Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 6, 2026
    7:30 am
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 1
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Come join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.

    Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.

    Why this course? Imagine your CEO just asked about AI security. Do you have an answer?

    While you’re counting vulnerabilities, your competitors are deploying AI at scale.

    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.

    And your cybersecurity team? Still writing policies nobody reads.

    You’ll master:
    •  The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    •  Executive Translation — Turn technical AI risks into boardroom language
    •  NIST AI RMF Implementation — Practical application, not theory
    •  The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    •  Shadow AI Discovery — Find and govern the AI already in your organization
    •  Business-First Security — Protect value, not just systems
    Who should attend:
    Perfect fit:
    •  CISOs facing board questions about AI
    •  Information Security Directors enabling digital transformation
    •  IT VPs without dedicated security teams
    •  Cybersecurity Consultants serving enterprise clients
    •  Risk Managers governing AI initiatives
    •  Aspiring decision makers and those reporting to one
    Wrong course:
    •  Developers wanting to code AI models
    •  Analysts seeking technical certifications
    •  Anyone looking for hands-on hacking labs
    This workshop is NOT about:
    •  Prompt injection techniques
    •  Model architecture security
    •  Technical vulnerability scanning
    •  Writing 200-page policies
    This workshop IS about:
    •  Speaking profit-and-loss to executives
    •  Enabling your AI transformations
    •  Building cybersecurity into AI from day one
    •  Becoming the trusted AI advisor
    You’ll leave with:
    1. The Complete AIR-MAP Toolkit
    •  90-day implementation roadmap
    •  Discovery templates and workflows
    •  Risk scoring calculators
    •  Executive presentation templates
    2. Ready-to-Deploy Policies
    •  AI Acceptable Use Policy (customize in minutes)
    •  Vendor assessment questionnaires
    •  Incident Response playbooks
    3. 30-Minute Strategy Session
    Complementary private consultation to apply AIR-MAP to your specific situation.
    7:30 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 1
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:30 pm
    Location / Room: Registration Desk / Lobby

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Morning Reality Check: Third‑Party Cyber Risk
    speaker photo
    VP, CISO, Associate CIO, Children's Hospital of Philadelphia
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    As third‑party incidents continue to rise, vendor relationships have become a defining source of cyber risk. This closed-door, invite-only roundtable discusses how security leaders can move beyond point‑in‑time assessments to operationalize resilience‑focused third‑party risk management—strengthening ownership, awareness, and respond to inevitable vendor failures. Come ready to share with your peers.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Insider Threats: The Call Is Coming from Inside the House
    • session level icon
    Interest Tags: Insider Threats; Risk Quantification; User and Entity Behavior Analytics
    speaker photo
    Author, "Blank Canvas: How I Reinvented My Life After Prison"
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Most insider threats don’t begin with malicious intent. They begin with a human being under pressure. Fear. Scarcity. Insecurity. These emotional drivers create tiny rationalizations that bypass even the strongest controls: “They owe me.” “I’ll fix it before anyone notices.” “This isn’t a big deal.”

    By the time a security system detects something unusual, the damage is already in motion, because insider threats are fundamentally human threats. And humans are always smarter than the system when they’re driven by need and fueled by rationalization.

    In this gripping, first-person session, Craig Stanland, who committed and served time for an $800K fraud, exposes how rationalization quietly rewires judgment, overrides policy, and turns trusted employees into your most significant vulnerability. This session goes beyond frameworks and compliance.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Security Catharsis: What InfoSec Professionals Are REALLY Thinking
    • session level icon
    Focus Areas: Cybersecurity Realism & Anti-Hype; Foundational Security Hygiene; Human Risk & Security Culture
    speaker photo
    VP, Information Security GRC, Radian Group, Inc.
    speaker photo
    CISO, Trinseo
    speaker photo
    VP of IT, Visit Philadelphia
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The security industry has reinvented itself annually to sell us new fears. Quantum threats. AI-powered everything. The next generation of awareness training. Each year, a new wave of FUD designed to convince us we need to spend more to be “future-proof.”

    But here’s what we’ve been saying at happy hours and inside conversations for years: most of it is BS.

    Security Catharsis is the conversation we’ve been too afraid to have on stage. No vendor pitches. No corporate talking points. Just honest dialogue about where the industry has lost its way—and what we’re going to do about it. We’ll tackle a few topics:

    • Hype vs. real threat: Quantum-proof encryption, Gen-AI Chatbot Proxies, even printer security. What became of our ability to threat model?
    • Security awareness training: From compliance checkbox to victim blaming
    • Foundations vs. quick fixes: Why we keep buying band-aids for festering wounds

    Join us for an unfiltered panel discussion where security professionals say what they actually think. We’ll validate what you’ve been thinking but weren’t sure you could say out loud. We’ll challenge the FUD. And we’ll talk about what it actually takes to get back to fundamentals.

    This isn’t therapy. This is a call to action. If you’ve been having these conversations in private for years, it’s time we had them in public.

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:10 am
    Location / Room: Networking Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    10:10 am
    Quantum Readiness: Preparing Your Organization for a Post-Quantum Future
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:10 am - 10:45 am

    Session details to come.

    10:10 am
    Laws, Logic, and Lines of Code: Synchronizing Privacy Ops with Legal Reality
    • session level icon
    Focus Areas: Data Privacy; GRC; Legal-Security Collaboration
    speaker photo
    CISO, Main Line Health
    speaker photo
    Associate CISO, Main Line Health
    speaker photo
    Founding Partner & Owner, Fischer Law, LLC
    Registration Level:
    • session level iconConference Pass
    10:10 am - 10:45 am
    Privacy is no longer just a “legal checkbox”—it’s a high-stakes operational challenge. When a new privacy law hits the books, the legal team sees a mandate, while the security team sees a mountain of data mapping and architectural shifts. If these two sides aren’t speaking the same language, the resulting “compliance gap” becomes a massive liability.

    This panel brings together the three key pillars of a resilient privacy program: the Cyber Attorney, the CISO, and the Associate CISO. Drawing on their experience in the high-pressure world of healthcare—where privacy is a matter of both law and life—our experts move beyond industry-specific silos to discuss the universal challenges of “Privacy Ops.” Attendees will gain insights into:

    Whether you are building a privacy program from scratch or refining an existing one, join us for a candid discussion on how to stop “doing compliance” and start operationalizing privacy as a strategic business asset.
    10:10 am
    Threat Hunting with AI: Turning Noise into Actionable Intelligence
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:10 am - 10:45 am

    Session details to come

    10:10 am
    Data Security: The Missing Context
    • session level icon
    Focus Areas: Contextual Data Readiness & ROA; Gen AI: Securing the "Force Multiplier"; Maximizing Existing Security ROI
    speaker photo
    Sr. Cybersecurity Solutions Engineer, Concentric AI
    Registration Level:
    • session level iconOpen Sessions
    10:10 am - 10:45 am

    Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode.

    Attend this session to learn:

    • Why traditional approaches to data security have failed
    • How AI and context are revolutionizing data security
    • Where to maximize the value of your existing security investments
    • What you can do to secure your Gen AI rollouts

    With the right strategy and technology, you can transform your data from a liability to a well-managed asset.

    10:45 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:10 am
    Location / Room: Networking Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    11:10 am
    Incident Response Is a Program, Not a Panic Button
    • session level icon
    Focus Areas: IT Lifecycle & Readiness; Human Factors in IR: Burnout & Decision Logic; Crisis Governance & Leadership
    speaker photo
    Sr. Information Security Analyst, Federal Reserve Bank of Philadelphia
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    When a major security incident knocks at your door, is your incident response program ready to answer? Drawing from experience leading incident response teams through active security incidents, this talk examines how reactive incident response programs cause burnout, frustration, and decision fatigue through weak preparedness and immature processes. Attendees will learn practical ways to empower their teams, clarify decision-making, and create processes that hold up under pressure.

    11:10 am
    The Rise of AI Assistants: New Insider Threat and Data Exposure Challenges
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Session details to come.

    11:10 am
    Third-Party Risk: Managing Exposure Across Expanding Vendor Ecosystems
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Session details to come.

    11:10 am
    [Panel] Navigating the Evolving Digital Battlefield
    • session level icon
    Focus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party Risk
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    As organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.

    Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] Security at the Speed of Innovation
    • session level icon
    Focus Areas: DevSecOps & Velocity-First Security; Hybrid Security Leadership; Securing AI & Agentic Ecosystems
    speaker photo
    CISO, Pep Boys
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater
    What if your security program did its job, was compliant, and made engineering faster, not slower?
    This talk sheds light on security leadership’s evolving role and the rise of the hybrid CISO, velocity-first security models structured around risk-based controls instead of toll gates, automation everywhere, human exceptions by design, and a shift-left / shield-right strategy that iteratively increases delivery velocity while lowering blast radius each delivery cycle. Then we go straight at the hard part: securing agentic and generative AI ecosystems from north-south and east-west so every line of business can innovate with confidence. If you’re tired of security being the department of “no,” this session is your blueprint to become the engine of “go.”
    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Cyber Strategies for a Modern, AI World
    speaker photo
    CTO, Americas, Everpure
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Join fellow industry security leaders to exchange insights, strategies, and best practices on the critical topics of AI security in the context of threat intelligence, regulatory compliance, and emerging security technologies.

    Come ready to discuss:

    • Evolving Cyber Threats & Actors – Understanding the current state of cyber attacks and the shifting threat landscape.
    • Proactive & Reactive Strategies – Addressing threats associated with model manipulation and poisoning as well as agentic manipulation.
    • Key Security Priorities – Identifying critical risk factors and effective mitigation strategies.
    • Cyber Resilience in Strategy – Designing an AI framework to deliver cyber resilience for AI workloads.

    This is an opportunity to exchange insights, strategies, and best practices with industry peers in an intimate and exclusive setting.

    Generously supported by:

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Continue the Conversation with Lunch Keynote Speaker Silas Adams
    speaker photo
    CISO, Pep Boys
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:10 pm
    Location / Room: Networking Hall

    Silas Adams just told you why everyone is tired of security being the department of “no,” offering a blueprint for cybersecurity professionals at all levels to become the engines of “go.” Come join this bonus session in the Networking Hall immediately after his lunch keynote and continue the conversation.

    1:10 pm
    Zero Trust in Practice: What Real-World Implementations Look Like Now
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:10 pm - 1:45 pm

    Session details to come.

    1:10 pm
    Burnout in Cybersecurity: Recognizing, Preventing, and Managing Team Fatigue
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:10 pm - 1:45 pm

    Session details to come.

    1:10 pm
    Technology Rationalization in the Age of AI: A Strategic Approach to Cyber Resilience 
    • session level icon
    Focus Areas: Rationalization & Financial Performance; Complexity Risk & The "AI Friction Tax"; Engineered Resilience for Autonomous Systems
    speaker photo
    VP, Professional Services, AccessIT Group
    Registration Level:
    • session level iconOpen Sessions
    1:10 pm - 1:45 pm
    Technology rationalization has been a standing objective for many security leaders, yet it has consistently been deprioritized in favor of more immediate initiatives. Historically, the cost of deferral was tolerable. That is no longer the case.

    Modern security environments are increasingly fragmented – characterized by excessive vendor sprawl, overlapping capabilities, redundant tooling, and limited end-to-end visibility. This complexity not only inflates cost but also undermines operational effectiveness and governance. As AI becomes embedded across security operations, software development lifecycles, business workflows, and autonomous systems, the risks associated with an unrationalized environment accelerate significantly.

    This session outlines why rationalization must move from operational backlog to strategic agenda. Participants will examine a structured approach to evaluating their current technology stack, identifying underperforming or duplicative investments, aligning capabilities to measurable business risk, and establishing a foundation that can be governed effectively in an AI-enabled enterprise.

    Designed for CISOs, security leaders, and technology executives, this session provides both the strategic framing and practical considerations required to drive meaningful rationalization at the enterprise level.
    1:10 pm
    [Panel] The Double-Edged Sword of AI in Cyber Defense
    • session level icon
    Focus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & Assurance
    speaker photo
    Director of AI, AppOmni
    speaker photo
    President & CEO, KeySec Advisors
    Registration Level:
    • session level iconOpen Sessions
    1:10 pm - 1:45 pm

    AI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.

    The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.

    1:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber Talent Crisis: Recruiting, Retaining, and Reskilling Your Team
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:10 pm
    Location / Room: Networking Hall

    The cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.

    2:10 pm
    Hack the Bots: The Promise and Peril of Intelligent Machines
    • session level icon
    Focus Areas: Robotics & Drone Security; OT & IoT Convergence; Autonomous System Exploits
    speaker photo
    Founder, Ex Machina Parlor LLC
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    This session explores how robots, drones, and IoT systems are becoming high-value cyber targets as they integrate with cloud services, AI, and enterprise networks. Using real-world exploits and case studies, this talk examines how attackers compromise autonomous systems—and how defenders can apply modern security principles to protect them. Attendees will gain insight into the risks, architectures, and defensive strategies shaping the future of cyber-physical security.
    2:10 pm
    From Legacy SOC to Agentic Operations: A Practitioner's Path Forward
    • session level icon
    speaker photo
    Global Field CTO, Strike48
    speaker photo
    Director, Information Security, TE Connectivity
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    From Legacy SOC to Agentic Operations: A Practitioner’s Path Forward

    Focus Areas: Agentic SOC; AI-Driven Threat Detection & Response; Modern SOC Architecture & Strategy
    Legacy SOC architectures promised unified visibility and automated response. They delivered alert fatigue, fragmented workflows, and analysts buried in manual tasks. The tools changed, but the outcomes didn’t.

    How can we finally break the cycle? Join this session hear one’s organization’s SOC rebuilding journey to:

    • Evaluate legacy SOC limitations

    • Update to an agentic SOC model

    • Avoid AI hype and pitfalls

    • Move from pilot to production for agentic phishing detection

    Expect concrete examples, an honest look at what worked and what didn’t, and a framework for evaluating whether agentic capabilities are ready for your environment.

    2:10 pm
    Data Privacy in 2026: Navigating New Regulations and Compliance Pressures
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:25 pm

    Session details to come.

    2:10 pm
    [Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern Enterprise
    • session level icon
    Focus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge Security
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Modern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.

    Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.

    2:45 pm
    Networking Break & Cyber Connect:
    • session level icon
    Poisoning the Well; Timeless Lessons for Managing AI Risk
    speaker photo
    Principal & Chief Security Advisor, Executive Security Advisors
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:15 pm
    Location / Room: Networking Hall

    Long before malware and zero-days, defenders knew that if the source is poisoned, everything downstream is corrupted. Modern AI systems face this same timeless risk. Data poisoning, model drift, and opaque decision logic are familiar integrity and governance failures appearing earlier in the lifecycle and evolving after deployment. Rather than creating new AI programs, organizations can extend proven frameworks such as NIST RMF, ISO 27001, and CIS Controls using guidance from the NIST AI RMF. This session shows how to upgrade existing risk practices—especially in academic and research environments where shared data amplifies exposure—by protecting the integrity of the source.

    3:15 pm
    [Closing Keynote] Inside the Digital Mind: How Cyberpsychology Shapes Behavior, Risk, and the Cyber Landscape
    • session level icon
    Interest Tags: Psychology; Human Risk Management; Social Engineering
    speaker photo
    Associate CISO, St. Luke's University Health Network
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    This keynote explores how human behavior in digital environments directly shapes modern cyber risk. Drawing from the research of forensic cyberpsychologist and author Mary Aiken, this talk reveals why people think, react, trust, click, overshare, and make decisions differently online—and how attackers exploit those predictable patterns. Participants will learn how digital psychology influences threat exposure, identity compromise, misinformation, social engineering, and organizational security culture. Attendees will walk away with practical, human-centered strategies for building safer digital environments and strengthening security programs by aligning controls with real human behavior.

    4:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 5:00 pm
    Location / Room: Networking Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

     

    4:00 pm
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 2
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    4:00 pm - 5:30 pm

    Come join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.

    Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.

    Why this course? Imagine your CEO just asked about AI security. Do you have an answer?

    While you’re counting vulnerabilities, your competitors are deploying AI at scale.

    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.

    And your cybersecurity team? Still writing policies nobody reads.

    You’ll master:
    •  The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    •  Executive Translation — Turn technical AI risks into boardroom language
    •  NIST AI RMF Implementation — Practical application, not theory
    •  The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    •  Shadow AI Discovery — Find and govern the AI already in your organization
    •  Business-First Security — Protect value, not just systems
    Who should attend:
    Perfect fit:
    •  CISOs facing board questions about AI
    •  Information Security Directors enabling digital transformation
    •  IT VPs without dedicated security teams
    •  Cybersecurity Consultants serving enterprise clients
    •  Risk Managers governing AI initiatives
    •  Aspiring decision makers and those reporting to one
    Wrong course:
    •  Developers wanting to code AI models
    •  Analysts seeking technical certifications
    •  Anyone looking for hands-on hacking labs
    This workshop is NOT about:
    •  Prompt injection techniques
    •  Model architecture security
    •  Technical vulnerability scanning
    •  Writing 200-page policies
    This workshop IS about:
    •  Speaking profit-and-loss to executives
    •  Enabling your AI transformations
    •  Building cybersecurity into AI from day one
    •  Becoming the trusted AI advisor
    You’ll leave with:
    1. The Complete AIR-MAP Toolkit
    •  90-day implementation roadmap
    •  Discovery templates and workflows
    •  Risk scoring calculators
    •  Executive presentation templates
    2. Ready-to-Deploy Policies
    •  AI Acceptable Use Policy (customize in minutes)
    •  Vendor assessment questionnaires
    •  Incident Response playbooks
    3. 30-Minute Strategy Session
    Complementary private consultation to apply AIR-MAP to your specific situation.
    4:00 pm
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 2
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    4:00 pm - 5:30 pm

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

  • Thursday, May 7, 2026
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 3
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Come join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.

    Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.

    Why this course? Imagine your CEO just asked about AI security. Do you have an answer?

    While you’re counting vulnerabilities, your competitors are deploying AI at scale.

    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.

    And your cybersecurity team? Still writing policies nobody reads.

    You’ll master:
    •  The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    •  Executive Translation — Turn technical AI risks into boardroom language
    •  NIST AI RMF Implementation — Practical application, not theory
    •  The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    •  Shadow AI Discovery — Find and govern the AI already in your organization
    •  Business-First Security — Protect value, not just systems
    Who should attend:
    Perfect fit:
    •  CISOs facing board questions about AI
    •  Information Security Directors enabling digital transformation
    •  IT VPs without dedicated security teams
    •  Cybersecurity Consultants serving enterprise clients
    •  Risk Managers governing AI initiatives
    •  Aspiring decision makers and those reporting to one
    Wrong course:
    •  Developers wanting to code AI models
    •  Analysts seeking technical certifications
    •  Anyone looking for hands-on hacking labs
    This workshop is NOT about:
    •  Prompt injection techniques
    •  Model architecture security
    •  Technical vulnerability scanning
    •  Writing 200-page policies
    This workshop IS about:
    •  Speaking profit-and-loss to executives
    •  Enabling your AI transformations
    •  Building cybersecurity into AI from day one
    •  Becoming the trusted AI advisor
    You’ll leave with:
    1. The Complete AIR-MAP Toolkit
    •  90-day implementation roadmap
    •  Discovery templates and workflows
    •  Risk scoring calculators
    •  Executive presentation templates
    2. Ready-to-Deploy Policies
    •  AI Acceptable Use Policy (customize in minutes)
    •  Vendor assessment questionnaires
    •  Incident Response playbooks
    3. 30-Minute Strategy Session
    Complementary private consultation to apply AIR-MAP to your specific situation.
    7:30 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 3
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:45 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Security Awareness: How to Help Your Loved Ones Protect Themselves
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Session details to come.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    Focus Areas: Security Leadership; Executive Alignment; Career Development
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    Continue the Conversation with Opening Keynote Speaker Dr. Cole
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:10 am
    Location / Room: Networking Hall
    Want to know more about why Dr. Eric Cole thinks the old CISO model is broken? Or how to be a better manager, leader, or team player? Or do you just want to chat more with the good doctor after his motivating keynote? Either way, come join this bonus session in the Networking Lounge immediately after his opening keynote.
    10:10 am
    Strategies for Implementing Microsegmentation Within Existing Production Environments
    • session level icon
    Focus Areas: Microsegmentation & ROI; Zero Trust; Defensible Architecture for OT & Compliance
    speaker photo
    CISO, Carpenter Technology Corporation
    Registration Level:
    • session level iconConference Pass
    10:10 am - 10:45 am
    The purpose and benefits of microsegmentation are well known. It is foundational to Zero Trust and essential for compliance (e.g., PCI DSS, CMMC 2.0, etc.). However, implementing microsegmentation to protect critical systems (e.g., Payment Card Systems, Hospital Clinical Systems, HR Systems, SCADA/Manufacturing Systems, etc.) remains a challenge for most organizations. This presentation shares approaches and lessons learned that attendees can use to save time, save money, reduce risk, and increase credibility implementing microsegmentation successfully.
    10:10 am
    Ransomware Resilience: Building a True Immutable Backup Strategy
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:10 am - 10:45 am

    Session details to come.

    10:10 am
    Is Your Enterprise Ready for AI?
    • session level icon
    Focus Areas: Shadow AI & Data Exfiltration Risk; AI Readiness & Financial Performance (ROA); Browser-Based Identity & Policy Enforcement
    speaker photo
    VP, Field CTO, Island
    Registration Level:
    • session level iconOpen Sessions
    10:10 am - 10:45 am

    Everyone is using GenAI apps, and most are accessed via the browser. Are you able to see it, understand it, and adopt it safely? This session addresses the number one concern among corporate leaders: realizing the benefits of GenAI adoption while retaining the data controls, policy enforcement, and compliance that enterprises need.

    This session covers:

    • The risks associated with Shadow AI and lack of visibility
    • How data leaks into unapproved AI apps, including employees uploading/copying/pasting sensitive data into unmanaged AI tools
    • How you can gain visibility in AI activity and design policies that safely enables AI usage
    • Other tips for managing employee use of AI within corporate boundaries
    10:10 am
    Beyond the Signature: Advanced Endpoint Detection and Hardening
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:10 am - 10:45 am

    Session details to come.

    10:45 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:10 am
    Location / Room: Networking Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    11:10 am
    Translating Security Risks into Business Impact
    • session level icon
    Focus Areas: Executive Impact Modeling & Stakeholder Discourse; Quantifying the 'Cyber Dividend'
    speaker photo
    Director, Technology Risks and Controls - US Card and International Business and Payments, CapitalOne
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    In this session, we will break down how to map technical security gaps to specific business processes, aligning security initiatives with organizational goals. We will also cover how to build a narrative that resonates with non-technical stakeholders.

    11:10 am
    OT/ICS Security: Bridging the Air Gap and Achieving Visibility in Critical Infrastructure
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Session details to come.

    11:10 am
    The New Era of Phishing: Defending Against Deepfakes and AI-Driven Deception
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Session details to come.

    11:10 am
    [Panel] The Human Layer: Insider Risk, Social Engineering, and Behavioral Analytics
    • session level icon
    Focus Areas: Insider Risk & Behavioral Analytics; Social Engineering & AI Deception; Identity Security & Access Governance
    speaker photo
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group
    speaker photo
    Founder, AtAnEdge
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    The human element remains the most targeted and least predictable part of every security program—now intensified by AI-powered social engineering. This panel examines how attackers weaponize synthetic voice and video deepfakes, personalized phishing, MFA fatigue, session hijacking, and multi-channel lures across email, mobile, chat, and collaboration apps.

    Experts in insider risk, UEBA, identity security, and DLP will discuss how behavioral analytics detect subtle anomalies while maintaining privacy guardrails for employees. Panelists will also address how privileged access governance is evolving in cloud-heavy environments. Attendees will leave with practical guidance for reducing user friction, improving detection, countering AI-driven lures, and building a resilient workforce that remains the strongest defense against evolving attacker tactics.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] Resilience over Reaction: Securing Critical Functions in an Age of Systemic Risk
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session details to come.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:10 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:10 pm
    From Compliance to Confidence: Turning Cyber Risk into ROI
    • session level icon
    Focus Areas: Cyber-Readiness & Financial Performance (ROA/EBITAT); Quantifying the "Cyber Dividend"; Executive Risk Communication & Transparency
    speaker photo
    Sr. ITIL Project Manager, Circle
    Registration Level:
    • session level iconConference Pass
    1:10 pm - 1:50 pm

    Most organizations treat cyber risk as a compliance checkbox, but in 2026, compliance is not the same as resilience. While leaders worry about “implementation risk” (the cost of doing something), they often fail to calculate “opportunity risk” (the cost of doing nothing while competitors move faster).

    In this session, attendees will move beyond the “compliance trap” and learn how to transform IT risk into quantifiable business value. Drawing on doctoral research regarding the “fundamentals gap” in IT service delivery, this presentation outlines a practical ROI-Based Risk Assessment Framework (RRAF). Key takeaways:

    1:10 pm
    [Panel] The AI Survival Guide: Bridging the Gap Between Innovation and Integrity
    • session level icon
    Focus Areas: AI Governance & Secure Adoption; AI-Powered Social Engineering; Strategic Leadership; Workforce Evolution
    speaker photo
    CEO & Founder, Fischer Law, LLC
    speaker photo
    Sr. Security Architect, Zoom
    speaker photo
    Director, Cyber Defense & Information Assurance Program, Temple University; Founder, Securely Built
    Registration Level:
    • session level iconConference Pass
    1:10 pm - 1:50 pm

    The rapid ascent of Generative AI has moved “AI readiness” from a future-state goal to a present-day survival requirement. For cybersecurity leaders, the challenge is twofold: you must secure a perimeter that is dissolving into a web of AI agents and LLMs, while simultaneously evolving your own skill set to remain a strategic partner to the business. How do you embrace the “AI Advantage” without opening the door to machine-speed exfiltration and synthetic fraud?

    This panel brings together veteran cybersecurity leaders to dissect the reality of the AI-driven battlefield. The session moves beyond the hype to discuss actionable strategies for securing “Shadow AI,” managing the explosion of non-human identities, and retooling security teams for an automated future.

    1:10 pm
    Data Minimization: Turning ROT Data into Risk Reduction and Savings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:10 pm - 1:50 pm

    Session details to come.

    1:10 pm
    [Panel] Resilience Engineering: Incident Response, Business Continuity, and Cyber Insurance
    • session level icon
    Focus Areas: Operational Resilience & BCP; Incident Response & Crisis Management; Cyber Insurance & Executive Reporting
    speaker photo
    Security GRC and Operational Excellence Leader, Philips Ambulatory Monitoring & Diagnostics
    Registration Level:
    • session level iconOpen Sessions
    1:10 pm - 1:50 pm

    Resilience has shifted from a compliance task to a vital business skill. This panel explores how organizations prepare for disruptive cyber incidents involving multi-cloud setups, SaaS dependencies, supply chain issues, and rapid ransomware attacks. With experts in incident response, digital forensics, MDR, insurance, and crisis management, the panel emphasizes developing response playbooks that mirror current operational dependencies.

    Panelists will explore insurer-driven requirements for identity security and MFA, lessons from major SaaS outages, and how to communicate effectively with executives and boards when downtime impacts revenue-critical operations. Attendees will gain a comprehensive understanding of how to engineer resilience—not just respond—and how to align IR, continuity planning, insurance, and business priorities into a unified, enterprise-wide strategy.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber Talent Crisis: Recruiting, Retaining, and Reskilling Your Team
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    The cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.

    2:10 pm
    Leveraging the CTI Ecosystem: Actionable Intelligence for Regional Threats
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    Session details to come.

    2:10 pm
    The Talent Multiplier: Automation and Orchestration Strategies for Understaffed Teams
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    Session details to come.

    2:10 pm
    OT/ICS Incident Response: Specialized Triage for Critical Infrastructure Breaches
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Session details to come.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:15 pm
    Location / Room: Networking Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage - Part 4
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    3:15 pm - 4:45 pm

    Come join this interactive workshop — think hands-on working groups so you are an active participant…this is not 6 hours of being lectured at.

    Learn how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.

    Why this course? Imagine your CEO just asked about AI security. Do you have an answer?

    While you’re counting vulnerabilities, your competitors are deploying AI at scale.

    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.

    And your cybersecurity team? Still writing policies nobody reads.

    You’ll master:
    •  The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    •  Executive Translation — Turn technical AI risks into boardroom language
    •  NIST AI RMF Implementation — Practical application, not theory
    •  The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    •  Shadow AI Discovery — Find and govern the AI already in your organization
    •  Business-First Security — Protect value, not just systems
    Who should attend:
    Perfect fit:
    •  CISOs facing board questions about AI
    •  Information Security Directors enabling digital transformation
    •  IT VPs without dedicated security teams
    •  Cybersecurity Consultants serving enterprise clients
    •  Risk Managers governing AI initiatives
    •  Aspiring decision makers and those reporting to one
    Wrong course:
    •  Developers wanting to code AI models
    •  Analysts seeking technical certifications
    •  Anyone looking for hands-on hacking labs
    This workshop is NOT about:
    •  Prompt injection techniques
    •  Model architecture security
    •  Technical vulnerability scanning
    •  Writing 200-page policies
    This workshop IS about:
    •  Speaking profit-and-loss to executives
    •  Enabling your AI transformations
    •  Building cybersecurity into AI from day one
    •  Becoming the trusted AI advisor
    You’ll leave with:
    1. The Complete AIR-MAP Toolkit
    •  90-day implementation roadmap
    •  Discovery templates and workflows
    •  Risk scoring calculators
    •  Executive presentation templates
    2. Ready-to-Deploy Policies
    •  AI Acceptable Use Policy (customize in minutes)
    •  Vendor assessment questionnaires
    •  Incident Response playbooks
    3. 30-Minute Strategy Session
    Complementary private consultation to apply AIR-MAP to your specific situation.
    3:15 pm
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 4
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    3:15 pm - 4:45 pm

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

Exhibitors
  • AccessIT Group
    Booth: TBD

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • Anzenna
    Booth: 235

    Anzenna provides advanced security solutions that streamline the investigation of identity threats by integrating multiple security tools and reducing the need for extensive manual operations.

  • AppOmni
    Booth: TBD

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • ASIS Greater Philadelphia
    Booth: TBD

    ASIS International is the preeminent organization for security professionals, with more than 38,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals by developing educational programs and materials that address broad security interests.

  • Axonius
    Booth: TBD

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • Canary Trap
    Booth: TBD

    Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.

    Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.

  • Cloud Security Alliance Delaware Valley Chapter (CSA-DV)
    Booth: TBD

    Cloud Security Alliance Delaware Valley Chapter (CSA-DV) is a not-for-profit organization for people interested in education, training and possible certification in cloud security. We seek to improve the understanding of cloud security and to promote the interaction of both professionals and students in order to discuss current trends and topics within the industry.

    OUR PURPOSE:

    To promote cloud security best practices within the Greater Philadelphia region, to educate about cloud computing, identify its risks, methods to secure it, and to continually provide opportunities for the development of cloud security professionals.

  • Cloud Security Alliance Lehigh Valley Chapter
    Booth: TBD

    The Cloud Security Alliance is a non-profit organization formed to promote the use of best practices for providing security assurance within Cloud Computing, and provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is comprised of many subject matter experts from a wide variety disciplines, united in our objectives:

    • Promote a common level of understanding between the consumers and providers of cloud computing regarding the necessary security requirements and attestation of assurance.
    • Promote independent research into best practices for cloud computing security.
    • Launch awareness campaigns and educational programs on the appropriate uses of cloud computing and cloud security solutions.
    • Create consensus lists of issues and guidance for cloud security assurance.
  • Concentric AI
    Booth: TBD

    Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.

  • Darktrace
    Booth: 304

    Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.

  • Everpure, Inc. (formerly Pure Storage)
    Booth: TBD

    We are Everpure. We don’t just store data—we bring it to life.

    As AI becomes core to business, infrastructure must evolve, yet too many organizations are still relying on rigid, siloed systems built for the past. The Everpure Platform replaces static storage with a unified, living platform that evolves with you—agile, resilient, and built to scale—so you can eliminate friction and unleash the power of your data.

  • Expel
    Booth: TBD

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • Harness, Inc.
    Booth: TBD

    Traceable is the leading platform for protecting modern applications and APIs across their entire lifecycle. Built for today’s cloud native, distributed environments, Traceable combines continuous discovery, real time threat detection, shift left testing, and intelligent runtime protection into a single integrated solution. Security, DevSecOps, and platform teams rely on Traceable to eliminate blind spots, stop advanced threats, simplify compliance, and accelerate secure delivery without slowing innovation.

  • Philadelphia InfraGard Members Alliance
    Booth: TBD

    InfraGard is a partnership between the FBI and the private sector. It is an association of people from businesses, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the U.S. Philadelphia InfraGard Members Alliance (IMA) provides a forum for the exchange of information between the government, the owners and operators of the national infrastructure, and others concerned with the protection of the national infrastructure. Philadelphia IMA supports eastern Pennsylvania and southern New Jersey. Membership is free and new members are welcome.

  • ISACA Philadelphia
    Booth: TBD

    The Philadelphia Chapter of ISACA has a membership base of more than 1,600 individuals primarily located in the Philadelphia and the surrounding suburbs, extending into Delaware and Southern New Jersey. The membership of the Chapter includes professionals working in various industries and capacities. From students through experienced C-level executives, the Philadelphia Chapter provides, training, networking and social events to this diverse group who share the common goal of providing expertise in IT audit, security, risk, and governance topics to their colleagues. The Chapter conducts events on a monthly basis led by an active, vibrant and dedicated group of volunteers and is actively seeking business partners to help provide value and knowledge to its members.

  • ISC2 Philadelphia Chapter
    Booth: TBD

    Welcome to the ISC2 Philadelphia Chapter, your trusted hub for cybersecurity excellence in the City of Brotherly Love. As a local chapter of the esteemed International Information System Security Certification Consortium (ISC2), we are dedicated to advancing the cybersecurity profession and building a robust community of security enthusiasts, professionals, and experts in the Greater Philadelphia area. We come from a wide range of industries but share a passion of promoting cybersecurity knowledge, facilitating professional growth, and fostering connections among individuals who share a passion for safeguarding our digital world.

  • Island
    Booth: TBD

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • ISSA Delaware Valley
    Booth: TBD

    Our chapter serves the Delaware Valley and Mid-Atlantic region. This is comprised of Eastern Pennsylvania, Northern Maryland, Southern New Jersey, and Delaware.
    We are making history as we continue to grow the chapter with your membership, and bring exciting programs to you. If you have not already been involved in the membership meetings, we encourage you to do so. Hopefully, you will walk away with more ideas to take back to your organizations, or you may come away with a sense of – “Hey, we had that same problem”, or “Our company is not alone in dealing with these issues.”

  • Keysight
    Booth: TBD

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Netskope
    Booth: TBD

    Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.

  • OWASP
    Booth: TBD

    The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software. Our programming includes:

    • Community-led open source projects including code, documentation, and standards
    • Over 250+ local chapters worldwide
    • Tens of thousands of members
    • Industry-leading educational and training conferences

    We are an open community dedicated to enabling organizations to conceive, develop, acquire, operate, and maintain applications that can be trusted. All of our projects, tools, documents, forums, and chapters are free and open to anyone interested in improving application security.

  • OpenText Inc.
    Booth: TBD

    OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Information Management.

    OpenText (NASDAQ/TSX: OTEX), founded in 1991 in Waterloo, has a rich history of helping customers manage their most important asset—information. Originating from a collaboration to digitize the Oxford English Dictionary, OpenText has grown into a global leader in information management. With over 120,000 enterprise customers across 180 countries, OpenText supports 98 of the top 100 global companies. A wide breadth of offerings uniquely positions OpenText to help customers unlock the value of that information using Al, cloud, and security innovations.

  • Red Canary, a Zscaler company
    Booth: TBD

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • SecurityScorecard
    Booth: TBD

    SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.

  • Seemplicity
    Booth: TBD

    Seemplicity offers a risk reduction and productivity platform that streamlines the way security teams manage risk reduction. By orchestrating, automating, and consolidating all remediation activities into a single workspace, Seemplicity is revolutionizing the way security teams drive and scale risk reduction efforts across organizations.Seemplicity streamlines and collaboratively transforms the remediation process for developers, DevOps, and IT across the organization, assisting them in achieving complete operational resilience and establishing a truly scalable security program.

  • Semperis
    Booth: TBD

    For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.

    As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) ConferenceHIP Podcast and free identity security tools Purple Knight and Forest Druid.

  • SpyCloud
    Booth: TBD

    SpyCloud is the leader in account takeover (ATO) prevention, protecting billions of consumer and employee accounts worldwide. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals’ ability to profit from stolen information. Learn more & check your exposure at spycloud.com.

  • Strike48
    Booth: TBD

    Strike48’s core mission is to help you automate the extraction of business value from server logs. The Strike48 Prospector Studio is an AI Agent Creation and Management Suite that allows you to quickly start inspecting logs with AI agents. Use our Agent creation personas to help create Agents for your purposes or you can use our professionally pre-made Agents instead!

  • Sublime Security
    Booth: TBD

    Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.

  • Torq
    Booth: TBD

    Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.

  • U.S. Secret Service – Cyber Fraud Task Force
    Booth: TBD

    Cyber Fraud Task Forces (CFTFs), the focal point of our cyber investigative efforts, are a partnership between the Secret Service, other law enforcement agencies, prosecutors, private industry, and academia. The strategically located CFTFs combat cybercrime through prevention, detection, mitigation, and investigation.

  • WiCyS Delaware Valley
    Booth: TBD

    Women make up only 11% of the cyber security workforce. With such low representation, it is essential that we advocate for and assist women as they navigate through the cyber security industry.

    Philadelphia Women & Cyber Security’s Mission: To provide opportunities to advance careers for professionals in Cyber Security through education, mentoring, and networking. A Supportive community for women in cyber security that works to promote and encourage women to develop their careers. We are open to any support for our mission from any gender. Come to the next Philadelphia Women and Cyber Security’s event to get to know other like-minded, female cyber security professionals in the area. We will discuss industry best practices, the latest security trends and solutions, and share lessons we’ve learned over the years. For more information, contact wicysdelawarevalley@wicys.org.

  • Zafran Security
    Booth: TBD

    The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.

  • Zscaler
    Booth: TBD

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

  • ZeroFox
    Booth: TBD

    Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.

    Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Ahanu Boyle, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Ahanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.

    Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.

    Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Monique St. John, Moderator
    VP, CISO, Associate CIO, Children's Hospital of Philadelphia

    Monique St. John is the Chief Information Security Officer (CISO) and Associate Chief Information Officer (ACIO) at the Children’s Hospital of Philadelphia (CHOP). In this role, Monique supports the organization’s mission and strategic plan with responsibility for the enterprise Information Security program. With over 25 years of experience in technology, security, and service delivery, Monique relies on a collaborative leadership approach to ensure solutions protect CHOP, provide value, and enable the business. She is a trusted advisor, partners with colleagues to manage risk, and strives to balance security with technology innovation.

  • speaker photo
    Craig Stanland
    Author, "Blank Canvas: How I Reinvented My Life After Prison"
  • speaker photo
    Lucas Burke
    VP, Information Security GRC, Radian Group, Inc.

    Lucas Burke is a seasoned Information Security Executive with over two decades of experience leading cybersecurity and risk management programs across Fortune 500, FinTech, Financial Services, Insurance, Higher Education, and Non-Profit sectors. As Vice President of Information Security Governance, Risk, and Compliance at Radian, Lucas drives enterprise-wide strategies that align security initiatives with business objectives, enabling security to function not only as a safeguard but as a catalyst for innovation and competitive advantage.

    Lucas brings deep expertise in incident response, regulatory compliance, privacy leadership, data governance, and enterprise risk management. His leadership spans the full security spectrum—from building and mentoring high-performing teams of analysts, operators, threat hunters, and engineers, to designing resilient infrastructure and secure network architectures in prior roles.

    Whether in the boardroom or at the whiteboard, Lucas is known for his coalition-building leadership style and his ability to translate complex security challenges into actionable strategies. He is a frequent speaker on topics such as executive-level communication, risk management, and security governance, and is a trusted voice in the cybersecurity community.

    When not figuring out how to stop the latest cyber threats, Lucas enjoys spending time with his children, playing the banjo, and staying active on his Peloton.

  • speaker photo
    Mark Eggleston, CISSP, GSEC, CHPS
    CISO, CSC

    Mark Eggleston is the chief information security officer (CISO) for CSC, responsible for the global security and privacy program design, operations and continual maturation. As a senior executive specializing in security and privacy program development and management, Mark’s unique background and expertise in information technology, program, and people management have positioned him as a thought leader and frequent industry speaker.

    Mark started his career as a program manager and psychotherapist at a hospital serving children and adolescents. Later, Mr. Eggleston helped develop an internal compliance approach—complete with policies and tools—ensuring a geographically dispersed health care provider organization (across 19 states) complied with the Health Insurance Portability and Accountability Act of 1996 (HIPAA). Mr. Eggleston then transitioned to applying his HIPAA expertise at an HMO where he has implemented many successful security controls and technologies, including single sign-on (SSO), Identity and Access Management (IAM), Cloud Access security broker (CASB), and a vulnerability assessment program.

    Mark received his Bachelor of Science in psychology from Radford University. Later, Mark received both his Master of social work and his post-baccalaureate certificate in management information systems from Virginia Commonwealth University. In addition, Mark holds CHPS, CHPS, and CISSP certifications.

  • speaker photo
    Tammy Klotz
    CISO, Trinseo

    Tammy Klotz is a vibrant and accomplished executive with over three decades of diverse experience in the manufacturing industry, specializing in cybersecurity and transformational leadership. She offers keen expertise in navigating mergers, acquisitions, and divestitures within both publicly-traded and privately-held companies and is seasoned in security, risk, and compliance leadership. Tammy brings a dynamic and positive approach to problem solving, excelling in simplifying intricate IT and cybersecurity concepts and facilitating pragmatic, non-technical dialogues that resonate with business executives. She is recognized as a strong, knowledgeable, thoughtful security executive who excels in public speaking and thought leadership, striving to empower others through knowledge sharing.

  • speaker photo
    Keith McMenamin, Moderator
    VP of IT, Visit Philadelphia

    Keith McMenamin is the Vice President of Information Technology at VISIT PHILADELPHIA®, the region’s official tourism marketing agency. In his 17 years with VISIT PHILADELPHIA®, Mr. McMenamin is credited with building and securing the technical infrastructure for an award-winning organization that was responsible for creating $11 billion dollars in economic impact for the city of Philadelphia in 2022. Over the years, he quickly became a trusted advisor to C-Suite executives along with evolving into the “go-to tech guy” for friends and colleagues in the local tourism marketing and media industries. Keith is a regular speaker and panelist at national industry conferences, volunteer at local schools and founder of the Philly Tech Council.

    Outside of the office Keith enjoys playing sports, spending time with his family and taking long vacations to Southern California.

  • speaker photo
    Aaron Weismann
    CISO, Main Line Health
  • speaker photo
    Kevin Werner
    Associate CISO, Main Line Health

    Kevin is the Associate CISO, and the former System Director of Security Operations at Main Line Health, a mid-sized hospital system in Suburban Philadelphia, where his team oversees all non-GRC aspects of information security. He has more than a decade of information security experience and is a licensed attorney in Pennsylvania and New Jersey. He currently holds a CISSP certification as well as a CIPP/US certification. Kevin went to the College of the Holy Cross in Worcester, MA, for undergrad with a degree in Philosophy, and attended the Villanova University School of Law.

  • speaker photo
    Jordan Fischer, Moderator
    Founding Partner & Owner, Fischer Law, LLC

    Jordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.

    Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.

    With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.

    Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.

    In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.

    Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.

    Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.

    HONORS & RECOGNITIONS
    Lawyer on the Fast Track, The Legal Intelligencer (2023)
    Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
    Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
    ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
    SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
    Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
    Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
    European Union ERASMUS Grant Recipient, 2020

    ASSOCIATIONS & MEMBERSHIPS
    American Bar Association, Business Law Fellow, 2020-2022
    American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
    Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
    California Bar Association
    New Jersey Bar Association
    Forbes Business Council Member, 2022
    International Association of Privacy Professionals (IAPP), Member
    University of California, Berkeley, Cybersecurity Lecturer
    former Thomas R. Kline School of Law, Drexel University, Law Professor
    former Chestnut Hill College, Adjunct Professor
    West Chester Friends School, Board Member
    Appointed Fulbright Specialist in Cybersecurity and Data Privacy

    CERTIFICATIONS
    Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
    Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
    Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP)

  • speaker photo
    Roger Reid
    Sr. Cybersecurity Solutions Engineer, Concentric AI

    Roger is a senior cybersecurity solutions engineer and AI security leader with deep expertise in technical product strategy and large‑scale program execution. Roger drives enterprise-wide initiatives that strengthen AI security, compliance, and governance while aligning product and solution portfolios to strategic business objectives. His leadership focuses on enabling secure, responsible, and scalable AI adoption across complex global environments.

  • speaker photo
    Sarah Connahan
    Sr. Information Security Analyst, Federal Reserve Bank of Philadelphia

    Sarah Connahan serves as a Senior Information Security Analyst with the Federal Reserve Bank of Philadelphia, where she leads the Bank’s incident response and vulnerability management functions. Since joining the organization in 2021, Sarah has been instrumental in advancing the Bank’s efforts to enhance operational resilience and safeguard critical information assets. She earned her Bachelor of Science in Applied Mathematics from Temple University and completed her cybersecurity education at the Community College of Philadelphia.

  • speaker photo
    Panel Discussion
  • speaker photo
    Silas Adams
    CISO, Pep Boys

    Silas Adams is a 22-year information security veteran and currently serves as Chief Information Security Officer at Pep Boys. A former Marine, he sharpened his craft supporting missions at U.S. Cyber Command, the NSA, DIA, and (what is now) the CIA’s Directorate of Digital Innovation, and later served as a DARPA Innovation Fellow within the Information Innovation Office (I2O).

    In the private sector, Silas has led security and risk programs at PwC, Cognizant, Wells Fargo, Chesapeake Utilities, RubiconMD, Oak Street Health, Lincoln Investment, and others, building expertise across highly regulated industries. He is known for pairing deep technical rigor with pragmatic leadership, he drives security transformations that enable business outcomes while delivering and transforming technology ecosystems that are secure, compliant, scalable, and built for speed. His risk-oriented approach to building, transforming and leading secure digital ecosystems enables organizations to seize opportunities throughout their business lifecycle, intelligently embrace risk to yield returns and cause disruptive innovation.

  • speaker photo
    Andy Stone, Moderator
    CTO, Americas, Everpure

    Andy Stone is an accomplished IT executive with a passion for technology and creating innovative solutions that solve business problems and deliver results. As CTO, Americas, at Everpure, Andy is focused on delivering next-gen data storage and protection technologies that help companies get better insights, improve time-to-market, and make breakthroughs.

  • speaker photo
    Silas Adams
    CISO, Pep Boys

    Silas Adams is a 22-year information security veteran and currently serves as Chief Information Security Officer at Pep Boys. A former Marine, he sharpened his craft supporting missions at U.S. Cyber Command, the NSA, DIA, and (what is now) the CIA’s Directorate of Digital Innovation, and later served as a DARPA Innovation Fellow within the Information Innovation Office (I2O).

    In the private sector, Silas has led security and risk programs at PwC, Cognizant, Wells Fargo, Chesapeake Utilities, RubiconMD, Oak Street Health, Lincoln Investment, and others, building expertise across highly regulated industries. He is known for pairing deep technical rigor with pragmatic leadership, he drives security transformations that enable business outcomes while delivering and transforming technology ecosystems that are secure, compliant, scalable, and built for speed. His risk-oriented approach to building, transforming and leading secure digital ecosystems enables organizations to seize opportunities throughout their business lifecycle, intelligently embrace risk to yield returns and cause disruptive innovation.

  • speaker photo
    Jim Bearce
    VP, Professional Services, AccessIT Group

    Jim Bearce is a seasoned cybersecurity leader with over 20 years of experience in IT security development, operations, and executive leadership. As Vice President of Professional Services at AccessIT Group, Jim oversees the delivery of cutting-edge security solutions, helping organizations strengthen their defenses against evolving cyberthreats.

    Prior to joining AccessIT Group, Jim played a pivotal role in guiding enterprises through complex security challenges. He has led global security teams across North & South America, Europe, and the Asia-Pacific region, specializing in threat detection, incident response, and risk mitigation for large-scale organizations. He has also served as an interim CISO, advising executive teams and Boards of Directors on cybersecurity strategy, risk management, and compliance.

    Jim holds a Master of Science in Information Security & Assurance from Norwich University, along with multiple industry-recognized security certifications, including CISSP and CISM.

  • speaker photo
    Melissa Ruzzi
    Director of AI, AppOmni

    Melissa Ruzzi is Director of AI at AppOmni, a SaaS security company protecting 101 million+ users secured over 260 million exposed data records, analyzes 60 billion cyber events a month and has 100+ employees worldwide. She’s fascinated by the challenges involved in applying machine learning in cybersecurity and the constant changing threat landscape. She embraces a mix of technical and business skills and is passionate about creating applications using data science and machine learning to help organizations defend against cyber threats.

  • speaker photo
    Patrick Keating, Moderator
    President & CEO, KeySec Advisors
  • speaker photo
    Panel Discussion
  • speaker photo
    Lexie Thach
    Founder, Ex Machina Parlor LLC

    Lexie Thach is a Lead Cybersecurity Engineer at NIWC Pacific with more than a decade of experience in defensive cyber operations, red teaming, and autonomous system security. A U.S. Air Force veteran, Lexie specializes in robotics, drones, IoT exploitation, and wireless attacks. She is the founder of Ex Machina Parlor, a woman-owned, veteran-operated cyber-centric hackerspace, and the creator of multiple open-source security robotics platforms showcased at DEFCON. Her work focuses on blending physical systems with modern cyber offense and defense.

  • speaker photo
    Jason Mical
    Global Field CTO, Strike48

    Jason Mical is probably best known as the “Father of the SilentRunner® technology,” the industry’s first full packet capture, network forensics solution of its kind, developed by the NSA and Raytheon. He is also the co-creator of the Resolution1/Fidelis Endpoint Platform, the industry’s first EDR solution. He assists clients in such areas as electronic intercepts, intrusion analysis, malware eradication, forensic investigations, incident response, security standards and guidelines. Jason also offers his expertise and consulting services to clients and other audiences on issues of both cyber and physical security investigations.

    Jason has more than 30 years of experience in telecommunications fraud prevention, physical security management, and cybersecurity investigations. During his career, he has developed and implemented overall cybersecurity, physical security, forensic investigation, and fraud control programs for several global organizations and managed lawful interception operations to support federal agencies. He has developed
    security and fraud awareness training seminars for employees in private industry, as well as federal, state and local law enforcement. Jason has been a member of the FBI InfraGard, United States Secret Service Electronic Crimes Task Force, ISSA, HTCIA, ASIS, ANSIR ,and CTIA Fraud Task Forces.

  • speaker photo
    Nick Falzarano
    Director, Information Security, TE Connectivity
  • speaker photo
    Panel Discussion
  • speaker photo
    Paul Lynch
    Principal & Chief Security Advisor, Executive Security Advisors

    Paul is a former public-company CISO and cybersecurity executive with more than 20 years of experience advising boards and executive leadership on enterprise security strategy and resilience. He specializes in incident response, governance, risk, and compliance (GRC), and enterprise risk management, with a focus on AI risk governance.

    Paul’s work centers on securing the integrity of data and decision systems in an AI-driven world, applying the NIST AI Risk Management Framework to address threats such as data poisoning and adversarial manipulation. He holds the (ISC)² Building AI Strategy Certificate and is currently pursuing a Master of Science in Cybersecurity Management & Policy at the University of Maryland Global Campus.
    He serves as Secretary of the (ISC)² Philadelphia Chapter and has contributed as a Subject Matter Expert for the (ISC)² CCSP and ISSMP examinations and the EC-Council Certified CISO (C|CISO) program. He has also served on cybersecurity advisory boards for Verizon Enterprise, Rubrik, and eSentire.

  • speaker photo
    Krista Arndt
    Associate CISO, St. Luke's University Health Network

    Krista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.

    Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

    When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.

  • speaker photo
    Happy Hour
  • speaker photo
    Ahanu Boyle, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Ahanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.

    Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.

    Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Ahanu Boyle, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Ahanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.

    Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.

    Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Michael Hoehl
    CISO, Carpenter Technology Corporation

    Michael has 20+ years of experience in Cybersecurity serving Fortune 500, Manufacturing, Retail, Health, and Financial Services. He is the CISO at Carpenter Technology leading Global Cybersecurity Program including strategy, operations, IR, Governance, and Compliance. His credentials include a Master of Science in Information Security Management from SANS Technology Institute, and several certifications including Carnegie Mellon University CISO program, CISSP, GCIA, and GCIH.

  • speaker photo
    Michael Leland
    VP, Field CTO, Island

    Michael joined Island in October 2024 as Field CTO, bringing over 30 years of data networking, operations, and cybersecurity domain expertise.

    He formerly served as Head of Technical Marketing and Chief Cybersecurity Evangelist at SentinelOne where he was responsible for messaging and strategic development of their XDR product roadmap as well as the identity security portfolio. Prior to SentinelOne he held the title of Chief Technical Strategist for McAfee.

    Michael was the co-founder and CTO of NitroSecurity–later acquired by McAfee–where he was responsible for developing and implementing their overall SIEM technology vision and roadmap and has held senior technical management positions at Cabletron and Avaya.

    Michael studied Computer and Electrical Engineering at the Georgia Institute of Technology and received an honorary MBA from Bentley University where he helped create the Information Age MBA curriculum. He is also an adjunct professor teaching cybersecurity courses at Rochester Institute of Technology in New York and Norwich University in Vermont.

  • speaker photo
    Piyali Das
    Director, Technology Risks and Controls - US Card and International Business and Payments, CapitalOne

    Piyali Das is a highly-accomplished cyber risk leader with two decades of experience driving enterprise-wide technology and cyber risk initiatives. Certified with CRISC, CCSK, CCAK, and PMP, she aligns risk management with strategic business objectives. Her expertise covers information security risk and compliance frameworks, cloud security, third-party risk, and AI/ML risk assessment. Piyali holds an MS in IT and Cybersecurity, specializing in data protection and risk management, complemented by a BTech in Computer Science and Engineering, which provides a strong foundation in algorithms and system architecture.

  • speaker photo
    Chad Barr
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group

    Chad Barr is a seasoned leader in the field of information security, currently serving as the Director of Governance, Risk and Compliance (GRC) within the Risk Advisory Service practice at AccessIT Group (AITG). With a proven track record of success, Chad brings a wealth of experience to AccessIT Group.

    As a visionary leader in the realm of cybersecurity, Chad has honed his skills across multiple disciplines, including security engineering, project management, risk management, and compliance. His extensive background underscores his ability to guide organizations toward robust and resilient security postures.

  • speaker photo
    Michael Meyer, Moderator
    Founder, AtAnEdge

    Michael Meyer is a two-time CTO/CISO and senior technology and security executive with 20+ years of experience securing and modernizing high-volume digital platforms in regulated industries. His work spans cybersecurity, enterprise risk, cloud, data, privacy, compliance, and AI enablement, with a track record of building practical, scalable operating models that support both resilience and growth. He has published 21 articles, spoken at 20+ industry events, and holds 11 professional certifications across security, risk, privacy, and blockchain. Michael earned a Computer Science degree from Rutgers University and a Master's in Technology Management from Georgetown University. He previously served in the U.S. Army in Military Intelligence.

  • speaker photo
    Panel Discussion
  • speaker photo
    Fredrick Dande, PhD
    Sr. ITIL Project Manager, Circle

    Business Enablement, Technology Strategy, and Digital Transformation. With 15+ years advising firms like EY and Circle, Fredrick developed the ROI-Based Risk Assessment Framework (RRAF) to help leaders quantify IT and cyber risk in business terms. He has presented at IEEE and other professional forums, holds a PhD in Technology Management, and is certified in ITIL, PMP, and IT governance. He empowers executives to turn IT risk into strategic growth and measurable business value.

  • speaker photo
    Jordan Fischer
    CEO & Founder, Fischer Law, LLC

    Jordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.

    Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.

    With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).

    Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.

    Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.

    In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.

    Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.

    Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.

    HONORS & RECOGNITIONS
    Lawyer on the Fast Track, The Legal Intelligencer (2023)
    Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
    Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
    ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
    SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
    Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
    Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
    European Union ERASMUS Grant Recipient, 2020

    ASSOCIATIONS & MEMBERSHIPS
    American Bar Association, Business Law Fellow, 2020-2022
    American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
    Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
    California Bar Association
    New Jersey Bar Association
    Forbes Business Council Member, 2022
    International Association of Privacy Professionals (IAPP), Member
    University of California, Berkeley, Cybersecurity Lecturer
    former Thomas R. Kline School of Law, Drexel University, Law Professor
    former Chestnut Hill College, Adjunct Professor
    West Chester Friends School, Board Member
    Appointed Fulbright Specialist in Cybersecurity and Data Privacy

    CERTIFICATIONS
    Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
    Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
    Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP)

  • speaker photo
    Vana Khurana
    Sr. Security Architect, Zoom

    Vana Khurana is CISSP, AWS Certified Architect (A), CCSP, CCSK, GSEC, and TOGAF certified. Vana serves as Director of Training and a Board Member of Cloud Security Alliance Delaware Valley Chapter. She is also an Adjunct Faculty at Temple University, Philadelphia. Vana has authored the book "IT Process Management," available on Amazon.

  • speaker photo
    Derek Fisher, Moderator
    Director, Cyber Defense & Information Assurance Program, Temple University; Founder, Securely Built

    Cybersecurity leader and educator, serving as a professor and director in higher education. An author and speaker, sharing insights on emerging security challenges while also mentoring the next generation of professionals entering the field. CISSP, CSSLP, AWS

  • speaker photo
    Joseph Arahill, Moderator
    Security GRC and Operational Excellence Leader, Philips Ambulatory Monitoring & Diagnostics

    Joe Arahill is a cybersecurity leader focused on Security Governance, Risk, and Compliance (GRC) and operational excellence within regulated environments, including his current role at Philips. He leads initiatives that strengthen enterprise security through structured risk management, control implementation, and continuous performance monitoring.

    Joe brings experience across multiple industries, including financial services, where he spent much of his career securing business systems and supporting compliance with regulatory requirements. His work focuses on building scalable security programs aligned with business objectives, with an emphasis on frameworks and compliance, and on incident response to improve resilience and protect critical information assets.

    Joe holds a Bachelor of Science in Management of Information Systems and a Master of Science in Information Assurance from Norwich University. He also maintains the CISSP and CISA certifications and applies a practical, execution-focused approach to advancing security maturity.

  • speaker photo
    Panel Discussion
  • speaker photo
    Ahanu Boyle, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Ahanu is a cyber risk analyst with Cyber Risk Opportunities who brings years of hands-on information security experience to the enterprise AI challenge. They lead cyber risk management initiatives for organizations of all sizes, translating complex security concepts into actionable strategies that business leaders can implement.

    Since the emergence of generative AI, Ahanu has been at the forefront of enterprise AI security helping organizations safely integrate LLMs into their operations without sacrificing productivity or innovation. Their specialty lies in building secure AI workflows that actually work in practice, bridging the gap between cutting-edge technology and real-world business needs.

    Ahanu’s approach centers on a core belief: effective security enables innovation rather than blocking it.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.