Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, November 8, 20237:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 amSecureWorld PLUS CourseRegistration Level:SecureWorld Plus
7:30 am - 9:00 amTopic(s) and instructor to be announced.
Our PLUS courses provide 6 hours of in-depth training interspersed during the conference. Learn in a small group of your peers from an instructor with subject matter expertise on a critical, timely security issue.
Includes a Conference Pass; earn 18 CPE credits total!
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:50 amParticipating professional associations and details to be announced.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 am[Executive Panel] Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec LandscapeRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterOver the last few years, the workforce and the way we work has entirely shifted and evolved. Much like conducting a grand orchestra, cybersecurity executives are now called upon to more than just conduct procedures and make “good music.” Listen to local cybersecurity executives who are in the trenches navigating the “new normal,” the threats impacting the industry, and their different key takeaways and lessons learned along the way. This discussion is followed by a live Q&A, so come prepared to ask your local executives your burning workforce questions!9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Conference Pass
10:15 am - 11:00 amKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
10:15 amThe Future of WorkRegistration Level:Conference Pass
10:15 am - 11:00 amOver the last few years, the workforce, and the way we work, has entirely shifted focus. Between hybrid work models, attracting and retaining diverse talent, forced digital migrations/transformations, cybersecurity succession planning, and overall mental fatigue, the future of work has dramatically changed. We will discuss how to navigate the “new normal” and lessons learned along the way. This discussion is followed by a Q&A, so come prepared to ask your burning workforce questions!
10:15 amStop Breaches and Drive BusinessRegistration Level:Open Sessions
10:15 am - 11:00 amSession description coming soon.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
11:10 amSecuring the Supply ChainRegistration Level:Conference Pass
11:10 am - 11:55 amA discussion of managing third-party risk and how to manage expectations and contracts with vendors.
11:10 am[Panel] There's a Bad Moon on the Rise – Are You Ready?Identifying the Current Threat LandscapeRegistration Level:Open Sessions
11:10 am - 11:55 amLike the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.
The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.
Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.
11:10 amBEC Attacks: The Stealthiest and Most Lucrative ThreatRegistration Level:Open Sessions
11:10 am - 11:55 am12:00 pmLUNCH KEYNOTERegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote Theater12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmAdvisory Council – VIP / INVITE ONLY
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pmRansomware: How to Stay Off the Front PagesRegistration Level:Conference Pass
1:15 pm - 2:15 pm1:15 pm[Panel] Lucy in the Cloud with DiamondsSecuring Your Cloud EnvironmentRegistration Level:Open Sessions
1:15 pm - 2:15 pmCan you “imagine” if The Beatles, when first starting out, had to deal with having their catalog of music hacked, stolen, and held for ransom simply because it was in an unsecure cloud setting? While it is possible for that to happen with their hit-laden collection of songs today, it’s merely a tiny example of how businesses operate at a minimum in a hybrid cloud environment—many in a cloud-only platform.
With that comes security issues and another major area which cybersecurity professionals must work diligently to protect.
Our panel of experts share the good, the bad, and the ugly of operating in a cloud environment, what it takes to make the move to hybrid or multi-cloud successful, how to protect data from insider and outsider threats, and what it takes to provide the support DevOps teams need.
2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pm[Fireside Chat] Sustainable Cybersecurity and ResiliencyRegistration Level:Conference Pass
2:30 pm - 3:15 pmAs the nation’s cyber defense agency, CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. Since the majority of our nation’s critical infrastructure is privately owned, ensuring the nation’s cybersecurity posture requires continued collaboration between government and the private sector. During this fireside chat, CISA will discuss the current cyber threat landscape, the agency’s latest initiatives to help critical infrastructure owners and operators protect and defend their networks, and the catalog of CISA services available to organizations to become more cyber resilient.
2:30 pmDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Conference Pass
2:30 pm - 3:15 pm2:30 pmHow to Build an Effective Open Source Security ProgramRegistration Level:Open Sessions
2:30 pm - 3:15 pmSession description coming soon.
3:15 pmNetworking BreakRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
3:45 pmCLOSING KEYNOTERegistration Level:Open Sessions
3:45 pm - 4:30 pmLocation / Room: Keynote Theater3:45 pmSecureWorld PLUS CourseRegistration Level:SecureWorld Plus
3:45 pm - 5:15 pmTopic(s) and instructor to be announced.
Our PLUS courses provide 6 hours of in-depth training interspersed during the conference. Learn in a small group of your peers from an instructor with subject matter expertise on a critical, timely security issue.
Includes a Conference Pass; earn 18 CPE credits total!
- Thursday, November 9, 20237:30 amRegistration openRegistration Level:7:30 am - 4:30 pm
Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 amSecureWorld PLUS CourseRegistration Level:SecureWorld Plus
7:30 am - 9:00 amTopic(s) and instructor to be announced.
Our PLUS courses provide 6 hours of in-depth training interspersed during the conference. Learn in a small group of your peers from an instructor with subject matter expertise on a critical, timely security issue.
Includes a Conference Pass; earn 18 CPE credits total!
8:00 amExhibitor Hall openRegistration Level:SecureWorld Plus
8:00 am - 4:30 pmYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:50 amParticipating professional associations and details to be announced.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 amOPENING KEYNOTERegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote Theater9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amBuilding Out Information Security Programs: You're Hired as the CISO, Now What?Registration Level:Conference Pass
10:15 am - 11:00 amNew CISOs and experienced CISOs new to organizations face the challenge of building out new, or building upon existing, cybersecurity programs. This peer exchange among CISOs will dive into their approach to building foundational cybersecurity strategies.
10:15 amAn Honest Peer-Driven Conversation About Cyber InsuranceRegistration Level:Conference Pass
10:15 am - 11:00 amCyber insurance is no longer a “do I need it?” but a must-have for organizations. This conversation among cybersecurity peers will discusse how to properly assess insurance programs, including a candid look into how the organization should drive what is and is not covered, not the insurance provider.
10:15 amAttack Surface ManagementRegistration Level:Open Sessions
10:15 am - 11:00 amSession description to come.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
11:10 amDeveloping a Crisis Management PlaybookRegistration Level:Conference Pass
11:10 am - 11:55 amWhen a data breach or other cyber incident happens, having a plan in place can mean the difference between a quick recovery and unwanted headlines and irreparable harm to stakeholder trust.
11:10 amCybersecurity as a Business DriverRegistration Level:Conference Pass
11:10 am - 11:55 amSavvy would-be customers be research companies and typically prefer to do business with those who have good cyber hygiene. How can a strong security posture be a business driver for your organization?
11:10 amData Security and ManagementRegistration Level:Open Sessions
11:10 am - 11:55 amSession description coming soon.
12:00 pmLUNCH KEYNOTERegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote Theater12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmAdvisory Council – VIP / INVITE ONLY
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pmBuilding and Maturing a Security Awareness ProgramRegistration Level:Conference Pass
1:15 pm - 2:15 pmSecurity Awareness programs have gone from an afterthought to a critical component of Information Security programs. Most large organizations now have one or more full-time employees dedicated to awareness and managing human risks. This presentation defines a common framework for building a broad awareness program using the Train, Reinforce, Assess, and Manage (TRAM) model. The presentation will also provide logical maturity steps that map out the progression for maturing an awareness program using a Awareness Program Maturity Model (APMM).
1:15 pm[Panel] I Can See Clearly Now, the Threats Are GoneThreat Intelligence: The State of InfoSec TodayRegistration Level:Open Sessions
1:15 pm - 2:15 pmZero Trust is considered by many to be a marketing buzzword, but what it really alludes to is having good, basic cybersecurity hygiene. It’s what any cybersecurity professional worth their salt has been doing, and does, daily. Ransomware, phishing, and BEC grab the headlines, but your run-of-the-mill cyberattacks can’t be ignored because of the shiny new thing garnering all the attention.
The CISO is like a musical conductor that must pay attention to all the resources at his or her disposal—be it people, tools, technologies, systems, and more. How is the organization handling security awareness training? What about staffing shortages affecting the organization, or even the vendors with which CISOs and their teams work?
Join our expert panel as they provide insights and takeaways on the state of the information security profession today, including tips for seeing clearly and staying ahead of threats.
2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pmInsider Threats: A Multi-Pronged Approach to Protecting Your OrganizationRegistration Level:Conference Pass
2:30 pm - 3:15 pmInsider threats are a real danger and cannot be overlooked. While deploying the latest secure system to fight against cyber threats is a decent strategy, you must also implement an effective insider threat system for an overall cybersecurity solution. An insider threat program cannot be brought off the shelf, but is a continuous process to identify and detect an incident as it occurs. Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)
2:30 pmBenchmarking Your Cybersecurity ProgramRegistration Level:Conference Pass
2:30 pm - 3:15 pmKey take-away:
The audience will learn how to measure the benefits and costs of its cybersecurity program.For years, enterprises have recognized the need for a cybersecurity program, but it can be very difficult to measure its value. Implementing “best practices” is often an exercise in futility, compliance audits are too general and subjective, and everybody seems to have their own notion of what works. Using data from the audience, this session will review the ways an organization can benchmark its security program to gain deeper insight into its functional costs and benefits.
Presentation Level:
GENERAL (InfoSec best practices, trends, solutions, etc.)2:30 pm[Panel] Hitting the Right Note with Your Network SecurityDeveloping an Incident Response PlanRegistration Level:Open Sessions
2:30 pm - 3:15 pmA new attack vector (or two or eight) is identified daily, and who knows what is coming down the pike from those with nefarious intentions. How do cybersecurity professionals keep up and strike the right note in their symphony of defenses? Cybersecurity teams must have solid Incident Response (IR) plans in place to mitigate these attacks.
Our panel of experts reveals the instruments—tools, technologies, and systems—they have to offer so that cybersecurity band members are all playing the same tune on behalf of their organizations. They’ll identify current threats and solutions for each so public and private entities have an IR plan that balances defense and offense, creating a beautiful song.
3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pmCLOSING KEYNOTERegistration Level:Open Sessions
3:45 pm - 4:30 pmLocation / Room: Keynote Theater3:45 pmSecureWorld PLUS CourseRegistration Level:SecureWorld Plus
3:45 pm - 5:15 pmTopic(s) and instructor to be announced.
Our PLUS courses provide 6 hours of in-depth training interspersed during the conference. Learn in a small group of your peers from an instructor with subject matter expertise on a critical, timely security issue.
Includes a Conference Pass; earn 18 CPE credits total!
- AkeylessBooth: TBD
Akeyless’ unique combination of innovative technology and cloud-native architecture, enables enterprises to fastly secure DevOps, cloud workloads, and legacy environments, while meeting compliance and regulations.
- AuditBoard, IncBooth: TBD
AuditBoard is the leading cloud-based platform transforming how enterprises manage risk. Its integrated suite of easy-to-use audit, risk, and compliance solutions streamlines internal audit, SOX compliance, controls management, risk management, and security compliance. AuditBoard’s clients range from prominent pre-IPO to Fortune 50 companies
looking to modernize, simplify, and elevate their functions. AuditBoard is the top-rated audit management and GRC software on G2, and was recently ranked for the second year in a row as one of the 100 fastest-growing technology companies in North America by Deloitte.
- Check Point Software TechnologiesBooth: TBD
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- CRESTBooth: TBD
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- Critical StartBooth: TBD
Critical Start simplifies breach prevention by delivering the most effective managed detection and incident response services. Powered by our Zero Trust Analytics Platform, the industry’s only Trusted Behavior Registry, and MOBILESOC, our 24x7x365 expert security analysts and Cyber Research Unit monitors, investigates, and remediates alerts swiftly and effectively.
- CymulateBooth: TBD
Cymulate SaaS-based continuous security validation makes it simple to measure and improve your security posture across the full attack kill-chain. Every assessment is scored and includes actionable remediation guidance to mitigate risk and optimize security control effectiveness. Cymulate enables you to take data-driven decisions and manage your security resources efficiently.
- EndaceBooth: TBD
Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.
- ExabeamBooth: TBD
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- Mandiant, now part of Google CloudBooth: TBD
- OptivBooth: TBD
Optiv is a security solutions integrator delivering end-to-end cybersecurity solutions that help clients maximize and communicate the effectiveness of their cybersecurity programs. Optiv starts with core requirement of every enterprise—risk mitigation—and builds out from there with strategy, infrastructure rationalization, operations optimization, and ongoing measurement. Learn more at https://www.optiv.com.
- Team CymruBooth: TBD
Team Cymru’s mission is to save and improve human lives. We are unrivalled across three disciplines; digital business risk platforms, free to use community services and support services to over 143 Government CSIRT teams.
Our business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.
Community Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation state threat actors.
Since 2005, our reputation remains unchallenged.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- Tenfold SecurityBooth: TBD
Based in Vienna, certex Information Technology GmbH is focussed on exploring better and easier ways for companies to deal with the growing demands of permissions management. With our innovative software solution ‘tenfold’, we have successfully revolutionised the approach to IT users and IT permissions. It has never before been so easy toautomatically control all of the important processes in the life cycle of an IT user while at the same time always having an up-to-date, company-wide overview of who has which permissions. Together with our partners, we are supporting an ever-growing number of satisfied customers from small and medium-sized enterprises as well as from large corporations, who represent every sector imaginable.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- Panel Discussion
- Panel Discussion
- Panel Discussion
- Panel Discussion
- Panel Discussion

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your regional cybersecurity community for learning and professional growth. Sign up today!
