googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, April 16, 2025
    9:00 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Fins Left

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Location / Room: Fins Right

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, April 17, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk / Lobby

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    The Challenges of the CISO: Leadership, Strategy, and Team Management in a High-Stakes World
    speaker photo
    VP, Business Intelligence Architecture, Eastern Bank
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am
    Location / Room: Fins Right

    The role of the CISO has never been more complex—balancing security strategy, executive expectations, and operational realities while managing a team in a high-pressure environment. In this invite-only roundtable discussion, security leaders will engage in candid conversations about the most pressing challenges CISOs face today, including:

    • Effectively managing and developing a security team
    • Building leadership skills to influence at the executive level
    • Navigating burnout, talent retention, and organizational constraints
    • Striking the right balance between security priorities and business objectives

    This peer-driven session provides a confidential forum for sharing insights, lessons learned, and strategies that can help today’s CISOs thrive in their roles. Join us for a collaborative discussion on overcoming obstacles and leading with impact in the ever-evolving cybersecurity landscape.

    8:00 am
    Cyber Resilience by Design: Learning from Hurricanes to Prepare for Disruption
    • session level icon
    speaker photo
    Director of Cybersecurity, Kemper Development Company
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Continental Drifter

    Cyber threats are like hurricanes — inevitable, unpredictable, and often catastrophic. Just as we cannot control hurricanes, organizations cannot control cyber threats, but they can prepare. Cyber resilience isn’t just about recovery; it’s about the entire lifecycle of managing cyber risks, from prevention and detection to response and recovery. This talk will cover the fundamentals of cyber resilience, how to prioritize efforts and key strategies for reinforcing critical security measures.

    8:00 am
    InfraGard South Florida Chapter Meeting (Open to all attendees)
    • session level icon
    Cybersecurity Meets AI: Navigating Human-in-the-Loop Challenges in a Digital Era
    speaker photo
    Chief Technology & Innovation Strategist, Lenovo
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Location / Room: Fins Left

    Discover how AI is revolutionizing cybersecurity. This insightful session will examine the complexities of integrating human-in-the-loop mechanisms to enhance security protocols and mitigate threats. This presentation will cover key moments in cybersecurity education, the impact of external factors on cognitive abilities, and the implications of AI in both offensive and defensive tactics. Gain valuable insights into the future of cybersecurity and the essential role humans play in this evolving field.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Once Upon a Time in Cybersecurity: Tales from the CISO's Chair
    • session level icon
    speaker photo
    Global CISO, Carnival Corporation
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Every security leader has a story—and some chapters are more dangerous than others. From navigating high-stakes boardroom conversations to managing crisis response in real time, Margarita Rivera, Global CISO at Carnival Corporation, shares defining moments from her cybersecurity leadership journey.

    In this keynote, Margarita blends the art of storytelling with the hard-earned truths of executive leadership in a high-pressure, high-stakes landscape. Through real-world tales of resilience, influence, and innovation, she explores how CISOs can lead through chaos, align with business strategy, and build cultures that don’t just survive—but evolve.

    This session goes beyond technical solutions—offering a candid, behind-the-scenes look at what it truly takes to lead with clarity, confidence, and purpose. Attendees will gain actionable insights into stakeholder communication, team development, strategic risk management, and how to thrive in the face of constant uncertainty.

    Does this fairytale have a happy ending? That depends on the choices we make next. Join us for a keynote that’s part leadership playbook, part cautionary tale—and entirely real.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Bridging the Gap: Assigning Monetary Value to Cyber Risk by Establishing an Effective Risk Management Framework
    • session level icon
    speaker photo
    Head of Information Security, Governance, Risk & Compliance, Spirit Airlines
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am
    Location / Room: Fins Left

    As cyber threats continue to evolve, organizations must not only assess risk but also quantify its financial impact. With regulators, shareholders, and boards demanding clearer risk reporting, cybersecurity professionals need to bridge the gap between technical security expertise and effective risk management.

    This session will provide a step-by-step approach to building a comprehensive cyber risk management framework—from calculating and assessing risk to presenting it in a way that resonates with executives, regulators, and stakeholders. Attendees will learn how to assign a monetary value to cyber risk, align with regulatory expectations (including DHS mandates for board-level security oversight), and create risk assessments that drive informed business decisions. Whether you’re a security practitioner or an executive, this session will equip you with the tools to elevate cyber risk discussions and turn risk management into a strategic advantage.

    10:15 am
    Advisory Council Roundtable Discussion (VIP / Invite only)
    • session level icon
    Securing the Modern Factory: Eliminating Cyber Threats with Zero Trust Architecture
    speaker photo
    Sr. Director of OT, Zscaler
    Registration Level:
    • session level iconVIP / Exclusive
    10:15 am - 11:00 am
    Location / Room: Fins Right

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Generously sponsored by:

    10:15 am
    Optimizing Application and Service Delivery to Thwart Today's Threats
    • session level icon
    speaker photo
    Director, Sales Engineering, Island
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am
    Location / Room: Continental Drifter

    Delivering business-critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. The unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but the trade-offs can make certain use cases unfeasible or diminish their value to the organization.

    In this session, we explore real-world case studies that show:

    • How a browser can revolutionize workspaces by balancing productivity, security, availability, and user experience.
    • How new technology can be adopted to provide a competitive advantage.
    • How to implement strategies for reducing the effort required to deliver applications and enhance organizational operations.
    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    The Cybersecurity Talent Gap: Myth or Misconception?
    • session level icon
    speaker photo
    VP, Cybersecurity (CISO) & IT Operations, Jet Aviation
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am
    Location / Room: Fins Left

    The cybersecurity industry is constantly sounding the alarm about a massive talent shortage, but what if the real issue isn’t a lack of talent—but where and how we’re looking for it? This session challenges the prevailing narrative of the cyber talent gap by examining hiring biases, over-reliance on certifications, and the untapped potential already within organizations. Instead of searching endlessly for the “perfect” candidate, companies need to rethink their approach to identifying, training, and developing cybersecurity talent. Join us as we explore how to bridge this so-called gap by unlocking the potential of the already-in-place workforce.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Senior Product Marketing Manager, AppOmni
    speaker photo
    Director, Field & Product Strategy, Silverfort
    speaker photo
    Chief Evangelist, Corellium
    speaker photo
    CISO, Coinroutes
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Hemisphere Dancer

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    11:10 am
    Rethinking Security for the Modern Enterprise: A Strategic Lens for Enterprise Security Professionals
    • session level icon
    speaker photo
    Sr. Solutions Architect, C1
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am
    Location / Room: Continental Drifter

    As digital transformation accelerates, the traditional boundaries between infrastructure and security are fading. Today’s security professionals are responsible for safeguarding the enterprise while enabling agility, innovation, and operational resilience. This thought leadership session reframes security as a strategic enabler—anchored in the core principles of prevention, detection, and recovery.

    We’ll explore how the convergence of infrastructure and security is creating new opportunities for alignment, efficiency, and visibility—helping technology leaders break down silos and respond to threats with greater speed and precision.

    Equally important is the shift toward security as a managed service. With escalating compliance complexity, rapid technology cycles, and increasing resource constraints, security professionals must evaluate new delivery models that can scale with their organization’s needs.

    Attendees will walk away with a clear picture of what a modern security program looks like: integrated, cloud-ready, agile, and built to adapt. Through strategic insights and practical takeaways, this session will empower technology leaders to build resilient programs that protect the business while driving it forward.

    12:00 pm
    [Lunch Keynote] Leading for the Long Run: Career Growth Through Resilience and Strategy
    • session level icon
    speaker photo
    Group VP, Global Head of Cybersecurity, Techtronic Industries
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    In cybersecurity and leadership alike, success isn’t measured by how fast you start—it’s about how well you last. In this engaging and highly relatable keynote, Eduardo Ortiz-Romeu shares his journey training for his first half marathon and how the lessons learned from long-distance running translate into sustainable career growth and leadership effectiveness.

    Through powerful analogies and personal stories, this session explores what it takes to build a career that can go the distance. Attendees will reflect on their own pacing, learn to navigate setbacks with resilience, and understand how to lead teams made up of runners at every speed. Whether you’re a sprinter burning out or a steady marathoner eyeing the next hill, you’ll walk away with actionable strategies to sustain your leadership journey.

    Key themes include:

    • Building resilience through adversity and recovery
    • Adapting your leadership style to match your team’s pace
    • Avoiding common pitfalls like burnout and stagnation
    • Leveraging strategy, skill development, and communication to grow your influence
    • Designing a long-term, intentional career route—on your terms

    This session blends storytelling, practical guidance, and an honest look at the long game of leadership in cybersecurity. It’s not about the finish line—it’s about becoming the kind of leader who can go the distance.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Building Business Resilience: Protecting Your Critical Identity Infrastructure
    speaker photo
    Principal Technologist, North America, Semperis
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: Fins Right

    This interactive session will focus on methods for protecting hybrid Active Directory (AD) environments and the challenges organizations face in maintaining the integrity of their identity infrastructures.

    Many organizations depend on AD and Entra ID (formerly known as Azure AD) to ensure their Zero Trust strategies. If AD goes down, nearly every other system and resource in the data center is at risk. This session will expose the vulnerabilities associated with AD and Entra ID, highlight the difficulties of recovering these services to a trustworthy state after a cyberattack, and encourage participants to reflect on – and share – their own infrastructure’s resilience.

    Join this engaging discussion and contribute your insights and practical strategies for CISOs like you who want to enhance their organization’s resilience.

    Sponsored by:

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    The Emperor's New Cybersecurity Tool: Cybersecurity Leadership in the Age of Illusion
    • session level icon
    speaker photo
    IT Security Administrator, Broward County Government; Co-Founder & Researcher, CyberMINDS Research Institute
    speaker photo
    Co-Founder, CyberMINDS Research Institute; Chair, Data Privacy Policy Committee
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm
    Location / Room: Fins Left

    This presentation uses “The Emperor’s New Clothes” as an analogy for cybersecurity leadership challenges. It explores vanity, fear, and groupthink, which can lead to blind trust in “magic” solutions. Real-world incidents illustrate these issues are far-reaching and complex to manage. What kind of leader are you? Do you believe your tools or AI are the end-all solution? Are you blind to the truths of cybersecurity? This presentation makes complex cybersecurity challenges accessible, engaging, and practical, equipping leaders with actionable insights to avoid the emperor’s fate.

    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    VP, Cyber Defense, Netskope
    speaker photo
    Sr. Solutions Engineer, Snyk
    speaker photo
    Global CISO & Member of the Cyberhaven CISO Advisory Board
    speaker photo
    EVP, Global Technology, Jazwares, LLC
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Hemisphere Dancer

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    1:15 pm
    Building Cyber Resilient Enterprises: Best Practices for Protecting SaaS Data
    • session level icon
    speaker photo
    Field CTO, SaaS, Rubrik
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
    Location / Room: Continental Drifter

    As organizations increasingly adopt SaaS applications, the risk associated with data breaches, accidental deletions, and ransomware attacks has grown. This session will provide a deep dive into establishing a comprehensive cyber resilience strategy for your SaaS environment. Learn about the crucial steps to safeguard your data, from leveraging advanced backup solutions to ensuring rapid and reliable recovery methods that reduce downtime and data loss effectively.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    The Future of AI Governance: Navigating Uncertainty and Innovation
    • session level icon
    speaker photo
    CEO, Schellman
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Fins Left

    As AI is transforming industries, regulations are concurrently reshaping how organizations approach governance and compliance. With the recent repeal of former President Biden’s AI executive order under the new administration, the future of AI regulation remains uncertain. In this session, Schellman’s Avani Desai explores the impact of shifting policies, the role of industry-led governance frameworks like ISO 42001, and best practices for ensuring responsible AI development. Attendees will gain actionable insights into balancing innovation with ethical considerations and regulatory compliance in an unpredictable policy landscape.

    2:10 pm
    Beyond Vulnerabilities: The Evolution of Offensive Security and Proactive Defense
    • session level icon
    speaker photo
    Sr. Director, Readiness and Proactive Security Team, Verizon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm
    Location / Room: Continental Drifter

    Offensive security has evolved far beyond traditional vulnerability scanning and penetration testing. As adversaries refine their tactics, organizations must shift from reactive security measures to a proactive approach focused on exposure management, attack surface prioritization, and attack path analysis.

    In this session, Jorge Orchilles—who has led Verizon’s offensive security initiatives—will explore the transition from ethical hacking and red teaming to modern proactive security strategies. Attendees will gain insights into how organizations can enhance their security posture by integrating Attack Surface Management (ASM), identity security, cloud protection, and operational technology (OT/IoT) considerations. The discussion will focus on measuring risk beyond CVSS scores, leveraging likelihood and impact metrics, and strengthening collaboration between offensive and defensive teams.

    Join us to discover how offensive security is shifting toward a readiness-driven model, where proactive threat mitigation and adversary-informed defense become the new standard.

    2:10 pm
    [Panel] Breaking Barriers: Women in Security Empowering the Next Generation
    • session level icon
    speaker photo
    Director, Information Security & Compliance, Carnival Cruise Line
    speaker photo
    Former VP, Deputy Information Security Officer, Banesco USA
    speaker photo
    VP, Cybersecurity, Blackstone
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm
    Location / Room: Hemisphere Dancer

    Join us for an engaging and interactive panel discussion spotlighting the achievements, challenges, and unique perspectives of women in cybersecurity. Featuring a diverse group of panelists ranging from C-suite executives to rising stars, this session will explore the evolving role of women in the industry, strategies for career advancement, and the importance of mentorship in breaking barriers.

    Designed to foster connection and collaboration, the session includes time for audience Q&A and a networking opportunity to share experiences and insights. The conversation will transition into the 3:00 p.m. happy hour, providing an informal setting to build relationships and celebrate the growing community of women in security.

    Whether you’re a seasoned professional, just starting out, or simply looking for inspiration, this session is for anyone who believes in the power of diversity and inclusion to drive the future of cybersecurity.

    2:55 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:55 pm - 3:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:15 pm
    [Closing Keynote] Ask a CISO: Navigating Career Progression and Leadership in Cybersecurity
    • session level icon
    speaker photo
    CISO, JM Family Enterprises
    speaker photo
    CISO, H.I.G Capital
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    As the cybersecurity landscape evolves, so too do the careers of those who defend our digital environments. In this interactive closing keynote session, a panel of local Chief Information Security Officers (CISOs) will provide valuable insights into the critical journey from cybersecurity practitioner to strategic leader.

    Attendees will have the unique opportunity to engage with these seasoned professionals, asking questions about career progression, succession planning, and how to successfully transition from technical roles to leadership positions. Whether you’re looking to move up the ranks, build your leadership skills, or understand what it takes to step into the CISO role, this session will offer practical advice, real-world experiences, and actionable strategies to guide your professional growth. Join us for a dynamic discussion that explores the intersection of technical expertise and leadership in today’s cybersecurity world.

    4:00 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 5:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • Allure Security
    Booth: 325

    Allure Security is the only Preemptive Scam Defense solution that proactively protects brands by shutting down online brand scams before they strike and damage customers.

    Our AI-powered detection rapidly uncovers scams as they are being set up, while our expert-led Managed Defense team immediately eliminates them. Using patented decoy injection technology, we go beyond removing scams; we disrupt fraudsters’ business economics to prevent future attacks.

    We analyze tens of millions of digital assets daily, identify online impersonators within minutes, and deploy our patented multi-level response, minimizing the impact on your business, your customers, and your brand.

  • AppOmni
    Booth: 315

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • Axonius
    Booth: 100

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • C1
    Booth: 200

    C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Corellium
    Booth: 235

    Corellium is the world’s most powerful virtual hardware platform for Arm-powered devices. It has been adopted by federal, state, and local government agencies and service providers around the world.

    Corellium provides government agencies and service providers with virtual Arm-based devices, such as the iPhone and Android mobile phones, for Vulnerability Research, Exploit Research, Mobile App Pentesting, Malware Analysis, Cyber Ranges, Digital Twins, Mobile forensics, and DevSecOps. These devices are truly virtualized, rather than emulated, in order to run firmware and applications natively.

    Corellium can also create customized Arm-based devices to meet government requirements, such as SOHO routers and IoT devices.

    Corellium runs on both an on-premise, air-gapped, environment as well as in a public or private cloud environment.

  • Cribl
    Booth: 115

    Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.

    Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.

  • Cyberhaven
    Booth: 240

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Cyberminds Research Institute
    Booth: 340

    CyberMinds Research Institute is a non-profit organization with an exceptionally talented staff of highly experienced Information Security, Cyber, and Privacy professional working with individuals and organizations to educate on cybersecurity best practices.

    Our team is dedicated to enabling organizations to address their needs through strategic collaborations and cutting-edge research. Discover our innovative approach to information security and privacy protection.

  • Cyera
    Booth: 210

    Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.

  • Cyversity South Florida
    Booth: 430

    Cyversity South Florida is here! We are very much looking forward to engaging with you! We have lots of plans in-the-works, and hope you’ll join us in furthering our MISSION: “Achieving the consistent representation of women, underrepresented minorities, and all veterans in cybersecurity through programs designed to foster recruitment, inclusion and retention – one person at a time.”

  • InfraGard South Florida Members Alliance
    Booth: 350

    The mission of the InfraGard South Florida Members Alliance is to assist in protecting our region’s critical infrastructure from threats and attack, either physical or cyber. This mission is accomplished through the following:

    • Secure facilitation of information sharing
    • Collaboration with public/private industry professionals and government agencies at all levels (local, state, and federal)
    • Training and education of our membership, and community outreach
  • ISACA South Florida
    Booth: 345

    Our Chapter was chartered as the 33rd chapter of the Information Systems Audit and Control Association® (ISACA®) on December 2nd, 1978. The South Florida chapter includes approximately 1,400 members in the South Florida region, which spans a large geographic territory, including Miami, Fort Lauderdale, West Palm Beach, Naples, Fort Myers, and Port St. Lucie.

    Mission Statement: “To help South Florida realize the positive potential of technology.”

    Vision Statement: “We are a diverse group of innovative thought leaders partnering with the community to serve as the first choice for professional development and a global role model for ISACA Chapters by 2024.”

  • ISC2 South Florida Chapter
    Booth: 415

    We are the South Florida chapter of ISC2, a local non-for-profit association for information security leaders and practitioners.

    Our chapter’s program is founded on the exchange of ideas and knowledge and focused on the development of leadership and professional skills aimed at advancing the profession of information security practitioners.

    We invite all information technology and security professionals in our community to join our local chapter and make a positive impact in your community.

  • Island
    Booth: 310

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • Netskope
    Booth: 320

    The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

  • Orca Security
    Booth: 105

    We’re on a mission to make it fast, easy, and cost effective for organizations to address the critical security issues in their AWS, Azure, and GCP estates so that they can operate in the cloud with confidence.

  • Rubrik
    Booth: 400

    Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

  • Searchlight Cyber
    Booth: 120

    We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity.

    Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research.

    Today we help government and law enforcement, enterprises, and managed security services providers around the world to illuminate deep and dark web threats and prevent attacks.

  • Semperis
    Booth: 360

    Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.

  • Silverfort
    Booth: 405

    Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.

  • Snyk
    Booth: 230

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • SoFloTechKids
    Booth: 410

    At South Florida Tech Friends, our mission is to foster a vibrant community of technology professionals in the South Florida area. Through quarterly meet-ups, networking events, and knowledge-sharing sessions, we aim to facilitate meaningful connections, inspire collaboration, and advance the collective expertise of our members.

    Our goal is to create an inclusive space that promotes learning, innovation, and professional growth within the dynamic landscape of technology. Together, we strive to cultivate a supportive environment where individuals can exchange ideas, explore emerging trends, and contribute to the evolution of technology in our region.

  • South Florida ISSA Chapter
    Booth: 330

    The South Florida chapter of the Information System Security Association (ISSA) stands as a cornerstone within the global ISSA community, celebrated for its prominence and esteemed reputation.

    Since its inception in 1998, the South Florida ISSA has consistently organized Security Conferences every two years. These events have featured keynote speeches from illustrious figures such as Orson Swindle, former head of the FTC, alongside other notable experts from leading corporations and academic institutions.

    With a dynamic involvement in the InfoSec realm, South Florida ISSA engages a diverse audience ranging from managers to technical specialists, addressing a wide spectrum of InfoSec subjects. This engagement extends through their monthly meetings and various specialized events.

    A highlight of our calendar is the Hack the Flag Challenge, which takes place annually in September. This event is acclaimed throughout Florida as a top-tier collaborative learning opportunity within the industry.

    Furthermore, South Florida ISSA takes pride in being the professional sanctuary for numerous ISSA Senior Members, including the distinguished ISSA Fellow William A. Cellich, underscoring its significant contribution to the community and the field at large.

  • SpecterOps
    Booth: 215

    SpecterOps is a cybersecurity company that provides services and training solutions to help enterprises defend against attacks.

  • TeamOne.Support
    Booth: 355

    TeamOne.Support, founded in 2022, blends technological innovation with a commitment to U.S. veterans, offering IT and cybersecurity training aimed at empowering and providing them with sustainable career paths in the tech industry. This initiative, driven by a deep sense of social responsibility, has evolved into a full-service IT provider with a focus on high-security standards and flexible veteran employment.

    TeamOne.Support’s story is rooted in a unique confluence of technological expertise and a deep sense of social responsibility towards U.S. veterans. It began in 2022 with a commitment to provide veterans with IT and cybersecurity skills as a way to address veteran suicides. This project expanded rapidly, evolving from training programs into a full-fledged IT service provider by late 2023. As the organization grew, it maintained its focus on empowering veterans in the tech industry, ensuring high security standards in their services and creating flexible, meaningful job opportunities for veterans, reflecting a successful merger of professional skill development and impactful social contribution.

  • ThreatLocker
    Booth: 110

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Veza
    Booth: 225

    Veza is the authorization platform for data. Designed for hybrid, multi-cloud environments, Veza enables organizations to easily understand, manage and control who can and should take what action on what data. We empower customers to leverage the power of authorization for an identity-first approach to security, addressing critical business needs tied to managing access governance, data lake security, cloud entitlements, privileged access, and more. Global enterprises like Blackstone, ASAPP, Barracuda Networks, Choice Hotels, and a number of Fortune 500 and emerging organizations trust Veza to secure their enterprise data. Founded in 2020, Veza is headquartered in Los Gatos, California and is funded by Accel, Bain Capital, Ballistic Ventures, GV, Norwest Venture Partners, and True Ventures.

  • WiCyS Florida Affiliate
    Booth: 407
  • Zafran Security
    Booth: 205

    Zafran optimizes your existing security controls to automatically reveal and mitigate risk exposure beyond legacy patching.

  • Zscaler
    Booth: 300

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

  • BlackGirlsHack
    Booth: 335

    We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.

    The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.

    BlackGirlsHack is open to all!

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Eric Gonzalez, Moderator
    VP, Business Intelligence Architecture, Eastern Bank
  • speaker photo
    Yuri Soldatenkov
    Director of Cybersecurity, Kemper Development Company

    Yuri Soldatenkov is a relentlessly dedicated cybersecurity leader with 20+ years of front-line experience driving enterprise security strategy, risk management, and infrastructure resilience. As Director of Cybersecurity at Kemper Development Company, he leads initiatives to strengthen security defenses and keep the organization ahead of evolving threats. Passionate about safeguarding both the business and its people, he has championed Zero Trust adoption, guided cloud security transformations, and elevated enterprise defenses across multiple industries, including technology, manufacturing, real estate, logistics, and construction. As a CISSP, CCSP, and holder of 3x GIAC certifications, he applies deep expertise in cybersecurity operations and network security to safeguard critical systems, defend against advanced threats, and ensure secure business operations.

  • speaker photo
    Dr. Hernán Londoño
    Chief Technology & Innovation Strategist, Lenovo

    Dr. Hernán Londoño is Lenovo’s Chief Technology and Innovation Strategist, an accomplished IT leader with over two decades of experience driving innovation in cybersecurity, artificial intelligence, and digital transformation across the public sector. As a former CTO and CISO, he has led impactful technology strategies that strengthened institutional resilience and advanced academic missions.

    Dr. Londoño is a published author on AI and cybersecurity, with current research focused on the human impact of AI on cybersecurity risk. He has served as a trusted advisor to leading cybersecurity organizations, including Vectra, Cyphort, and SANS Securing the Human. His thought leadership extends to advisory roles on multiple university academic boards and with the National Applied AI Consortium.
    He holds a Ph.D. in Computer Science from Nova Southeastern University and a Post-Doctorate Certificate in Artificial Intelligence from Harvard University. Recognized with prestigious awards, including Dell Technologies’ Game Changer Award, Dr. Londoño is also a graduate of the FBI Citizens Academy, and an Advisory Board member of the InfraGard South Florida Chapter.

  • speaker photo
    Margarita Rivera
    Global CISO, Carnival Corporation

    As the Global Chief Information Security Officer of Carnival Corporation & plc, Margarita Rivera brings over 20 years of expertise in safeguarding digital ecosystems for Fortune 50 and Fortune 200 companies across diverse industries. Her leadership has been pivotal in implementing cutting-edge cybersecurity frameworks, fostering a culture of security, and ensuring adherence to international standards across the organization. In her role as Global CISO, Margarita oversees the enterprise-wide information security strategy, aligning it with Carnival’s mission and global operations.

    Collaborating closely with senior executives, Margarita supports top-line growth, drives operational efficiencies, and enables secure innovation within Carnival’s technology-driven environment. She is instrumental in mitigating risks, ensuring compliance, and enhancing cybersecurity capabilities across Carnival’s nine world-class cruise line brands.
    Guided by a servant leadership philosophy, Margarita empowers her teams and cultivates a culture of collaboration, transparency, and innovation. Her extensive expertise spans the design of advanced cybersecurity frameworks, management of complex incident response protocols, and the protection of critical operations, positioning her as a trusted leader in the cybersecurity field.

    Margarita holds a Master’s Degree in Information Systems from Harvard University and a Bachelor’s Degree in Business Administration from Florida International University. She is also certified as a C-CISO, CISSP, CISM, CRISC, CISA, and CIPT. A recognized thought leader, author, and speaker, Margarita has received numerous accolades, including the 2024 Authentic Leadership Award from the National Diversity Council. In her personal life, she enjoys hiking, kayaking, reading, and exploring culinary and cultural experiences.

  • speaker photo
    Roger Auinger
    Head of Information Security, Governance, Risk & Compliance, Spirit Airlines

    Roger Auinger is a seasoned cybersecurity and risk management executive with extensive international experience in the financial services and aviation industries, currently leading GRC at a major airline. He has built and matured global cybersecurity frameworks, risk, and compliance programs. Previously, he advised financial institutions and private equity firms on cyber risk and served as a Chief Information Security and Chief Technology Risk Officer at a multinational bank, engaging with regulators on cybersecurity, risk, and compliance matters. With leadership roles in global financial institutions and consulting firms, Roger specializes in cyber risk, regulatory compliance, third-party risk management, and enterprise-wide security strategy, fostering resilient cyber security and risk cultures in complex organizations.

  • speaker photo
    Deepak Patel
    Sr. Director of OT, Zscaler
  • speaker photo
    Matt Pour
    Director, Sales Engineering, Island

    Matt Pour leads Island's North America Sales Engineers. Matt brings decades of Information Technology and Information Security experience from establishing ITIL practices and InfoSec programs in Fortune 500 companies to engineering/architecting InfoSec business challenges for customers of some of the world's leading technology and cybersecurity companies. Matt was previously a Field CTO at Broadcom and help technical leadership roles at Symantec, Blue Coat and IBM.

  • speaker photo
    Brandon Pritz
    VP, Cybersecurity (CISO) & IT Operations, Jet Aviation

    Brandon Pritz is a forward-thinking cybersecurity leader serving as Vice President of Cybersecurity (CISO) and IT Operations at Jet Aviation in West Palm Beach, Florida. In this role, he’s revolutionized the security department, driving efficiency, and transforming it into a streamlined powerhouse that slashes breach risks while aligning with organizational goals. With over a decade of experience, Brandon excels at bridging cybersecurity with business needs, partnering closely with lines of business to position security as a strategic enabler rather than a pain point. His knack for offensive security and mentorship has fueled robust, business-friendly security programs that protect and empower, all while shaping the next wave of IT talent. His career spans roles like Senior Director of Cybersecurity at Jet Aviation, IT Security Manager at Wade Trim, and Penetration Tester at CDW & CBI, where he conducted pivotal security assessments for diverse clients. A U.S. Air Force veteran, he honed his technical skills managing a $36 million network as a Cyber Transport Technician.

    Brandon’s expertise in risk assessment, security audits, and penetration testing ensures complex protocols enhance rather than hinder business operations. Outside his CISO responsibilities, he actively mentors aspiring cybersecurity professionals. Eager to collaborate, Brandon welcomes opportunities to fortify strategies that make security a business ally.

  • speaker photo
    Brittany Bodane
    Senior Product Marketing Manager, AppOmni

    Brittany Bodane is a Senior Product Marketer at AppOmni, where she works closely with security leaders, customers, and partners to better understand and communicate evolving SaaS security challenges. She translates these insights into strategies and education that help organizations secure their SaaS environments. Passionate about learning from security experts, she shares that knowledge to help protect user data and strengthen SaaS security practices.

  • speaker photo
    Jonathan Davis
    Director, Field & Product Strategy, Silverfort

    Jonathan is the Director of Field and Product Strategy at Silverfort. He has spent the last 12 years in the identity space. Prior to Silverfort, he was with Onelogin, an SSO provider purchased by One Identity. The last seven years he has held several roles within Silverfort, from leading the go-to market initiatives to leading strategy around product and customers' needs around identity security.

  • speaker photo
    Brian Robison
    Chief Evangelist, Corellium

    Brian boasts more than 25 years of cybersecurity expertise, blending marketing acumen with captivating speaking prowess. As Chief Evangelist & VP of Product Marketing at Corellium, he leads evangelism, thought leadership, and product marketing. Formerly, as VP Solutions Strategy at BlackBerry/Cylance, Brian hosted dynamic Hacking Exposed events, unveiling real-world threat actor techniques. A sought-after speaker at RSA, Black Hat, and ISC2 Think Tank, Brian previously defended against mobile threats at Citrix XenMobile and Good Technology. At McAfee, he spearheaded ePolicy Orchestrator, endpoint security, and vulnerability management.

  • speaker photo
    RJ Friedman, Moderator
    CISO, Coinroutes

    RJ Friedman is currently the CISO of 6 organizations, including Coinroutes Inc. and A2Z Sync. He has also founded 3 MSSPs and SOCs, leading 24/7/365 security organizations in the fight against cyber scum.

  • speaker photo
    Brandon Olds
    Sr. Solutions Architect, C1

    Senior Solution Architect with over 20 years of experience in network administration and Cisco-based architecture. Certified in CMNA, CCNA, and CCNP, with a strong focus on network security and performance. Proven ability to design and implement innovative, client-focused IT solutions in diverse industries.

  • speaker photo
    Eduardo Ortiz
    Group VP, Global Head of Cybersecurity, Techtronic Industries

    A change leader, Eduardo Ortiz is considered one of the leading corporate authorities in building effective cybersecurity programs for global operations.

    He has spent his career guiding the design, build, evolution, and strength of Information Systems (IS) and Cybersecurity programs for global and domestic companies across diverse industries. Eduardo has fostered corporate transformations across multibillion-dollar operations by connecting Cybersecurity to brand reputation and revenue growth. He has cultivated and influenced the corporate adoption of a security-conscious mindset through awareness training, risk quantification, easy-to-embrace policies, and system support. He has successfully turned IT cost centers into profit centers.

    Protecting data, assets, and intellectual property, Eduardo’s tenacity and innovation in security systems strategy have benefitted operations and brand reputations across APAC, EMEA, Australia, and New Zealand, within myriad industries, including technology innovation, industrial, government agencies, manufacturing, and various private and public sector companies worldwide.

    A trusted advisor and solutions partner to the C-suite, executive boards, investors, private equity groups, and leaders across every function of an organization, Eduardo has been responsible for designing innovative security solutions and architecture development to protect data integrity, availability, and confidentiality across digital assets, products, people, and brand reputation.

    As Global Head of Cybersecurity for Techtronic Industries, Inc., a $13B global operation, Eduardo oversees a 28-member global team of direct-level IT engineers and analyst staff, and multiple CIOs representing divisions worldwide. Eduardo architected, deployed, and supervised the first full-scale global Managed Detection and Response program for Techtronic Industries. He helps companies prioritize risk to return with their IT and cybersecurity programs, and has played a vital role in reducing vulnerability, improving alignment between globally dispersed locations, and addressing global cybersecurity resiliency.

    In his previous role as CISO and Director of Information Security for one of the world’s leading providers of correctional detention services, Eduardo rebuilt the Cybersecurity and IS function for The GEO Group, evolving and aligning the company’s systems, governance, and overall operations implementation. While with GEO, Eduardo was also tapped to travel to Australia to turn around a stalled $800M facility construction project facing challenges with the Australian government on security certifications. His communication, leadership, and negotiation skills swiftly turned the project and certification around, enabling the facility to open early and within budget. Eduardo eventually served as CISO for the new facility.

    A committed corporate leader with a coaching mindset, Eduardo thrives on building high-performance, engaged, and accountable global teams that can swiftly deliver on aggressive goals. A frequently requested public speaker and a thought leadership guest on industry-related talk shows and podcasts, Eduardo holds an MS in Industrial Technology and a BS from Purdue University. He has earned multiple certifications, including QTE, CISM, and GSLC and is a valuable executive advisory board member on multiple corporate and nonprofit boards. Eduardo resides in South Florida with his wife and daughters.

  • speaker photo
    Sean Deuby, Moderator
    Principal Technologist, North America, Semperis

    Sean Deuby brings more than 30 years’ experience in enterprise IT and hybrid identity security to his role as Semperis' Principal Technologist, North America. An original architect and technical leader of Intel's Active Directory and a 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception. His experience as an identity strategy consultant for many Fortune 500 companies and an industry journalism veteran give him a broad perspective on the challenges of today's identity-centered security.

  • speaker photo
    Dr. Natalie Johnson
    IT Security Administrator, Broward County Government; Co-Founder & Researcher, CyberMINDS Research Institute

    Dr. Johnson is a dedicated technology professional with 15+ years in compliance, security, and governance with a track record of success in security and strategic planning. Dr. Johnson’s research on the underrepresentation of Women of Color in InfoSec showcases her dedication to fostering inclusivity in the field. She has advanced degrees in Business Administration, InfoSec, and Cybersecurity complemented by several industry-sought certifications; her academic and professional journey underscores her commitment to privacy, infosec, and cybersecurity initiatives. Dr. Johnson is a co-founder of the CyberMINDS Research Institute and leader in the South Florida Chapter of Cyversity.

  • speaker photo
    Dr. Alexis Perdereaux-Weekes (Dr. Privacy)
    Co-Founder, CyberMINDS Research Institute; Chair, Data Privacy Policy Committee

    Dr. Perdereaux-Weekes (Dr Privacy), a renowned Data Privacy expert, champions individuals' rights to own, control, and manage their personal information. With over 25 years of profound expertise, he is a leading Global figure in Data Privacy Regulation, Cybersecurity, Risk Management, and Compliance. His advocacy underscores the ethical handling of information and protecting personal data in an increasingly digital era. His research delves into Global Data Privacy Regulation, Biometrics, Consumer Data Protection, and Policy Compliance, focusing on GDPR, CCPA, LGPD, and HIPAA. Dr. Perdereaux-Weekes holds advanced degrees in Information Security, International Business, Privacy, and Cybersecurity Law, alongside sought-after industry certifications, affirming his dedication to mastering privacy and cybersecurity endeavors.

  • speaker photo
    Damian Chung
    VP, Cyber Defense, Netskope

    Damian Chung is a cybersecurity leader with over ten years of security experience focused in healthcare. As the Business Information Security Officer at Netskope, Damian is responsible for overseeing corporate security tools and processes and acts as the subject matter expert in the healthcare vertical. He also serves as an adjunct professor for the cybersecurity program at the University of Advancing Technologies in Tempe, AZ.

  • speaker photo
    Ryan Frazier
    Sr. Solutions Engineer, Snyk

    Ryan Frazier is a Senior Solutions Engineer at Snyk, helping businesses build safer software. As a bridge between technology and people, Ryan works closely with developers, security teams, and executives to understand their needs and find the best ways to protect their applications from security threats and improve their security posture. Prior to Snyk, Ryan worked as a software developer with firsthand knowledge of the pain points that developers face in the current state of application security.

  • speaker photo
    Troy Wilkinson
    Global CISO & Member of the Cyberhaven CISO Advisory Board

    Troy Wilkinson began his career serving others as a Law Enforcement officer. He commanded a Joint Terrorism Task Force, was a lead bomb investigator, and violent crime and homicide detective. However, one of his greatest achievements came from his ability and skill investigating and prosecuting child exploitation and other electronic crimes. Wilkinson was recruited by the U.S. State Department to train police officers in Kosovo on cyber investigations. He was seconded to the United Nations and European Union to lead investigations into political corruption, organized crime, war crimes, financial crimes and terrorism. Together with a team of international investigators, Wilkinson built the first IT forensics lab in the European Union Mission in Kosovo.

    Wilkinson is the former Global Chief Information Security Officer with Interpublic Group (IPG), a Fortune 500 company. Prior to IPG, Wilkinson served as the CISO for International Cruise & Excursions. He is also the co-founder of Tego Cyber Inc, a threat intelligence and threat detection company, and serves on the Board of Directors.

    Wilkinson is a worldwide speaker on cybersecurity, co-authored an Amazon Best Seller, and serves as an advisor/consultant with several VC firms and cybersecurity startups. He contributes to national syndicated publications and participates in numerous conference panels on cybersecurity topics and careers.

  • speaker photo
    Gatha Sadhir, Moderator
    EVP, Global Technology, Jazwares, LLC

    Dynamic Technology Executive recognized for orchestrating and fortifying enterprise-wide Information Technology and Security Programs. With a comprehensive understanding of emerging technology trends and cyber threats, Gatha is valued for strategic acumen in leading technology initiatives, managing cyber risks, ensuring regulatory compliance, and safeguarding valuable assets for multinational organizations, while driving innovation.

    As the head of Jazwares' (a Berkshire Hathaway company) Global Technology division, Gatha's mission is to drive pivotal digital transformation and foster innovation. Gatha's tenure as Global Chief Information Security Officer at Carnival Corporation honed her expertise in managing cyber risks and ensuring compliance across a vast operational landscape.

    Gatha not only leads but inspires a highly talented, passionate, and diverse workforce, cultivating a pervasive growth mindset, nurturing collaboration, and exemplifying authentic leadership. She is a people champion with values anchored on Trust, Empowerment, Enablement, and Challenge.

    With an illustrious career spanning over 25 years in Information Security and Technology, Gatha holds a CISO Executive Education and Certificate from Carnegie Mellon University, coupled with a Certificate of Management Excellence from Harvard Business School. Gatha is a sought-after speaker at industry events, and is consistently recognized as a thought leader and catalyst for innovation.

  • speaker photo
    Eddie Wlazlowski
    Field CTO, SaaS, Rubrik

    Eddie Wlazlowski has more than 15 years of experience partnering with large private and public organizations to help them adopt cloud technologies at an enterprise level. He was one of the first SaaS product line specialists hired at Rubrik and was instrumental in the exponential growth of that segment. Eddie has quickly risen the ranks within Rubrik and now serves as Field CTO for our SaaS business. Eddie loves golf, coaching baseball, and spending time with his wife and two kids.

  • speaker photo
    Avani Desai
    CEO, Schellman

    Avani Desai is the CEO of Schellman, the world’s largest niche cybersecurity assessment firm and the first ANAB-accredited ISO 42001 certification body. This accreditation positions Schellman to help organizations responsibly develop and deploy AI systems in line with the global AI governance standard. With expertise in information security and operations, Avani has led the firm in staying at the forefront of emerging technologies. She is committed to fostering trust and mitigating risks for clients, empowering them to navigate the complexities of AI with confidence while ensuring ethical and secure AI development.

  • speaker photo
    Jorge Orchilles
    Sr. Director, Readiness and Proactive Security Team, Verizon

    Jorge Orchilles is a leader in Cyber Security and currently a Senior Director at Verizon running the Readiness and Proactive Security Team (Enterprise Vulnerability Assessment, Penetration Testing, Red Team, Dedicated Purple Team, and the AI Red Team). He is the author of the Purple Team Exercise Framework and creator of the C2 Matrix project. Prior to Verizon, he was the CTO at SCYTHE for 3 years, and led the offensive security team at Citi for over 10 years. Jorge is a SANS Principal Instructor, Purple Team Ambassador, and the author of SEC565: Red Team Operations and Adversary Emulation.

    Jorge contributes to a number of projects including MITRE ATT&CK, Atomic Red Team, and CVSSv3.1 He is the author of Microsoft Windows 7 Administrator’s Reference.
    Jorge holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science. He holds multiple certifications from GIAC, ISC2, and ISACA.
    Jorge is a Fellow at the Information Systems Security Association (ISSA) and National Security Institute.

  • speaker photo
    Michelle Garcia
    Director, Information Security & Compliance, Carnival Cruise Line

    Michelle is recognized as a leader in the fields of IT and OT Cyber Security with an extensive foundation of knowledge in ecommerce, security operations, technology globalization, and pioneering where cybersecurity and vessel safety converge. In Michelle's 30-year career, she has extensive experience leading diverse teams across multiple technologies and platforms. She also teaches cybersecurity, spreading her excitement for this field.

    Michelle has deep knowledge in the areas of SOX and PCI-DSS compliance, as well as international regulations specific to IMO and SOLAS. Her security expertise includes security management, attack surface management, application security, incident response, vulnerability management, and project management. She is a master at building and leading high-performance teams.

    Michelle holds a bachelor’s degree in Business Management with a concentration in Marketing and a master’s degree in Cyber Security Management and Policy, as well as multiple professional certifications.

  • speaker photo
    Gisela Novoa
    Former VP, Deputy Information Security Officer, Banesco USA
  • speaker photo
    Lena Licata, Moderator
    VP, Cybersecurity, Blackstone
  • speaker photo
    Victor Campos
    CISO, JM Family Enterprises
  • speaker photo
    Marcos Marrero
    CISO, H.I.G Capital
  • speaker photo
    Happy Hour
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes