Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, April 16, 20259:00 am[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous FutureSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0vCISO & Managing Director, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, April 17, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amInfraGard South Florida Chapter MeetingOpen to all attendeesRegistration Level:Open Sessions
8:00 am - 8:45 amMore details to come.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] How CISOs Can Elevate Influence and Become a Business DriverRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterFor today’s CISOs, it’s no longer enough to be just technical experts. This panel of top-level cybersecurity professionals representing the regions of Vancouver, B.C., Bozeman, and Seattle, breaks away from talking about the tired mantra of “speaking the language of the business” and instead dives into practical, real-world examples of how security leaders have successfully navigated the business landscape.
The discussion focuses on actionable strategies and tactics that have helped CISOs gain influence, secure funding, and elevate cybersecurity from a technical function to a critical business driver. Walk away with specific metrics, communication techniques, and actionable insights that have been proven to work in the real world—offering practical takeaways that can be implemented immediately. Get ready for a session that goes beyond the theory and delivers tangible answers to the challenges CISOs face today.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amThe Future of AI Governance: Navigating Uncertainty and InnovationCEO, SchellmanRegistration Level:Conference Pass
10:15 am - 11:00 amAs AI is transforming industries, regulations are concurrently reshaping how organizations approach governance and compliance. With the recent repeal of former President Biden’s AI executive order under the new administration, the future of AI regulation remains uncertain. In this session, Schellman’s Avani Desai explores the impact of shifting policies, the role of industry-led governance frameworks like ISO 42001, and best practices for ensuring responsible AI development. Attendees will gain actionable insights into balancing innovation with ethical considerations and regulatory compliance in an unpredictable policy landscape.
10:15 amAdvisory Council Roundtable Discussion (VIP / Invite only)Securing the Modern Factory: Eliminating Cyber Threats with Zero Trust ArchitectureSr. Director of OT, Zscaler10:15 amCyber Resilience by Design: Learning from Hurricanes to Prepare for DisruptionDirector of Cybersecurity, Kemper Development CompanyRegistration Level:Open Sessions
10:15 am - 11:00 amCyber threats are like hurricanes — inevitable, unpredictable, and often catastrophic. Just as we cannot control hurricanes, organizations cannot control cyber threats, but they can prepare. Cyber resilience isn’t just about recovery; it’s about the entire lifecycle of managing cyber risks, from prevention and detection to response and recovery. This talk will cover the fundamentals of cyber resilience, how to prioritize efforts and key strategies for reinforcing critical security measures.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amBridging the Gap: Assigning Monetary Value to Cyber Risk by Establishing an Effective Risk Management FrameworkHead of Information Security, Governance, Risk & Compliance, Spirit AirlinesRegistration Level:Conference Pass
11:10 am - 11:55 amAs cyber threats continue to evolve, organizations must not only assess risk but also quantify its financial impact. With regulators, shareholders, and boards demanding clearer risk reporting, cybersecurity professionals need to bridge the gap between technical security expertise and effective risk management.
This session will provide a step-by-step approach to building a comprehensive cyber risk management framework—from calculating and assessing risk to presenting it in a way that resonates with executives, regulators, and stakeholders. Attendees will learn how to assign a monetary value to cyber risk, align with regulatory expectations (including DHS mandates for board-level security oversight), and create risk assessments that drive informed business decisions. Whether you’re a security practitioner or an executive, this session will equip you with the tools to elevate cyber risk discussions and turn risk management into a strategic advantage.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceChief Evangelist , CorelliumSenior Product Marketing Manager, AppOmniRegistration Level:Open Sessions
11:10 am - 11:55 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
11:10 amTransforming Application and Service Delivery for the Modern EnvironmentSales Engineering, IslandRegistration Level:Open Sessions
11:10 am - 11:55 amDelivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organization.
In this session, we will discuss:
How the Enterprise Browser revolutionizes workspaces by balancing productivity, security, availability, and user experience.
How quickly this new technology can be adopted to provide a competitive advantage
Strategies for reducing the effort required to deliver applications and enhance organizational operations.12:00 pm[Lunch Keynote] A Leadership Strategy for Navigating a CrisisRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession description to come.
12:15 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Building Business Resilience: Protecting Your Critical Identity InfrastructurePrincipal Technologist, North America, SemperisRegistration Level:VIP / Exclusive
12:15 pm - 1:00 pmThis interactive session will focus on methods for protecting hybrid Active Directory (AD) environments and the challenges organizations face in maintaining the integrity of their identity infrastructures.
Many organizations depend on AD and Entra ID (formerly known as Azure AD) to ensure their Zero Trust strategies. If AD goes down, nearly every other system and resource in the data center is at risk. This session will expose the vulnerabilities associated with AD and Entra ID, highlight the difficulties of recovering these services to a trustworthy state after a cyberattack, and encourage participants to reflect on – and share – their own infrastructure’s resilience.
Join this engaging discussion and contribute your insights and practical strategies for CISOs like you who want to enhance their organization’s resilience.
Sponsored by:
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmThe Emperor's New Cybersecurity Tool: Cybersecurity Leadership in the Age of IllusionIT Security Administrator, Broward County Government; Co-Founder & Researcher, CyberMINDS Research InstituteCo-Founder CyberMINDS Research Institute/ Chair, Data Privacy Policy Committee / Institutional Review BoardRegistration Level:Conference Pass
1:15 pm - 2:00 pmThis presentation uses “The Emperor’s New Clothes” as an analogy for cybersecurity leadership challenges. It explores vanity, fear, and groupthink, which can lead to blind trust in “magic” solutions. Real-world incidents illustrate these issues are far-reaching and complex to manage. What kind of leader are you? Do you believe your tools or AI are the end-all solution? Are you blind to the truths of cybersecurity? This presentation makes complex cybersecurity challenges accessible, engaging, and practical, equipping leaders with actionable insights to avoid the emperor’s fate.
1:15 pmBeyond Vulnerabilities: The Evolution of Offensive Security and Proactive DefenseSr. Director, Readiness and Proactive Security Team, VerizonRegistration Level:Conference Pass
1:15 pm - 2:00 pmOffensive security has evolved far beyond traditional vulnerability scanning and penetration testing. As adversaries refine their tactics, organizations must shift from reactive security measures to a proactive approach focused on exposure management, attack surface prioritization, and attack path analysis.
In this session, Jorge Orchilles—who has led Verizon’s offensive security initiatives—will explore the transition from ethical hacking and red teaming to modern proactive security strategies. Attendees will gain insights into how organizations can enhance their security posture by integrating Attack Surface Management (ASM), identity security, cloud protection, and operational technology (OT/IoT) considerations. The discussion will focus on measuring risk beyond CVSS scores, leveraging likelihood and impact metrics, and strengthening collaboration between offensive and defensive teams.
Join us to discover how offensive security is shifting toward a readiness-driven model, where proactive threat mitigation and adversary-informed defense become the new standard.
1:15 pm[Panel] The Sorcerer's Apprentice: Taming AI in CybersecuritySenior Director, Business Security Office, NetskopeSr. Solutions Engineer , SnykGlobal CISO & Member of the Cyberhaven CISO Advisory BoardRegistration Level:Open Sessions
1:15 pm - 2:00 pmAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
2:00 pmNetworking BreakRegistration Level:Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pm[Panel] Breaking Barriers: Women in Security Empowering the Next GenerationDirector, Information Security & Compliance, Carnival Cruise LineVP, Deputy Information Security Officer, Banesco USAVP, Cybersecurity, BlackstoneRegistration Level:Conference Pass
2:10 pm - 2:55 pmJoin us for an engaging and interactive panel discussion spotlighting the achievements, challenges, and unique perspectives of women in cybersecurity. Featuring a diverse group of panelists ranging from C-suite executives to rising stars, this session will explore the evolving role of women in the industry, strategies for career advancement, and the importance of mentorship in breaking barriers.
Designed to foster connection and collaboration, the session includes time for audience Q&A and a networking opportunity to share experiences and insights. The conversation will transition into the 3:00 p.m. happy hour, providing an informal setting to build relationships and celebrate the growing community of women in security.
Whether you’re a seasoned professional, just starting out, or simply looking for inspiration, this session is for anyone who believes in the power of diversity and inclusion to drive the future of cybersecurity.
2:10 pmThe Cybersecurity Talent Gap: Myth or Misconception?VP, Cybersecurity (CISO) & IT Operations, Jet AviationRegistration Level:Conference Pass
2:10 pm - 2:55 pmThe cybersecurity industry is constantly sounding the alarm about a massive talent shortage, but what if the real issue isn’t a lack of talent—but where and how we’re looking for it? This session challenges the prevailing narrative of the cyber talent gap by examining hiring biases, over-reliance on certifications, and the untapped potential already within organizations. Instead of searching endlessly for the “perfect” candidate, companies need to rethink their approach to identifying, training, and developing cybersecurity talent. Join us as we explore how to bridge this so-called gap by unlocking the potential of the already-in-place workforce.
2:10 pmNavigating Third-Party Risk and Vendor ResilienceRegistration Level:Open Sessions
2:10 pm - 2:55 pmIn today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.
To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:Open Sessions
3:00 pm - 4:00 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] Ask a CISO: Navigating Career Progression and Leadership in CybersecurityCISO, H.I.G CapitalRegistration Level:Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterAs the cybersecurity landscape evolves, so too do the careers of those who defend our digital environments. In this interactive closing keynote session, a panel of local Chief Information Security Officers (CISOs) will provide valuable insights into the critical journey from cybersecurity practitioner to strategic leader.
Attendees will have the unique opportunity to engage with these seasoned professionals, asking questions about career progression, succession planning, and how to successfully transition from technical roles to leadership positions. Whether you’re looking to move up the ranks, build your leadership skills, or understand what it takes to step into the CISO role, this session will offer practical advice, real-world experiences, and actionable strategies to guide your professional growth. Join us for a dynamic discussion that explores the intersection of technical expertise and leadership in today’s cybersecurity world.
- AppOmniBooth: 315
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- AxoniusBooth: 100
Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.
- BlackGirlsHackBooth: TBD
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- C1Booth: TBD
C1 is transforming the industry by creating connected experiences that make a lasting impact on customers, our teams and our communities. More than 10,000 customers use C1 every day to help them build meaningful connections through innovative and secure experiences. Our NPS of 80, placing us in the World Class category for the fourth consecutive year, is a testament to our ability to provide customers with the highest level of customer satisfaction, responsiveness, and deep domain expertise. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- CorelliumBooth: 235
Corellium is the world’s most powerful virtual hardware platform for Arm-powered devices. It has been adopted by federal, state, and local government agencies and service providers around the world.
Corellium provides government agencies and service providers with virtual Arm-based devices, such as the iPhone and Android mobile phones, for Vulnerability Research, Exploit Research, Mobile App Pentesting, Malware Analysis, Cyber Ranges, Digital Twins, Mobile forensics, and DevSecOps. These devices are truly virtualized, rather than emulated, in order to run firmware and applications natively.
Corellium can also create customized Arm-based devices to meet government requirements, such as SOHO routers and IoT devices.
Corellium runs on both an on-premise, air-gapped, environment as well as in a public or private cloud environment.
- CriblBooth: 115
Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.
Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.
- CyberhavenBooth: 240
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- Cyberminds Research InstituteBooth: TBD
CyberMinds Research Institute is a non-profit organization with an exceptionally talented staff of highly experienced Information Security, Cyber, and Privacy professional working with individuals and organizations to educate on cybersecurity best practices.
Our team is dedicated to enabling organizations to address their needs through strategic collaborations and cutting-edge research. Discover our innovative approach to information security and privacy protection.
- Cyversity South FloridaBooth: TBD
Cyversity South Florida is here! We are very much looking forward to engaging with you! We have lots of plans in-the-works, and hope you’ll join us in furthering our MISSION: “Achieving the consistent representation of women, underrepresented minorities, and all veterans in cybersecurity through programs designed to foster recruitment, inclusion and retention – one person at a time.”
- InfraGardBooth: TBD
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- ISACA South FloridaBooth: TBD
Our Chapter was chartered as the 33rd chapter of the Information Systems Audit and Control Association® (ISACA®) on December 2nd, 1978. The South Florida chapter includes approximately 1,400 members in the South Florida region, which spans a large geographic territory, including Miami, Fort Lauderdale, West Palm Beach, Naples, Fort Myers, and Port St. Lucie.
Mission Statement: “To help South Florida realize the positive potential of technology.”
Vision Statement: “We are a diverse group of innovative thought leaders partnering with the community to serve as the first choice for professional development and a global role model for ISACA Chapters by 2024.”
- ISC2 South Florida ChapterBooth: TBD
We are the South Florida chapter of ISC2, a local non-for-profit association for information security leaders and practitioners.
Our chapter’s program is founded on the exchange of ideas and knowledge and focused on the development of leadership and professional skills aimed at advancing the profession of information security practitioners.
We invite all information technology and security professionals in our community to join our local chapter and make a positive impact in your community.
- IslandBooth: 310
What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.
- National Cybersecurity AllianceBooth: TBD
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- NetskopeBooth: 320
The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.
- Orca SecurityBooth: 105
We’re on a mission to make it fast, easy, and cost effective for organizations to address the critical security issues in their AWS, Azure, and GCP estates so that they can operate in the cloud with confidence.
- Searchlight CyberBooth: 120
We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity.
Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research.
Today we help government and law enforcement, enterprises, and managed security services providers around the world to illuminate deep and dark web threats and prevent attacks.
- SemperisBooth: 360
Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.
- SilverfortBooth: TBD
Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.
- SIM South FloridaBooth: TBD
The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:
- Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
- Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
- Challenging our comfort levels by exchanging ideas with peers and business counterparts.
- Being a resource for each other, and personal networking.
- SoFloTechKidsBooth: TBD
At South Florida Tech Friends, our mission is to foster a vibrant community of technology professionals in the South Florida area. Through quarterly meet-ups, networking events, and knowledge-sharing sessions, we aim to facilitate meaningful connections, inspire collaboration, and advance the collective expertise of our members.
Our goal is to create an inclusive space that promotes learning, innovation, and professional growth within the dynamic landscape of technology. Together, we strive to cultivate a supportive environment where individuals can exchange ideas, explore emerging trends, and contribute to the evolution of technology in our region.
- South Florida ISSA ChapterBooth: TBD
The South Florida chapter of the Information System Security Association (ISSA) stands as a cornerstone within the global ISSA community, celebrated for its prominence and esteemed reputation.
Since its inception in 1998, the South Florida ISSA has consistently organized Security Conferences every two years. These events have featured keynote speeches from illustrious figures such as Orson Swindle, former head of the FTC, alongside other notable experts from leading corporations and academic institutions.
With a dynamic involvement in the InfoSec realm, South Florida ISSA engages a diverse audience ranging from managers to technical specialists, addressing a wide spectrum of InfoSec subjects. This engagement extends through their monthly meetings and various specialized events.
A highlight of our calendar is the Hack the Flag Challenge, which takes place annually in September. This event is acclaimed throughout Florida as a top-tier collaborative learning opportunity within the industry.
Furthermore, South Florida ISSA takes pride in being the professional sanctuary for numerous ISSA Senior Members, including the distinguished ISSA Fellow William A. Cellich, underscoring its significant contribution to the community and the field at large.
- SnykBooth: 230
Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.
- TeamOne.SupportBooth: TBD
TeamOne.Support, founded in 2022, blends technological innovation with a commitment to U.S. veterans, offering IT and cybersecurity training aimed at empowering and providing them with sustainable career paths in the tech industry. This initiative, driven by a deep sense of social responsibility, has evolved into a full-service IT provider with a focus on high-security standards and flexible veteran employment.
TeamOne.Support’s story is rooted in a unique confluence of technological expertise and a deep sense of social responsibility towards U.S. veterans. It began in 2022 with a commitment to provide veterans with IT and cybersecurity skills as a way to address veteran suicides. This project expanded rapidly, evolving from training programs into a full-fledged IT service provider by late 2023. As the organization grew, it maintained its focus on empowering veterans in the tech industry, ensuring high security standards in their services and creating flexible, meaningful job opportunities for veterans, reflecting a successful merger of professional skill development and impactful social contribution.
- ThreatLockerBooth: 110
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- Women in CyberSecurity (WiCyS)Booth: TBD
Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.
- ZscalerBooth: 300
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Glen Sorensen, InstructorvCISO & Managing Director, Cyber Risk Opportunities LLC
Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.
Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.
- Avani DesaiCEO, Schellman
Avani Desai is the CEO of Schellman, the world’s largest niche cybersecurity assessment firm and the first ANAB-accredited ISO 42001 certification body. This accreditation positions Schellman to help organizations responsibly develop and deploy AI systems in line with the global AI governance standard. With expertise in information security and operations, Avani has led the firm in staying at the forefront of emerging technologies. She is committed to fostering trust and mitigating risks for clients, empowering them to navigate the complexities of AI with confidence while ensuring ethical and secure AI development.
- Yuri SoldatenkovDirector of Cybersecurity, Kemper Development Company
Yuri Soldatenkov is a relentlessly dedicated cybersecurity leader with 20+ years of front-line experience driving enterprise security strategy, risk management, and infrastructure resilience. As Director of Cybersecurity at Kemper Development Company, he leads initiatives to strengthen security defenses and keep the organization ahead of evolving threats. Passionate about safeguarding both the business and its people, he has championed Zero Trust adoption, guided cloud security transformations, and elevated enterprise defenses across multiple industries, including technology, manufacturing, real estate, logistics, and construction. As a CISSP, CCSP, and holder of 3x GIAC certifications, he applies deep expertise in cybersecurity operations and network security to safeguard critical systems, defend against advanced threats, and ensure secure business operations.
- Roger AuingerHead of Information Security, Governance, Risk & Compliance, Spirit Airlines
Roger Auinger is a seasoned cybersecurity and risk management executive with extensive international experience in the financial services and aviation industries, currently leading GRC at a major airline. He has built and matured global cybersecurity frameworks, risk, and compliance programs. Previously, he advised financial institutions and private equity firms on cyber risk and served as a Chief Information Security and Chief Technology Risk Officer at a multinational bank, engaging with regulators on cybersecurity, risk, and compliance matters. With leadership roles in global financial institutions and consulting firms, Roger specializes in cyber risk, regulatory compliance, third-party risk management, and enterprise-wide security strategy, fostering resilient cyber security and risk cultures in complex organizations.
- Brian RobisonChief Evangelist , Corellium
Brian boasts over 25 years of cybersecurity expertise, blending marketing acumen with captivating speaking prowess. As Chief Evangelist & VP Product Marketing at Corellium, he leads evangelism, thought leadership, and product marketing. Formerly, as VP Solutions Strategy at BlackBerry/Cylance, Brian hosted dynamic Hacking Exposed events, unveiling real-world threat actor techniques. A sought-after speaker at RSA, Black Hat, and ISC2 Think Tank, Brian previously defended against mobile threats at Citrix XenMobile and Good Technology. At McAfee, he spearheaded ePolicy Orchestrator, endpoint security and vulnerability management.
- Brittany BodaneSenior Product Marketing Manager, AppOmni
Brittany Bodane is a Senior Product Marketer at AppOmni, where she works closely with security leaders, customers, and partners to better understand and communicate evolving SaaS security challenges. She translates these insights into strategies and education that help organizations secure their SaaS environments. Passionate about learning from security experts, she shares that knowledge to help protect user data and strengthen SaaS security practices.
- Matt PourSales Engineering, Island
Matt Pour leads Island's North America Sales Engineers. Matt brings decades of Information Technology and Information Security experience from establishing ITIL practices and InfoSec programs in Fortune 500 companies to engineering/architecting InfoSec business challenges for customers of some of the world's leading technology and cybersecurity companies. Matt was previously a Field CTO at Broadcom and help technical leadership roles at Symantec, Blue Coat and IBM.
- Sean Deuby, ModeratorPrincipal Technologist, North America, Semperis
Sean Deuby brings more than 30 years’ experience in enterprise IT and hybrid identity security to his role as Semperis' Principal Technologist, North America. An original architect and technical leader of Intel's Active Directory and a 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception. His experience as an identity strategy consultant for many Fortune 500 companies and an industry journalism veteran give him a broad perspective on the challenges of today's identity-centered security.
- Dr. Natalie JohnsonIT Security Administrator, Broward County Government; Co-Founder & Researcher, CyberMINDS Research Institute
Dr. Johnson is a dedicated technology professional with 15+ years in compliance, security, and governance with a track record of success in security and strategic planning. Dr. Johnson’s research on the underrepresentation of Women of Color in InfoSec showcases her dedication to fostering inclusivity in the field. She has advanced degrees in Business Administration, InfoSec, and Cybersecurity complemented by several industry-sought certifications; her academic and professional journey underscores her commitment to privacy, infosec, and cybersecurity initiatives. Dr. Johnson is a co-founder of the CyberMINDS Research Institute and leader in the South Florida Chapter of Cyversity.
- Dr. Alexis Perdereaux-Weekes (Dr. Privacy)Co-Founder CyberMINDS Research Institute/ Chair, Data Privacy Policy Committee / Institutional Review Board
Dr. Perdereaux-Weekes (Dr Privacy), a renowned Data Privacy expert, champions individuals' rights to own, control, and manage their personal information. With over 25 years of profound expertise, he is a leading Global figure in Data Privacy Regulation, Cybersecurity, Risk Management, and Compliance. His advocacy underscores the ethical handling of information and protecting personal data in an increasingly digital era. His research delves into Global Data Privacy Regulation, Biometrics, Consumer Data Protection, and Policy Compliance, focusing on GDPR, CCPA, LGPD, and HIPAA. Dr. Perdereaux-Weekes holds advanced degrees in Information Security, International Business, Privacy, and Cybersecurity Law, alongside sought-after industry certifications, affirming his dedication to mastering privacy and cybersecurity endeavors.
- Jorge OrchillesSr. Director, Readiness and Proactive Security Team, Verizon
Jorge Orchilles is a leader in Cyber Security and currently a Senior Director at Verizon running the Readiness and Proactive Security Team (Enterprise Vulnerability Assessment, Penetration Testing, Red Team, Dedicated Purple Team, and the AI Red Team). He is the author of the Purple Team Exercise Framework and creator of the C2 Matrix project. Prior to Verizon, he was the CTO at SCYTHE for 3 years, and led the offensive security team at Citi for over 10 years. Jorge is a SANS Principal Instructor, Purple Team Ambassador, and the author of SEC565: Red Team Operations and Adversary Emulation.
Jorge contributes to a number of projects including MITRE ATT&CK, Atomic Red Team, and CVSSv3.1 He is the author of Microsoft Windows 7 Administrator’s Reference.
Jorge holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science. He holds multiple certifications from GIAC, ISC2, and ISACA.
Jorge is a Fellow at the Information Systems Security Association (ISSA) and National Security Institute. - Damian ChungSenior Director, Business Security Office, Netskope
Damian Chung is a cybersecurity leader with over ten years of security experience focused in healthcare. As the Business Information Security Officer at Netskope, Damian is responsible for overseeing corporate security tools and processes and acts as the subject matter expert in the healthcare vertical. He also serves as an adjunct professor for the cybersecurity program at the University of Advancing Technologies in Tempe, AZ.
- Ryan FrazierSr. Solutions Engineer , Snyk
Ryan Frazier is a Senior Solutions Engineer at Snyk, helping businesses build safer software. As a bridge between technology and people, Ryan works closely with developers, security teams, and executives to understand their needs and find the best ways to protect their applications from security threats and improve their security posture. Prior to Snyk, Ryan worked as a software developer with firsthand knowledge of the pain points that developers face in the current state of application security.
- Troy WilkinsonGlobal CISO & Member of the Cyberhaven CISO Advisory Board
Troy Wilkinson began his career serving others as a Law Enforcement officer. He commanded a Joint Terrorism Task Force, was a lead bomb investigator, and violent crime and homicide detective. However, one of his greatest achievements came from his ability and skill investigating and prosecuting child exploitation and other electronic crimes. Wilkinson was recruited by the U.S. State Department to train police officers in Kosovo on cyber investigations. He was seconded to the United Nations and European Union to lead investigations into political corruption, organized crime, war crimes, financial crimes and terrorism. Together with a team of international investigators, Wilkinson built the first IT forensics lab in the European Union Mission in Kosovo.
Wilkinson is the former Global Chief Information Security Officer with Interpublic Group (IPG), a Fortune 500 company. Prior to IPG, Wilkinson served as the CISO for International Cruise & Excursions. He is also the co-founder of Tego Cyber Inc, a threat intelligence and threat detection company, and serves on the Board of Directors.
Wilkinson is a worldwide speaker on cybersecurity, co-authored an Amazon Best Seller, and serves as an advisor/consultant with several VC firms and cybersecurity startups. He contributes to national syndicated publications and participates in numerous conference panels on cybersecurity topics and careers.
- Michelle GarciaDirector, Information Security & Compliance, Carnival Cruise Line
Michelle is recognized as a leader in the fields of IT and OT Cyber Security with an extensive foundation of knowledge in ecommerce, security operations, technology globalization, and pioneering where cybersecurity and vessel safety converge. In Michelle's 30-year career, she has extensive experience leading diverse teams across multiple technologies and platforms. She also teaches cybersecurity, spreading her excitement for this field.
Michelle has deep knowledge in the areas of SOX and PCI-DSS compliance, as well as international regulations specific to IMO and SOLAS. Her security expertise includes security management, attack surface management, application security, incident response, vulnerability management, and project management. She is a master at building and leading high-performance teams.
Michelle holds a bachelor’s degree in Business Management with a concentration in Marketing and a master’s degree in Cyber Security Management and Policy, as well as multiple professional certifications.
- Gisela NovoaVP, Deputy Information Security Officer, Banesco USA
- Lena Licata, ModeratorVP, Cybersecurity, Blackstone
- Brandon PritzVP, Cybersecurity (CISO) & IT Operations, Jet Aviation
Brandon Pritz is a forward-thinking cybersecurity leader serving as Vice President of Cybersecurity (CISO) and IT Operations at Jet Aviation in West Palm Beach, Florida. In this role, he’s revolutionized the security department, driving efficiency, and transforming it into a streamlined powerhouse that slashes breach risks while aligning with organizational goals. With over a decade of experience, Brandon excels at bridging cybersecurity with business needs, partnering closely with lines of business to position security as a strategic enabler rather than a pain point. His knack for offensive security and mentorship has fueled robust, business-friendly security programs that protect and empower, all while shaping the next wave of IT talent. His career spans roles like Senior Director of Cybersecurity at Jet Aviation, IT Security Manager at Wade Trim, and Penetration Tester at CDW & CBI, where he conducted pivotal security assessments for diverse clients. A U.S. Air Force veteran, he honed his technical skills managing a $36 million network as a Cyber Transport Technician.
Brandon’s expertise in risk assessment, security audits, and penetration testing ensures complex protocols enhance rather than hinder business operations. Outside his CISO responsibilities, he actively mentors aspiring cybersecurity professionals. Eager to collaborate, Brandon welcomes opportunities to fortify strategies that make security a business ally.
- Happy Hour
- Marcos MarreroCISO, H.I.G Capital
- Panel Discussion

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
