Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 27, 20267:30 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive AdvantageCyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
7:30 am - 3:00 pmYour CEO just asked about AI security. Do you have an answer?While you’re counting vulnerabilities, your competitors are deploying AI at scale.Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.And your cybersecurity team? Still writing policies nobody reads.In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation. - Thursday, May 28, 20267:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amSimple Daily Habits to Strengthen Your Security PostureRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] The State of Cybersecurity in 2026: Threats, Trends, and What Comes NextRegistration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterSession details to come.
9:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
10:15 amThe Checkbox Fallacy: How Centralized GRC Platforms Create the Illusion of Cyber ResilienceFocus Areas: Application Security, Privacy, and Security AwarenessCISO, Arizona State UniversityRegistration Level:
Conference Pass
10:15 am - 10:50 amOrganizations rely on centralized GRC platforms to manage cyber risk, yet breaches continue to occur despite “green” dashboards and completed assessments. This talk explores how traditional GRC models abstract risk too far from the systems and teams that create it, prioritizing reporting over action. By centralizing ownership and normalizing risk data, these platforms often obscure real exposure and delay response. Attendees will gain insight into why this structural approach fails at scale and how federated cyber risk management enables clearer visibility, local accountability, and decision-making that reflects actual enterprise risk—not optimistic metrics.
10:15 amIdentity Security Beyond MFA: Continuous Verification and Risk-Based ControlsRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 amModern Ransomware: Double Extortion, Data Destruction, and Targeted CampaignsRegistration Level:
Open Sessions
10:15 am - 10:50 amSession details to come.
10:50 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
11:10 amSecuring Cloud-Native Environments: Containers, Kubernetes, and ServerlessRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 amThe Rise of AI Assistants: New Insider Threat and Data Exposure ChallengesRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] AI-Accelerated Attacks and Defenses: Preparing for Machine-Speed ThreatsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession details to come.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)CISO, SemperisRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber ConnectProactive by Design: Anticipating Threats Before They StrikeRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallThe days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.
Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.
1:15 pmZero Trust in Practice: What Real-World Implementations Look Like NowRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pmBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceRegistration Level:
Open Sessions
1:15 pm - 1:50 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:50 pmNetworking Break & Cyber ConnectWhat’s Keeping You Up at Night?Registration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallHead to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.
2:10 pmAPI Security: Managing the Fastest-Growing Attack SurfaceRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pmBuilding Incident Response Plans for Highly Distributed WorkforcesRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Building High-Trust Security Cultures in an Era of Constant DisruptionRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterSession details to come.
3:45 pmHappy Hour & Dash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- Canary TrapBooth: TBD
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- CofenseBooth: TBD
Cofense® is the original and leading provider of security awareness training and email phishing simulation, offering global enterprise-level advanced email threat detection and remediation solutions. Cofense PhishMe® and Cofense Phishing Detection and Response (PDR) offer the world’s only platforms to leverage over 35 million Cofense-trained employees who actively report suspected phishing and other dangerous email threats in real-time. Exclusive only to Cofense, this reporting system ingests and catalogs thousands of threats per day that are missed by current email gateway technologies and then eradicates those threats from customer inboxes. In short, Cofense sees and stops threats other email security systems miss. Please visit www.cofense.com or connect with us on X and LinkedIn for additional information.
- Comcast BusinessBooth: TBD
Comcast Business offers a broad suite of technology solutions to keep businesses of all sizes ready for what’s next. With a range of offerings including connectivity, secure networking, advanced cybersecurity, and unified communications solutions, Comcast Business is partnering with business and technology leaders across industries to help drive businesses forward.
- Concentric AIBooth: TBD
Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.
- ExabeamBooth: TBD
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- KeysightBooth: TBD
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- LightbeamBooth: TBD
LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.
- Red Canary, a Zscaler companyBooth: TBD
Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.
- SemperisBooth: TBD
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- Sumo LogicBooth: TBD
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
Rob Finch, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLCRob Finch is a Cyber Risk Analyst with Cyber Risk Opportunities (CRO). His job is to deliver the Managed Program, AI Risk Management Plans, other cyber risk services offered by CRO.
Rob enjoys creating tools that assist organizations in understanding and securely integrating AI tools into their operations. He focuses on developing practical, secure AI workflows that balance innovation with responsible risk management, helping teams use new technology effectively and safely.
Lester GodseyCISO, Arizona State UniversityLester Godsey is the CISO for Arizona State University, which is the largest public university by enrollment in the United States. With over 30 years of public-sector IT experience, Lester has presented at the local, state and national level on topics ranging from telecommunications to cybersecurity. As a certified PMP, CISM and CISSP, Lester has taught at the collegiate level for over 15 years in the areas of cybersecurity, technology and project management. A published author and an active participant in the cybersecurity community, he holds a BA in Music and a MS in Technology from ASU.
Panel Discussion
Jim Doggett, ModeratorCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
Panel Discussion
Panel Discussion
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.

