come from a wide range of industries but share a passion of promoting cybersecurity knowledge, facilitating professional growth, and fostering connections among individuals who share a passion for safeguarding our digital world.
- ISSA Delaware ValleyBooth: TBD
Our chapter serves the Delaware Valley and Mid-Atlantic region. This is comprised of Eastern Pennsylvania, Northern Maryland, Southern New Jersey, and Delaware.
We are making history as we continue to grow the chapter with your membership, and bring exciting programs to you. If you have not already been involved in the membership meetings, we encourage you to do so. Hopefully, you will walk away with more ideas to take back to your organizations, or you may come away with a sense of – “Hey, we had that same problem”, or “Our company is not alone in dealing with these issues.” - OWASPBooth: TBD
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions about true software security risks.
- U.S. Secret Service – Cyber Fraud Task ForceBooth: TBD
Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.
- WiCyS Delaware ValleyBooth: TBD
Women make up only 11% of the cyber security workforce. With such low representation, it is essential that we advocate for and assist women as they navigate through the cyber security industry.
Philadelphia Women & Cyber Security’s Mission: To provide opportunities to advance careers for professionals in Cyber Security through education, mentoring, and networking. A Supportive community for women in cyber security that works to promote and encourage women to develop their careers. We are open to any support for our mission from any gender. Come to the next Philadelphia Women and Cyber Security’s event to get to know other like-minded, female cyber security professionals in the area. We will discuss industry best practices, the latest security trends and solutions, and share lessons we’ve learned over the years. For more information, contact wicysdelawarevalley@wicys.org.
Ahanu Boyle, InstructorAssociate Cyber Risk Analyst , Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Panel Discussion
Panel Discussion
Panel Discussion
Happy Hour
Ahanu Boyle, InstructorAssociate Cyber Risk Analyst , Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Ahanu Boyle, InstructorAssociate Cyber Risk Analyst , Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Panel Discussion
Panel Discussion
Panel Discussion
Ahanu Boyle, InstructorAssociate Cyber Risk Analyst , Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.







