Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 6, 20267:30 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 1Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 9:00 amCome join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.
Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
Why this course? Imagine your CEO just asked about AI security. Do you have an answer?
While you’re counting vulnerabilities, your competitors are deploying AI at scale.
Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
And your cybersecurity team? Still writing policies nobody reads.
You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation.7:30 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 1vCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 9:00 amThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
7:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 4:30 pmLocation / Room: Registration Desk / LobbyCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:30 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Morning Reality Check: Third‑Party Cyber RiskVP, CISO, Associate CIO, Children's Hospital of PhiladelphiaRegistration Level:
VIP / Exclusive
8:00 am - 8:45 amAs third‑party incidents continue to rise, vendor relationships have become a defining source of cyber risk. This closed-door, invite-only roundtable discusses how security leaders can move beyond point‑in‑time assessments to operationalize resilience‑focused third‑party risk management—strengthening ownership, awareness, and respond to inevitable vendor failures. Come ready to share with your peers.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amInsider Threats: The Call Is Coming from Inside the HouseInterest Tags: Insider Threats; Risk Quantification; User and Entity Behavior AnalyticsAuthor, "Blank Canvas: How I Reinvented My Life After Prison"Registration Level:
Open Sessions
8:00 am - 8:45 amMost insider threats don’t begin with malicious intent. They begin with a human being under pressure. Fear. Scarcity. Insecurity. These emotional drivers create tiny rationalizations that bypass even the strongest controls: “They owe me.” “I’ll fix it before anyone notices.” “This isn’t a big deal.”
By the time a security system detects something unusual, the damage is already in motion, because insider threats are fundamentally human threats. And humans are always smarter than the system when they’re driven by need and fueled by rationalization.
In this gripping, first-person session, Craig Stanland, who committed and served time for an $800K fraud, exposes how rationalization quietly rewires judgment, overrides policy, and turns trusted employees into your most significant vulnerability. This session goes beyond frameworks and compliance.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Security Catharsis: What InfoSec Professionals Are REALLY ThinkingFocus Areas: Cybersecurity Realism & Anti-Hype; Foundational Security Hygiene; Human Risk & Security CultureVP, Information Security GRC, Radian Group, Inc.CISO, CSCCISO, TrinseoVP of IT, Visit PhiladelphiaRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe security industry has reinvented itself annually to sell us new fears. Quantum threats. AI-powered everything. The next generation of awareness training. Each year, a new wave of FUD designed to convince us we need to spend more to be “future-proof.”
But here’s what we’ve been saying at happy hours and inside conversations for years: most of it is BS.
Security Catharsis is the conversation we’ve been too afraid to have on stage. No vendor pitches. No corporate talking points. Just honest dialogue about where the industry has lost its way—and what we’re going to do about it. We’ll tackle a few topics:
- Hype vs. real threat: Quantum-proof encryption, Gen-AI Chatbot Proxies, even printer security. What became of our ability to threat model?
- Security awareness training: From compliance checkbox to victim blaming
- Foundations vs. quick fixes: Why we keep buying band-aids for festering wounds
Join us for an unfiltered panel discussion where security professionals say what they actually think. We’ll validate what you’ve been thinking but weren’t sure you could say out loud. We’ll challenge the FUD. And we’ll talk about what it actually takes to get back to fundamentals.
This isn’t therapy. This is a call to action. If you’ve been having these conversations in private for years, it’s time we had them in public.
9:45 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
9:45 am - 10:10 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
10:10 amQuantum Readiness: Preparing Your Organization for a Post-Quantum FutureRegistration Level:
Conference Pass
10:10 am - 10:45 amSession details to come.
10:10 amLaws, Logic, and Lines of Code: Synchronizing Privacy Ops with Legal RealityFocus Areas: Data Privacy; GRC; Legal-Security CollaborationCISO, Main Line HealthAssociate CISO, Main Line HealthFounding Partner & Owner, Fischer Law, LLCRegistration Level:
Conference Pass
10:10 am - 10:45 amPrivacy is no longer just a “legal checkbox”—it’s a high-stakes operational challenge. When a new privacy law hits the books, the legal team sees a mandate, while the security team sees a mountain of data mapping and architectural shifts. If these two sides aren’t speaking the same language, the resulting “compliance gap” becomes a massive liability.This panel brings together the three key pillars of a resilient privacy program: the Cyber Attorney, the CISO, and the Associate CISO. Drawing on their experience in the high-pressure world of healthcare—where privacy is a matter of both law and life—our experts move beyond industry-specific silos to discuss the universal challenges of “Privacy Ops.” Attendees will gain insights into:
-
Translating Legalese into Logic: How to turn vague regulatory requirements like “reasonable security” into actionable technical controls and auditable workflows.
-
The Data Discovery Dilemma: Practical strategies for mapping data flows in complex environments without stalling business innovation.
-
Privilege vs. Protection: Navigating the delicate balance of attorney-client privilege during incident response and forensic investigations.
-
Building the “Privacy Bridge”: Establishing a recurring rhythm between legal and security teams to stay ahead of the rapidly evolving patchwork of state, federal, and international privacy laws.
Whether you are building a privacy program from scratch or refining an existing one, join us for a candid discussion on how to stop “doing compliance” and start operationalizing privacy as a strategic business asset.10:10 amThreat Hunting with AI: Turning Noise into Actionable IntelligenceRegistration Level:
Open Sessions
10:10 am - 10:45 amSession details to come
10:10 amData Security: The Missing ContextFocus Areas: Contextual Data Readiness & ROA; Gen AI: Securing the "Force Multiplier"; Maximizing Existing Security ROISr. Cybersecurity Solutions Engineer, Concentric AIRegistration Level:
Open Sessions
10:10 am - 10:45 amData security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode.
Attend this session to learn:
- Why traditional approaches to data security have failed
- How AI and context are revolutionizing data security
- Where to maximize the value of your existing security investments
- What you can do to secure your Gen AI rollouts
With the right strategy and technology, you can transform your data from a liability to a well-managed asset.
10:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
10:45 am - 11:10 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
11:10 amIncident Response Is a Program, Not a Panic ButtonFocus Areas: IT Lifecycle & Readiness; Human Factors in IR: Burnout & Decision Logic; Crisis Governance & LeadershipSr. Information Security Analyst, Federal Reserve Bank of PhiladelphiaRegistration Level:
Conference Pass
11:10 am - 11:45 amWhen a major security incident knocks at your door, is your incident response program ready to answer? Drawing from experience leading incident response teams through active security incidents, this talk examines how reactive incident response programs cause burnout, frustration, and decision fatigue through weak preparedness and immature processes. Attendees will learn practical ways to empower their teams, clarify decision-making, and create processes that hold up under pressure.
11:10 amThe Rise of AI Assistants: New Insider Threat and Data Exposure ChallengesRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 amThird-Party Risk: Managing Exposure Across Expanding Vendor EcosystemsRegistration Level:
Open Sessions
11:10 am - 11:45 amSession details to come.
11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] Security at the Speed of InnovationFocus Areas: DevSecOps & Velocity-First Security; Hybrid Security Leadership; Securing AI & Agentic EcosystemsCISO, Pep BoysRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterWhat if your security program did its job, was compliant, and made engineering faster, not slower?This talk sheds light on security leadership’s evolving role and the rise of the hybrid CISO, velocity-first security models structured around risk-based controls instead of toll gates, automation everywhere, human exceptions by design, and a shift-left / shield-right strategy that iteratively increases delivery velocity while lowering blast radius each delivery cycle. Then we go straight at the hard part: securing agentic and generative AI ecosystems from north-south and east-west so every line of business can innovate with confidence. If you’re tired of security being the department of “no,” this session is your blueprint to become the engine of “go.”12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Cyber Strategies for a Modern, AI WorldCTO, Americas, EverpureRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmJoin fellow industry security leaders to exchange insights, strategies, and best practices on the critical topics of AI security in the context of threat intelligence, regulatory compliance, and emerging security technologies.
Come ready to discuss:
- Evolving Cyber Threats & Actors – Understanding the current state of cyber attacks and the shifting threat landscape.
- Proactive & Reactive Strategies – Addressing threats associated with model manipulation and poisoning as well as agentic manipulation.
- Key Security Priorities – Identifying critical risk factors and effective mitigation strategies.
- Cyber Resilience in Strategy – Designing an AI framework to deliver cyber resilience for AI workloads.
This is an opportunity to exchange insights, strategies, and best practices with industry peers in an intimate and exclusive setting.
Generously supported by:
12:45 pmNetworking Break & Cyber ConnectContinue the Conversation with Lunch Keynote Speaker Silas AdamsCISO, Pep BoysRegistration Level:
Open Sessions
12:45 pm - 1:10 pmLocation / Room: Networking HallSilas Adams just told you why everyone is tired of security being the department of “no,” offering a blueprint for cybersecurity professionals at all levels to become the engines of “go.” Come join this bonus session in the Networking Hall immediately after his lunch keynote and continue the conversation.
1:10 pmZero Trust in Practice: What Real-World Implementations Look Like NowRegistration Level:
Conference Pass
1:10 pm - 1:45 pmSession details to come.
1:10 pmBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Conference Pass
1:10 pm - 1:45 pmSession details to come.
1:10 pmTechnology Rationalization in the Age of AI: A Strategic Approach to Cyber ResilienceFocus Areas: Rationalization & Financial Performance; Complexity Risk & The "AI Friction Tax"; Engineered Resilience for Autonomous SystemsVP, Professional Services, AccessIT GroupRegistration Level:
Open Sessions
1:10 pm - 1:45 pmTechnology rationalization has been a standing objective for many security leaders, yet it has consistently been deprioritized in favor of more immediate initiatives. Historically, the cost of deferral was tolerable. That is no longer the case.Modern security environments are increasingly fragmented – characterized by excessive vendor sprawl, overlapping capabilities, redundant tooling, and limited end-to-end visibility. This complexity not only inflates cost but also undermines operational effectiveness and governance. As AI becomes embedded across security operations, software development lifecycles, business workflows, and autonomous systems, the risks associated with an unrationalized environment accelerate significantly.This session outlines why rationalization must move from operational backlog to strategic agenda. Participants will examine a structured approach to evaluating their current technology stack, identifying underperforming or duplicative investments, aligning capabilities to measurable business risk, and establishing a foundation that can be governed effectively in an AI-enabled enterprise.Designed for CISOs, security leaders, and technology executives, this session provides both the strategic framing and practical considerations required to drive meaningful rationalization at the enterprise level.1:10 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceDirector of AI, AppOmniPresident & CEO, KeySec AdvisorsRegistration Level:
Open Sessions
1:10 pm - 1:45 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:45 pmNetworking Break & Cyber ConnectCyber Talent Crisis: Recruiting, Retaining, and Reskilling Your TeamRegistration Level:
Open Sessions
1:45 pm - 2:10 pmLocation / Room: Networking HallThe cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.
Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.
2:10 pmHack the Bots: The Promise and Peril of Intelligent MachinesFocus Areas: Robotics & Drone Security; OT & IoT Convergence; Autonomous System ExploitsFounder, Ex Machina Parlor LLCRegistration Level:
Conference Pass
2:10 pm - 2:45 pmThis session explores how robots, drones, and IoT systems are becoming high-value cyber targets as they integrate with cloud services, AI, and enterprise networks. Using real-world exploits and case studies, this talk examines how attackers compromise autonomous systems—and how defenders can apply modern security principles to protect them. Attendees will gain insight into the risks, architectures, and defensive strategies shaping the future of cyber-physical security.2:10 pmFrom Legacy SOC to Agentic Operations: A Practitioner's Path ForwardGlobal Field CTO, Strike48Director, Information Security, TE ConnectivityRegistration Level:
Open Sessions
2:10 pm - 2:45 pmFrom Legacy SOC to Agentic Operations: A Practitioner’s Path Forward
Focus Areas: Agentic SOC; AI-Driven Threat Detection & Response; Modern SOC Architecture & StrategyLegacy SOC architectures promised unified visibility and automated response. They delivered alert fatigue, fragmented workflows, and analysts buried in manual tasks. The tools changed, but the outcomes didn’t.How can we finally break the cycle? Join this session hear one’s organization’s SOC rebuilding journey to:
-
Evaluate legacy SOC limitations
-
Update to an agentic SOC model
-
Avoid AI hype and pitfalls
-
Move from pilot to production for agentic phishing detection
Expect concrete examples, an honest look at what worked and what didn’t, and a framework for evaluating whether agentic capabilities are ready for your environment.
2:10 pmData Privacy in 2026: Navigating New Regulations and Compliance PressuresRegistration Level:
Open Sessions
2:10 pm - 2:25 pmSession details to come.
2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking Break & Cyber Connect:Poisoning the Well; Timeless Lessons for Managing AI RiskPrincipal & Chief Security Advisor, Executive Security AdvisorsRegistration Level:
Open Sessions
2:45 pm - 3:15 pmLocation / Room: Networking HallLong before malware and zero-days, defenders knew that if the source is poisoned, everything downstream is corrupted. Modern AI systems face this same timeless risk. Data poisoning, model drift, and opaque decision logic are familiar integrity and governance failures appearing earlier in the lifecycle and evolving after deployment. Rather than creating new AI programs, organizations can extend proven frameworks such as NIST RMF, ISO 27001, and CIS Controls using guidance from the NIST AI RMF. This session shows how to upgrade existing risk practices—especially in academic and research environments where shared data amplifies exposure—by protecting the integrity of the source.
3:15 pm[Closing Keynote] Inside the Digital Mind: How Cyberpsychology Shapes Behavior, Risk, and the Cyber LandscapeInterest Tags: Psychology; Human Risk Management; Social EngineeringAssociate CISO, St. Luke's University Health NetworkRegistration Level:
Open Sessions
3:15 pm - 4:00 pmLocation / Room: Keynote TheaterThis keynote explores how human behavior in digital environments directly shapes modern cyber risk. Drawing from the research of forensic cyberpsychologist and author Mary Aiken, this talk reveals why people think, react, trust, click, overshare, and make decisions differently online—and how attackers exploit those predictable patterns. Participants will learn how digital psychology influences threat exposure, identity compromise, misinformation, social engineering, and organizational security culture. Attendees will walk away with practical, human-centered strategies for building safer digital environments and strengthening security programs by aligning controls with real human behavior.
4:00 pmHappy HourRegistration Level:
Open Sessions
4:00 pm - 5:00 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
4:00 pm[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 2Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
4:00 pm - 5:30 pmCome join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.
Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
Why this course? Imagine your CEO just asked about AI security. Do you have an answer?
While you’re counting vulnerabilities, your competitors are deploying AI at scale.
Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
And your cybersecurity team? Still writing policies nobody reads.
You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation.4:00 pm[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 2vCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
4:00 pm - 5:30 pmThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Thursday, May 7, 20267:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 3Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 9:00 amCome join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.
Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
Why this course? Imagine your CEO just asked about AI security. Do you have an answer?
While you’re counting vulnerabilities, your competitors are deploying AI at scale.
Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
And your cybersecurity team? Still writing policies nobody reads.
You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation.7:30 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 3vCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 9:00 amThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amSecurity Awareness: How to Help Your Loved Ones Protect ThemselvesRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] You Are Not a CISO, You Are a 'CO IS'Focus Areas: Security Leadership; Executive Alignment; Career DevelopmentCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Registration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
9:45 amNetworking Break & Cyber ConnectContinue the Conversation with Opening Keynote Speaker Dr. ColeCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Registration Level:
Open Sessions
9:45 am - 10:10 amLocation / Room: Networking HallWant to know more about why Dr. Eric Cole thinks the old CISO model is broken? Or how to be a better manager, leader, or team player? Or do you just want to chat more with the good doctor after his motivating keynote? Either way, come join this bonus session in the Networking Lounge immediately after his opening keynote.10:10 amStrategies for Implementing Microsegmentation Within Existing Production EnvironmentsFocus Areas: Microsegmentation & ROI; Zero Trust; Defensible Architecture for OT & ComplianceCISO, Carpenter Technology CorporationRegistration Level:
Conference Pass
10:10 am - 10:45 amThe purpose and benefits of microsegmentation are well known. It is foundational to Zero Trust and essential for compliance (e.g., PCI DSS, CMMC 2.0, etc.). However, implementing microsegmentation to protect critical systems (e.g., Payment Card Systems, Hospital Clinical Systems, HR Systems, SCADA/Manufacturing Systems, etc.) remains a challenge for most organizations. This presentation shares approaches and lessons learned that attendees can use to save time, save money, reduce risk, and increase credibility implementing microsegmentation successfully.10:10 amRansomware Resilience: Building a True Immutable Backup StrategyRegistration Level:
Conference Pass
10:10 am - 10:45 amSession details to come.
10:10 amIs Your Enterprise Ready for AI?Focus Areas: Shadow AI & Data Exfiltration Risk; AI Readiness & Financial Performance (ROA); Browser-Based Identity & Policy EnforcementVP, Field CTO, IslandRegistration Level:
Open Sessions
10:10 am - 10:45 amEveryone is using GenAI apps, and most are accessed via the browser. Are you able to see it, understand it, and adopt it safely? This session addresses the number one concern among corporate leaders: realizing the benefits of GenAI adoption while retaining the data controls, policy enforcement, and compliance that enterprises need.
This session covers:
- The risks associated with Shadow AI and lack of visibility
- How data leaks into unapproved AI apps, including employees uploading/copying/pasting sensitive data into unmanaged AI tools
- How you can gain visibility in AI activity and design policies that safely enables AI usage
- Other tips for managing employee use of AI within corporate boundaries
10:10 amBeyond the Signature: Advanced Endpoint Detection and HardeningRegistration Level:
Open Sessions
10:10 am - 10:45 amSession details to come.
10:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
10:45 am - 11:10 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
11:10 amTranslating Security Risks into Business ImpactFocus Areas: Executive Impact Modeling & Stakeholder Discourse; Quantifying the 'Cyber Dividend'Director, Technology Risks and Controls - US Card and International Business and Payments, CapitalOneRegistration Level:
Conference Pass
11:10 am - 11:45 amIn this session, we will break down how to map technical security gaps to specific business processes, aligning security initiatives with organizational goals. We will also cover how to build a narrative that resonates with non-technical stakeholders.
11:10 amOT/ICS Security: Bridging the Air Gap and Achieving Visibility in Critical InfrastructureRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 amThe New Era of Phishing: Defending Against Deepfakes and AI-Driven DeceptionRegistration Level:
Open Sessions
11:10 am - 11:45 amSession details to come.
11:10 am[Panel] The Human Layer: Insider Risk, Social Engineering, and Behavioral AnalyticsFocus Areas: Insider Risk & Behavioral Analytics; Social Engineering & AI Deception; Identity Security & Access GovernanceDirector of Governance & Compliance, Risk Advisory Services, AccessIT GroupFounder, AtAnEdgeRegistration Level:
Open Sessions
11:10 am - 11:45 amThe human element remains the most targeted and least predictable part of every security program—now intensified by AI-powered social engineering. This panel examines how attackers weaponize synthetic voice and video deepfakes, personalized phishing, MFA fatigue, session hijacking, and multi-channel lures across email, mobile, chat, and collaboration apps.
Experts in insider risk, UEBA, identity security, and DLP will discuss how behavioral analytics detect subtle anomalies while maintaining privacy guardrails for employees. Panelists will also address how privileged access governance is evolving in cloud-heavy environments. Attendees will leave with practical guidance for reducing user friction, improving detection, countering AI-driven lures, and building a resilient workforce that remains the strongest defense against evolving attacker tactics.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] Resilience over Reaction: Securing Critical Functions in an Age of Systemic RiskRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession details to come.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Registration Level:
VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:10 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:10 pmFrom Compliance to Confidence: Turning Cyber Risk into ROIFocus Areas: Cyber-Readiness & Financial Performance (ROA/EBITAT); Quantifying the "Cyber Dividend"; Executive Risk Communication & TransparencySr. ITIL Project Manager, CircleRegistration Level:
Conference Pass
1:10 pm - 1:50 pmMost organizations treat cyber risk as a compliance checkbox, but in 2026, compliance is not the same as resilience. While leaders worry about “implementation risk” (the cost of doing something), they often fail to calculate “opportunity risk” (the cost of doing nothing while competitors move faster).
In this session, attendees will move beyond the “compliance trap” and learn how to transform IT risk into quantifiable business value. Drawing on doctoral research regarding the “fundamentals gap” in IT service delivery, this presentation outlines a practical ROI-Based Risk Assessment Framework (RRAF). Key takeaways:
-
Stop Guessing, Start Quantifying: How to calculate the “Cost of Maybe” and translate technical vulnerabilities into financial impact reports for the executive level decisioning.
-
Bridge the Gap: Strategies to align “waterfall” stability requirements with “agile” business velocity.
-
The 4-Step Methodology: A proven process (Ask, Specify, Account, Define) to establish the “single source of truth” required for cyber risk and digital transformation.
-
From Cost Center to Growth Engine: How to position cybersecurity not as an insurance policy but as a competitive advantage that captures the “reinventor bonus.”
1:10 pm[Panel] The AI Survival Guide: Bridging the Gap Between Innovation and IntegrityFocus Areas: AI Governance & Secure Adoption; AI-Powered Social Engineering; Strategic Leadership; Workforce EvolutionCEO & Founder, Fischer Law, LLCSr. Security Architect, ZoomDirector, Cyber Defense & Information Assurance Program, Temple University; Founder, Securely BuiltRegistration Level:
Conference Pass
1:10 pm - 1:50 pmThe rapid ascent of Generative AI has moved “AI readiness” from a future-state goal to a present-day survival requirement. For cybersecurity leaders, the challenge is twofold: you must secure a perimeter that is dissolving into a web of AI agents and LLMs, while simultaneously evolving your own skill set to remain a strategic partner to the business. How do you embrace the “AI Advantage” without opening the door to machine-speed exfiltration and synthetic fraud?
This panel brings together veteran cybersecurity leaders to dissect the reality of the AI-driven battlefield. The session moves beyond the hype to discuss actionable strategies for securing “Shadow AI,” managing the explosion of non-human identities, and retooling security teams for an automated future.
1:10 pmData Minimization: Turning ROT Data into Risk Reduction and SavingsRegistration Level:
Open Sessions
1:10 pm - 1:50 pmSession details to come.
1:10 pm[Panel] Resilience Engineering: Incident Response, Business Continuity, and Cyber InsuranceFocus Areas: Operational Resilience & BCP; Incident Response & Crisis Management; Cyber Insurance & Executive ReportingSecurity GRC and Operational Excellence Leader, Philips Ambulatory Monitoring & DiagnosticsRegistration Level:
Open Sessions
1:10 pm - 1:50 pmResilience has shifted from a compliance task to a vital business skill. This panel explores how organizations prepare for disruptive cyber incidents involving multi-cloud setups, SaaS dependencies, supply chain issues, and rapid ransomware attacks. With experts in incident response, digital forensics, MDR, insurance, and crisis management, the panel emphasizes developing response playbooks that mirror current operational dependencies.
Panelists will explore insurer-driven requirements for identity security and MFA, lessons from major SaaS outages, and how to communicate effectively with executives and boards when downtime impacts revenue-critical operations. Attendees will gain a comprehensive understanding of how to engineer resilience—not just respond—and how to align IR, continuity planning, insurance, and business priorities into a unified, enterprise-wide strategy.
1:50 pmNetworking Break & Cyber ConnectCyber Talent Crisis: Recruiting, Retaining, and Reskilling Your TeamRegistration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallThe cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.
Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.
2:10 pmLeveraging the CTI Ecosystem: Actionable Intelligence for Regional ThreatsRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pmThe Talent Multiplier: Automation and Orchestration Strategies for Understaffed TeamsRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pmOT/ICS Incident Response: Specialized Triage for Critical Infrastructure BreachesRegistration Level:
Open Sessions
2:10 pm - 2:45 pmSession details to come.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:
Open Sessions
3:00 pm - 3:15 pmLocation / Room: Networking HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:15 pm[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 4Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
3:15 pm - 4:45 pmCome join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.
Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
Why this course? Imagine your CEO just asked about AI security. Do you have an answer?
While you’re counting vulnerabilities, your competitors are deploying AI at scale.
Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.
And your cybersecurity team? Still writing policies nobody reads.
You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation.3:15 pm[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 4vCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
3:15 pm - 4:45 pmThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- AccessIT GroupBooth: TBD
AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.
AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.
- AnzennaBooth: 235
Anzenna provides advanced security solutions that streamline the investigation of identity threats by integrating multiple security tools and reducing the need for extensive manual operations.
- AppOmniBooth: TBD
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- ASIS Greater PhiladelphiaBooth: TBD
ASIS International is the preeminent organization for security professionals, with more than 38,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests.
- AxoniusBooth: TBD
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.
- Canary TrapBooth: TBD
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Cloud Security Alliance Delaware Valley Chapter (CSA-DV)Booth: TBD
Cloud Security Alliance Delaware Valley Chapter (CSA-DV) is a not-for-profit organization for people interested in education, training and possible certification in cloud security. We seek to improve the understanding of cloud security and to promote the interaction of both professionals and students in order to discuss current trends and topics within the industry.
OUR PURPOSE:To promote cloud security best practices within the Greater Philadelphia region, to educate about cloud computing, identify its risks, methods to secure it, and to continually provide opportunities for the development of cloud security professionals.
- Cloud Security Alliance Lehigh Valley ChapterBooth: TBD
The Cloud Security Alliance is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is comprised of many subject matter experts from a wide variety disciplines, united in our objectives:
- Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance.
- Promote independent research into best practices for cloud computing security.
- Launch awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions.
- Create consensus lists of issues and guidance for cloud security assurance.
- Concentric AIBooth: TBD
Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.
- DarktraceBooth: 304
Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.
- Everpure, Inc. (formerly Pure Storage)Booth: TBD
We are Everpure. We don’t just store data—we bring it to life.
As AI becomes core to business, infrastructure must evolve, yet too many organizations are still relying on rigid, siloed systems built for the past. The Everpure Platform replaces static storage with a unified, living platform that evolves with you—agile, resilient, and built to scale—so you can eliminate friction and unleash the power of your data.
- ExpelBooth: TBD
Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.
- Harness, Inc.Booth: TBD
Traceable is the leading platform for protecting modern applications and APIs across their entire lifecycle. Built for today’s cloud native, distributed environments, Traceable combines continuous discovery, real time threat detection, shift left testing, and intelligent runtime protection into a single integrated solution. Security, DevSecOps, and platform teams rely on Traceable to eliminate blind spots, stop advanced threats, simplify compliance, and accelerate secure delivery without slowing innovation.
- Philadelphia InfraGard Members AllianceBooth: TBD
InfraGard is a partnership between the FBI and the private sector. It is an association of people from businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S. Philadelphia InfraGard Members Alliance (IMA) provides a forum for the exchange of information between the government, the owners and operators of the national infrastructure, and others concerned with the protection of the national infrastructure. Philadelphia IMA supports eastern Pennsylvania and southern New Jersey. Membership is free and new members are welcome.
- ISACA PhiladelphiaBooth: TBD
The Philadelphia Chapter of ISACA has a membership base of more than 1,600 individuals primarily located in the Philadelphia and the surrounding suburbs, extending into Delaware and Southern New Jersey. The membership of the Chapter includes professionals working in various industries and capacities. From students through experienced C-level executives, the Philadelphia Chapter provides, training, networking and social events to this diverse group who share the common goal of providing expertise in IT audit, security, risk, and governance topics to their colleagues. The Chapter conducts events on a monthly basis led by an active, vibrant and dedicated group of volunteers and is actively seeking business partners to help provide value and knowledge to its members.
- ISC2 Philadelphia ChapterBooth: TBD
Welcome to the ISC2 Philadelphia Chapter, your trusted hub for cybersecurity excellence in the City of Brotherly Love. As a local chapter of the esteemed International Information System Security Certification Consortium (ISC2), we are dedicated to advancing the cybersecurity profession and building a robust community of security enthusiasts, professionals, and experts in the Greater Philadelphia area. We come from a wide range of industries but share a passion of promoting cybersecurity knowledge, facilitating professional growth, and fostering connections among individuals who share a passion for safeguarding our digital world.
- IslandBooth: TBD
What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.
- ISSA Delaware ValleyBooth: TBD
Our chapter serves the Delaware Valley and Mid-Atlantic region. This is comprised of Eastern Pennsylvania, Northern Maryland, Southern New Jersey, and Delaware.
We are making history as we continue to grow the chapter with your membership, and bring exciting programs to you. If you have not already been involved in the membership meetings, we encourage you to do so. Hopefully, you will walk away with more ideas to take back to your organizations, or you may come away with a sense of – “Hey, we had that same problem”, or “Our company is not alone in dealing with these issues.” - KeysightBooth: TBD
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- NetskopeBooth: TBD
Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.
- OWASPBooth: TBD
The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. Our programming includes:
- Community-led open source projects including code, documentation, and standards
- Over 250+ local chapters worldwide
- Tens of thousands of members
- Industry-leading educational and training conferences
We are an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of our projects, tools, documents, forums, and chapters are free and open to anyone interested in improving application security.
- OpenText Inc.Booth: TBD
OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Information Management.
OpenText (NASDAQ/TSX: OTEX), founded in 1991 in Waterloo, has a rich history of helping customers manage their most important asset—information. Originating from a collaboration to digitize the Oxford English Dictionary, OpenText has grown into a global leader in information management. With over 120,000 enterprise customers across 180 countries, OpenText supports 98 of the top 100 global companies. A wide breadth of offerings uniquely positions OpenText to help customers unlock the value of that information using Al, cloud, and security innovations.
- Red Canary, a Zscaler companyBooth: TBD
Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.
- SecurityScorecardBooth: TBD
SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.
- SeemplicityBooth: TBD
Seemplicity offers a risk reduction and productivity platform that streamlines the way security teams manage risk reduction. By orchestrating, automating, and consolidating all remediation activities into a single workspace, Seemplicity is revolutionizing the way security teams drive and scale risk reduction efforts across organizations.Seemplicity streamlines and collaboratively transforms the remediation process for developers, DevOps, and IT across the organization, assisting them in achieving complete operational resilience and establishing a truly scalable security program.
- SemperisBooth: TBD
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- SpyCloudBooth: TBD
SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts worldwide. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals’ ability to profit from stolen information. Learn more & check your exposure at spycloud.com.
- Strike48Booth: TBD
Strike48’s core mission is to help you automate the extraction of business value from server logs. The Strike48 Prospector Studio is an AI Agent Creation and Management Suite that allows you to quickly start inspecting logs with AI agents. Use our Agent creation personas to help create Agents for your purposes or you can use our professionally pre-made Agents instead!
- Sublime SecurityBooth: TBD
Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.
- TorqBooth: TBD
Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.
- U.S. Secret Service – Cyber Fraud Task ForceBooth: TBD
Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.
- WiCyS Delaware ValleyBooth: TBD
Women make up only 11% of the cyber security workforce. With such low representation, it is essential that we advocate for and assist women as they navigate through the cyber security industry.
Philadelphia Women & Cyber Security’s Mission: To provide opportunities to advance careers for professionals in Cyber Security through education, mentoring, and networking. A Supportive community for women in cyber security that works to promote and encourage women to develop their careers. We are open to any support for our mission from any gender. Come to the next Philadelphia Women and Cyber Security’s event to get to know other like-minded, female cyber security professionals in the area. We will discuss industry best practices, the latest security trends and solutions, and share lessons we’ve learned over the years. For more information, contact wicysdelawarevalley@wicys.org.
- Zafran SecurityBooth: TBD
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
- ZscalerBooth: TBD
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
- ZeroFoxBooth: TBD
Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.
Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.
Ahanu Boyle, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Monique St. John, ModeratorVP, CISO, Associate CIO, Children's Hospital of PhiladelphiaMonique St. John is the Chief Information Security Officer (CISO) and Associate Chief Information Officer (ACIO) at the Children’s Hospital of Philadelphia (CHOP). In this role, Monique supports the organization’s mission and strategic plan with responsibility for the enterprise Information Security program. With over 25 years of experience in technology, security, and service delivery, Monique relies on a collaborative leadership approach to ensure solutions protect CHOP, provide value, and enable the business. She is a trusted advisor, partners with colleagues to manage risk, and strives to balance security with technology innovation.
Craig StanlandAuthor, "Blank Canvas: How I Reinvented My Life After Prison"
Lucas BurkeVP, Information Security GRC, Radian Group, Inc.Lucas Burke is a seasoned Information Security Executive with over two decades of experience leading cybersecurity and risk management programs across Fortune 500, FinTech, Financial Services, Insurance, Higher Education, and Non-Profit sectors. As Vice President of Information Security Governance, Risk, and Compliance at Radian, Lucas drives enterprise-wide strategies that align security initiatives with business objectives, enabling security to function not only as a safeguard but as a catalyst for innovation and competitive advantage.
Lucas brings deep expertise in incident response, regulatory compliance, privacy leadership, data governance, and enterprise risk management. His leadership spans the full security spectrum—from building and mentoring high-performing teams of analysts, operators, threat hunters, and engineers, to designing resilient infrastructure and secure network architectures in prior roles.
Whether in the boardroom or at the whiteboard, Lucas is known for his coalition-building leadership style and his ability to translate complex security challenges into actionable strategies. He is a frequent speaker on topics such as executive-level communication, risk management, and security governance, and is a trusted voice in the cybersecurity community.
When not figuring out how to stop the latest cyber threats, Lucas enjoys spending time with his children, playing the banjo, and staying active on his Peloton.
Mark Eggleston, CISSP, GSEC, CHPSCISO, CSCMark Eggleston is the chief information security officer (CISO) for CSC, responsible for the global security and privacy program design, operations and continual maturation. As a senior executive specializing in security and privacy program development and management, Mark’s unique background and expertise in information technology, program, and people management have positioned him as a thought leader and frequent industry speaker.
Mark started his career as a program manager and psychotherapist at a hospital serving children and adolescents. Later, Mr. Eggleston helped develop an internal compliance approach—complete with policies and tools—ensuring a geographically dispersed health care provider organization (across 19 states) complied with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Mr. Eggleston then transitioned to applying his HIPAA expertise at an HMO where he has implemented many successful security controls and technologies, including single sign-on (SSO), Identity and Access Management (IAM), Cloud Access security broker (CASB), and a vulnerability assessment program.
Mark received his Bachelor of Science in psychology from Radford University. Later, Mark received both his Master of social work and his post-baccalaureate certificate in management information systems from Virginia Commonwealth University. In addition, Mark holds CHPS, CHPS, and CISSP certifications.
Tammy KlotzCISO, TrinseoTammy Klotz is a vibrant and accomplished executive with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned in security, risk, and compliance leadership. Tammy brings a dynamic and positive approach to problem solving, excelling in simplifying intricate IT and cybersecurity concepts and facilitating pragmatic, non-technical dialogues that resonate with business executives. She is recognized as a strong, knowledgeable, thoughtful security executive who excels in public speaking and thought leadership, striving to empower others through knowledge sharing.
Keith McMenamin, ModeratorVP of IT, Visit PhiladelphiaKeith McMenamin is the Vice President of Information Technology at VISIT PHILADELPHIA®, the region’s official tourism marketing agency. In his 17 years with VISIT PHILADELPHIA®, Mr. McMenamin is credited with building and securing the technical infrastructure for an award-winning organization that was responsible for creating $11 billion dollars in economic impact for the city of Philadelphia in 2022. Over the years, he quickly became a trusted advisor to C-Suite executives along with evolving into the “go-to tech guy” for friends and colleagues in the local tourism marketing and media industries. Keith is a regular speaker and panelist at national industry conferences, volunteer at local schools and founder of the Philly Tech Council.
Outside of the office Keith enjoys playing sports, spending time with his family and taking long vacations to Southern California.
Aaron WeismannCISO, Main Line Health
Kevin WernerAssociate CISO, Main Line HealthKevin is the Associate CISO, and the former System Director of Security Operations at Main Line Health, a mid-sized hospital system in Suburban Philadelphia, where his team oversees all non-GRC aspects of information security. He has more than a decade of information security experience and is a licensed attorney in Pennsylvania and New Jersey. He currently holds a CISSP certification as well as a CIPP/US certification. Kevin went to the College of the Holy Cross in Worcester, MA, for undergrad with a degree in Philosophy, and attended the Villanova University School of Law.
Jordan Fischer, ModeratorFounding Partner & Owner, Fischer Law, LLCJordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.
Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.
With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).
Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.
Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.
In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.
Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.
Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.
HONORS & RECOGNITIONS
Lawyer on the Fast Track, The Legal Intelligencer (2023)
Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
European Union ERASMUS Grant Recipient, 2020ASSOCIATIONS & MEMBERSHIPS
American Bar Association, Business Law Fellow, 2020-2022
American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
California Bar Association
New Jersey Bar Association
Forbes Business Council Member, 2022
International Association of Privacy Professionals (IAPP), Member
University of California, Berkeley, Cybersecurity Lecturer
former Thomas R. Kline School of Law, Drexel University, Law Professor
former Chestnut Hill College, Adjunct Professor
West Chester Friends School, Board Member
Appointed Fulbright Specialist in Cybersecurity and Data PrivacyCERTIFICATIONS
Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP)
Roger ReidSr. Cybersecurity Solutions Engineer, Concentric AIRoger is a senior cybersecurity solutions engineer and AI security leader with deep expertise in technical product strategy and large‑scale program execution. Roger drives enterprise-wide initiatives that strengthen AI security, compliance, and governance while aligning product and solution portfolios to strategic business objectives. His leadership focuses on enabling secure, responsible, and scalable AI adoption across complex global environments.
Sarah ConnahanSr. Information Security Analyst, Federal Reserve Bank of PhiladelphiaSarah Connahan serves as a Senior Information Security Analyst with the Federal Reserve Bank of Philadelphia, where she leads the Bank’s incident response and vulnerability management functions. Since joining the organization in 2021, Sarah has been instrumental in advancing the Bank’s efforts to enhance operational resilience and safeguard critical information assets. She earned her Bachelor of Science in Applied Mathematics from Temple University and completed her cybersecurity education at the Community College of Philadelphia.
Panel Discussion
Silas AdamsCISO, Pep BoysSilas Adams is a 22-year information security veteran and currently serves as Chief Information Security Officer at Pep Boys. A former Marine, he sharpened his craft supporting missions at U.S. Cyber Command, the NSA, DIA, and (what is now) the CIA’s Directorate of Digital Innovation, and later served as a DARPA Innovation Fellow within the Information Innovation Office (I2O).
In the private sector, Silas has led security and risk programs at PwC, Cognizant, Wells Fargo, Chesapeake Utilities, RubiconMD, Oak Street Health, Lincoln Investment, and others, building expertise across highly regulated industries. He is known for pairing deep technical rigor with pragmatic leadership, he drives security transformations that enable business outcomes while delivering and transforming technology ecosystems that are secure, compliant, scalable, and built for speed. His risk-oriented approach to building, transforming and leading secure digital ecosystems enables organizations to seize opportunities throughout their business lifecycle, intelligently embrace risk to yield returns and cause disruptive innovation.
Andy Stone, ModeratorCTO, Americas, EverpureAndy Stone is an accomplished IT executive with a passion for technology and creating innovative solutions that solve business problems and deliver results. As CTO, Americas, at Everpure, Andy is focused on delivering next-gen data storage and protection technologies that help companies get better insights, improve time-to-market, and make breakthroughs.
Silas AdamsCISO, Pep BoysSilas Adams is a 22-year information security veteran and currently serves as Chief Information Security Officer at Pep Boys. A former Marine, he sharpened his craft supporting missions at U.S. Cyber Command, the NSA, DIA, and (what is now) the CIA’s Directorate of Digital Innovation, and later served as a DARPA Innovation Fellow within the Information Innovation Office (I2O).
In the private sector, Silas has led security and risk programs at PwC, Cognizant, Wells Fargo, Chesapeake Utilities, RubiconMD, Oak Street Health, Lincoln Investment, and others, building expertise across highly regulated industries. He is known for pairing deep technical rigor with pragmatic leadership, he drives security transformations that enable business outcomes while delivering and transforming technology ecosystems that are secure, compliant, scalable, and built for speed. His risk-oriented approach to building, transforming and leading secure digital ecosystems enables organizations to seize opportunities throughout their business lifecycle, intelligently embrace risk to yield returns and cause disruptive innovation.
Jim BearceVP, Professional Services, AccessIT GroupJim Bearce is a seasoned cybersecurity leader with over 20 years of experience in IT security development, operations, and executive leadership. As Vice President of Professional Services at AccessIT Group, Jim oversees the delivery of cutting-edge security solutions, helping organizations strengthen their defenses against evolving cyberthreats.
Prior to joining AccessIT Group, Jim played a pivotal role in guiding enterprises through complex security challenges. He has led global security teams across North & South America, Europe, and the Asia-Pacific region, specializing in threat detection, incident response, and risk mitigation for large-scale organizations. He has also served as an interim CISO, advising executive teams and Boards of Directors on cybersecurity strategy, risk management, and compliance.
Jim holds a Master of Science in Information Security & Assurance from Norwich University, along with multiple industry-recognized security certifications, including CISSP and CISM.
Melissa RuzziDirector of AI, AppOmniMelissa Ruzzi is Director of AI at AppOmni, a SaaS security company protecting 101 million+ users secured over 260 million exposed data records, analyzes 60 billion cyber events a month and has 100+ employees worldwide. She’s fascinated by the challenges involved in applying machine learning in cybersecurity and the constant changing threat landscape. She embraces a mix of technical and business skills and is passionate about creating applications using data science and machine learning to help organizations defend against cyber threats.
Patrick Keating, ModeratorPresident & CEO, KeySec Advisors
Panel Discussion
Lexie ThachFounder, Ex Machina Parlor LLCLexie Thach is a Lead Cybersecurity Engineer at NIWC Pacific with more than a decade of experience in defensive cyber operations, red teaming, and autonomous system security. A U.S. Air Force veteran, Lexie specializes in robotics, drones, IoT exploitation, and wireless attacks. She is the founder of Ex Machina Parlor, a woman-owned, veteran-operated cyber-centric hackerspace, and the creator of multiple open-source security robotics platforms showcased at DEFCON. Her work focuses on blending physical systems with modern cyber offense and defense.
Jason MicalGlobal Field CTO, Strike48Jason Mical is probably best known as the “Father of the SilentRunner® technology,” the industry’s first full packet capture, network forensics solution of its kind, developed by the NSA and Raytheon. He is also the co-creator of the Resolution1/Fidelis Endpoint Platform, the industry’s first EDR solution. He assists clients in such areas as electronic intercepts, intrusion analysis, malware eradication, forensic investigations, incident response, security standards and guidelines. Jason also offers his expertise and consulting services to clients and other audiences on issues of both cyber and physical security investigations.
Jason has more than 30 years of experience in telecommunications fraud prevention, physical security management, and cybersecurity investigations. During his career, he has developed and implemented overall cybersecurity, physical security, forensic investigation, and fraud control programs for several global organizations and managed lawful interception operations to support federal agencies. He has developed
security and fraud awareness training seminars for employees in private industry, as well as federal, state and local law enforcement. Jason has been a member of the FBI InfraGard, United States Secret Service Electronic Crimes Task Force, ISSA, HTCIA, ASIS, ANSIR ,and CTIA Fraud Task Forces.
Nick FalzaranoDirector, Information Security, TE Connectivity
Panel Discussion
Paul LynchPrincipal & Chief Security Advisor, Executive Security AdvisorsPaul is a former public-company CISO and cybersecurity executive with more than 20 years of experience advising boards and executive leadership on enterprise security strategy and resilience. He specializes in incident response, governance, risk, and compliance (GRC), and enterprise risk management, with a focus on AI risk governance.
Paul’s work centers on securing the integrity of data and decision systems in an AI-driven world, applying the NIST AI Risk Management Framework to address threats such as data poisoning and adversarial manipulation. He holds the (ISC)² Building AI Strategy Certificate and is currently pursuing a Master of Science in Cybersecurity Management & Policy at the University of Maryland Global Campus.
He serves as Secretary of the (ISC)² Philadelphia Chapter and has contributed as a Subject Matter Expert for the (ISC)² CCSP and ISSMP examinations and the EC-Council Certified CISO (C|CISO) program. He has also served on cybersecurity advisory boards for Verizon Enterprise, Rubrik, and eSentire.
Krista ArndtAssociate CISO, St. Luke's University Health NetworkKrista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.
Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.
When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.
Happy Hour
Ahanu Boyle, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Ahanu Boyle, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
Dr. Eric Cole, DPSCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Dr. Eric Cole, DPSCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Michael HoehlCISO, Carpenter Technology CorporationMichael has 20+ years of experience in Cybersecurity serving Fortune 500, Manufacturing, Retail, Health, and Financial Services. He is the CISO at Carpenter Technology leading Global Cybersecurity Program including strategy, operations, IR, Governance, and Compliance. His credentials include a Master of Science in Information Security Management from SANS Technology Institute, and several certifications including Carnegie Mellon University CISO program, CISSP, GCIA, and GCIH.
Michael LelandVP, Field CTO, IslandMichael joined Island in October 2024 as Field CTO, bringing over 30 years of data networking, operations, and cybersecurity domain expertise.
He formerly served as Head of Technical Marketing and Chief Cybersecurity Evangelist at SentinelOne where he was responsible for messaging and strategic development of their XDR product roadmap as well as the identity security portfolio. Prior to SentinelOne he held the title of Chief Technical Strategist for McAfee.
Michael was the co-founder and CTO of NitroSecurity–later acquired by McAfee–where he was responsible for developing and implementing their overall SIEM technology vision and roadmap and has held senior technical management positions at Cabletron and Avaya.
Michael studied Computer and Electrical Engineering at the Georgia Institute of Technology and received an honorary MBA from Bentley University where he helped create the Information Age MBA curriculum. He is also an adjunct professor teaching cybersecurity courses at Rochester Institute of Technology in New York and Norwich University in Vermont.
Piyali DasDirector, Technology Risks and Controls - US Card and International Business and Payments, CapitalOnePiyali Das is a highly-accomplished cyber risk leader with two decades of experience driving enterprise-wide technology and cyber risk initiatives. Certified with CRISC, CCSK, CCAK, and PMP, she aligns risk management with strategic business objectives. Her expertise covers information security risk and compliance frameworks, cloud security, third-party risk, and AI/ML risk assessment. Piyali holds an MS in IT and Cybersecurity, specializing in data protection and risk management, complemented by a BTech in Computer Science and Engineering, which provides a strong foundation in algorithms and system architecture.
Chad BarrDirector of Governance & Compliance, Risk Advisory Services, AccessIT GroupChad Barr is a seasoned leader in the field of information security, currently serving as the Director of Governance, Risk and Compliance (GRC) within the Risk Advisory Service practice at AccessIT Group (AITG). With a proven track record of success, Chad brings a wealth of experience to AccessIT Group.
As a visionary leader in the realm of cybersecurity, Chad has honed his skills across multiple disciplines, including security engineering, project management, risk management, and compliance. His extensive background underscores his ability to guide organizations toward robust and resilient security postures.
Michael Meyer, ModeratorFounder, AtAnEdgeMichael Meyer is a two-time CTO/CISO and senior technology and security executive with 20+ years of experience securing and modernizing high-volume digital platforms in regulated industries. His work spans cybersecurity, enterprise risk, cloud, data, privacy, compliance, and AI enablement, with a track record of building practical, scalable operating models that support both resilience and growth. He has published 21 articles, spoken at 20+ industry events, and holds 11 professional certifications across security, risk, privacy, and blockchain. Michael earned a Computer Science degree from Rutgers University and a Master's in Technology Management from Georgetown University. He previously served in the U.S. Army in Military Intelligence.
Panel Discussion
Fredrick Dande, PhDSr. ITIL Project Manager, CircleBusiness Enablement, Technology Strategy, and Digital Transformation. With 15+ years advising firms like EY and Circle, Fredrick developed the ROI-Based Risk Assessment Framework (RRAF) to help leaders quantify IT and cyber risk in business terms. He has presented at IEEE and other professional forums, holds a PhD in Technology Management, and is certified in ITIL, PMP, and IT governance. He empowers executives to turn IT risk into strategic growth and measurable business value.
Jordan FischerCEO & Founder, Fischer Law, LLCJordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.
Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.
With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).
Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.
Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.
In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.
Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.
Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.
HONORS & RECOGNITIONS
Lawyer on the Fast Track, The Legal Intelligencer (2023)
Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
European Union ERASMUS Grant Recipient, 2020ASSOCIATIONS & MEMBERSHIPS
American Bar Association, Business Law Fellow, 2020-2022
American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
California Bar Association
New Jersey Bar Association
Forbes Business Council Member, 2022
International Association of Privacy Professionals (IAPP), Member
University of California, Berkeley, Cybersecurity Lecturer
former Thomas R. Kline School of Law, Drexel University, Law Professor
former Chestnut Hill College, Adjunct Professor
West Chester Friends School, Board Member
Appointed Fulbright Specialist in Cybersecurity and Data PrivacyCERTIFICATIONS
Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP)
Vana KhuranaSr. Security Architect, ZoomVana Khurana is CISSP, AWS Certified Architect (A), CCSP, CCSK, GSEC, and TOGAF certified. Vana serves as Director of Training and a Board Member of Cloud Security Alliance Delaware Valley Chapter. She is also an Adjunct Faculty at Temple University, Philadelphia. Vana has authored the book "IT Process Management," available on Amazon.
Derek Fisher, ModeratorDirector, Cyber Defense & Information Assurance Program, Temple University; Founder, Securely BuiltCybersecurity leader and educator, serving as a professor and director in higher education. An author and speaker, sharing insights on emerging security challenges while also mentoring the next generation of professionals entering the field. CISSP, CSSLP, AWS
Joseph Arahill, ModeratorSecurity GRC and Operational Excellence Leader, Philips Ambulatory Monitoring & DiagnosticsJoe Arahill is a cybersecurity leader focused on Security Governance, Risk, and Compliance (GRC) and operational excellence within regulated environments, including his current role at Philips. He leads initiatives that strengthen enterprise security through structured risk management, control implementation, and continuous performance monitoring.
Joe brings experience across multiple industries, including financial services, where he spent much of his career securing business systems and supporting compliance with regulatory requirements. His work focuses on building scalable security programs aligned with business objectives, with an emphasis on frameworks and compliance, and on incident response to improve resilience and protect critical information assets.
Joe holds a Bachelor of Science in Management of Information Systems and a Master of Science in Information Assurance from Norwich University. He also maintains the CISSP and CISA certifications and applies a practical, execution-focused approach to advancing security maturity.
Panel Discussion
Ahanu Boyle, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLCAhanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.
Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.
Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.
Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.











