googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, April 16, 2025
    9:00 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0
    • session level icon
    speaker photo
    vCISO & Managing Director, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

     

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, April 17, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    InfraGard South Florida Chapter Meeting
    • session level icon
    Open to all attendees
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    More details to come.

    8:00 am
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] How CISOs Can Elevate Influence and Become a Business Driver
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    For today’s CISOs, it’s no longer enough to be just technical experts. This panel of top-level cybersecurity professionals representing the regions of Vancouver, B.C., Bozeman, and Seattle, breaks away from talking about the tired mantra of “speaking the language of the business” and instead dives into practical, real-world examples of how security leaders have successfully navigated the business landscape.

    The discussion focuses on actionable strategies and tactics that have helped CISOs gain influence, secure funding, and elevate cybersecurity from a technical function to a critical business driver. Walk away with specific metrics, communication techniques, and actionable insights that have been proven to work in the real world—offering practical takeaways that can be implemented immediately. Get ready for a session that goes beyond the theory and delivers tangible answers to the challenges CISOs face today.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    The Future of AI Governance: Navigating Uncertainty and Innovation
    • session level icon
    speaker photo
    CEO, Schellman
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    As AI is transforming industries, regulations are concurrently reshaping how organizations approach governance and compliance. With the recent repeal of former President Biden’s AI executive order under the new administration, the future of AI regulation remains uncertain. In this session, Schellman’s Avani Desai explores the impact of shifting policies, the role of industry-led governance frameworks like ISO 42001, and best practices for ensuring responsible AI development. Attendees will gain actionable insights into balancing innovation with ethical considerations and regulatory compliance in an unpredictable policy landscape.

    10:15 am
    Advisory Council Roundtable Discussion (VIP / Invite only)
    • session level icon
    Securing the Modern Factory: Eliminating Cyber Threats with Zero Trust Architecture
    speaker photo
    Sr. Director of OT, Zscaler
    Registration Level:
    • session level iconVIP / Exclusive
    10:15 am - 11:00 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Generously sponsored by:

    10:15 am
    Cyber Resilience by Design: Learning from Hurricanes to Prepare for Disruption
    • session level icon
    speaker photo
    Director of Cybersecurity, Kemper Development Company
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Cyber threats are like hurricanes — inevitable, unpredictable, and often catastrophic. Just as we cannot control hurricanes, organizations cannot control cyber threats, but they can prepare. Cyber resilience isn’t just about recovery; it’s about the entire lifecycle of managing cyber risks, from prevention and detection to response and recovery. This talk will cover the fundamentals of cyber resilience, how to prioritize efforts and key strategies for reinforcing critical security measures.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Bridging the Gap: Assigning Monetary Value to Cyber Risk by Establishing an Effective Risk Management Framework
    • session level icon
    speaker photo
    Head of Information Security, Governance, Risk & Compliance, Spirit Airlines
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    As cyber threats continue to evolve, organizations must not only assess risk but also quantify its financial impact. With regulators, shareholders, and boards demanding clearer risk reporting, cybersecurity professionals need to bridge the gap between technical security expertise and effective risk management.

    This session will provide a step-by-step approach to building a comprehensive cyber risk management framework—from calculating and assessing risk to presenting it in a way that resonates with executives, regulators, and stakeholders. Attendees will learn how to assign a monetary value to cyber risk, align with regulatory expectations (including DHS mandates for board-level security oversight), and create risk assessments that drive informed business decisions. Whether you’re a security practitioner or an executive, this session will equip you with the tools to elevate cyber risk discussions and turn risk management into a strategic advantage.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Chief Evangelist , Corellium
    speaker photo
    Senior Product Marketing Manager, AppOmni
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    11:10 am
    Transforming Application and Service Delivery for the Modern Environment
    • session level icon
    speaker photo
    Sales Engineering, Island
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Delivering business critical applications safely is a delicate balancing act. The user experience is frequently compromised as application, infrastructure, and security teams negotiate the adoption of new services. Unfortunate trade-offs are sometimes necessary to address operational needs for the sake of maintaining security, but these trade-offs can make certain use cases unfeasible or diminish their value to the organization.

    In this session, we will discuss:

    How the Enterprise Browser revolutionizes workspaces by balancing productivity, security, availability, and user experience.
    How quickly this new technology can be adopted to provide a competitive advantage
    Strategies for reducing the effort required to deliver applications and enhance organizational operations.

    12:00 pm
    [Lunch Keynote] A Leadership Strategy for Navigating a Crisis
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session description to come.

    12:15 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Building Business Resilience: Protecting Your Critical Identity Infrastructure
    speaker photo
    Principal Technologist, North America, Semperis
    Registration Level:
    • session level iconVIP / Exclusive
    12:15 pm - 1:00 pm

    This interactive session will focus on methods for protecting hybrid Active Directory (AD) environments and the challenges organizations face in maintaining the integrity of their identity infrastructures.

    Many organizations depend on AD and Entra ID (formerly known as Azure AD) to ensure their Zero Trust strategies. If AD goes down, nearly every other system and resource in the data center is at risk. This session will expose the vulnerabilities associated with AD and Entra ID, highlight the difficulties of recovering these services to a trustworthy state after a cyberattack, and encourage participants to reflect on – and share – their own infrastructure’s resilience.

    Join this engaging discussion and contribute your insights and practical strategies for CISOs like you who want to enhance their organization’s resilience.

    Sponsored by:

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    The Emperor's New Cybersecurity Tool: Cybersecurity Leadership in the Age of Illusion
    • session level icon
    speaker photo
    IT Security Administrator, Broward County Government; Co-Founder & Researcher, CyberMINDS Research Institute
    speaker photo
    Co-Founder CyberMINDS Research Institute/ Chair, Data Privacy Policy Committee / Institutional Review Board
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    This presentation uses “The Emperor’s New Clothes” as an analogy for cybersecurity leadership challenges. It explores vanity, fear, and groupthink, which can lead to blind trust in “magic” solutions. Real-world incidents illustrate these issues are far-reaching and complex to manage. What kind of leader are you? Do you believe your tools or AI are the end-all solution? Are you blind to the truths of cybersecurity? This presentation makes complex cybersecurity challenges accessible, engaging, and practical, equipping leaders with actionable insights to avoid the emperor’s fate.

    1:15 pm
    Beyond Vulnerabilities: The Evolution of Offensive Security and Proactive Defense
    • session level icon
    speaker photo
    Sr. Director, Readiness and Proactive Security Team, Verizon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Offensive security has evolved far beyond traditional vulnerability scanning and penetration testing. As adversaries refine their tactics, organizations must shift from reactive security measures to a proactive approach focused on exposure management, attack surface prioritization, and attack path analysis.

    In this session, Jorge Orchilles—who has led Verizon’s offensive security initiatives—will explore the transition from ethical hacking and red teaming to modern proactive security strategies. Attendees will gain insights into how organizations can enhance their security posture by integrating Attack Surface Management (ASM), identity security, cloud protection, and operational technology (OT/IoT) considerations. The discussion will focus on measuring risk beyond CVSS scores, leveraging likelihood and impact metrics, and strengthening collaboration between offensive and defensive teams.

    Join us to discover how offensive security is shifting toward a readiness-driven model, where proactive threat mitigation and adversary-informed defense become the new standard.

    1:15 pm
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Senior Director, Business Security Office, Netskope
    speaker photo
    Sr. Solutions Engineer , Snyk
    speaker photo
    Global CISO & Member of the Cyberhaven CISO Advisory Board
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    [Panel] Breaking Barriers: Women in Security Empowering the Next Generation
    • session level icon
    speaker photo
    Director, Information Security & Compliance, Carnival Cruise Line
    speaker photo
    VP, Deputy Information Security Officer, Banesco USA
    speaker photo
    VP, Cybersecurity, Blackstone
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Join us for an engaging and interactive panel discussion spotlighting the achievements, challenges, and unique perspectives of women in cybersecurity. Featuring a diverse group of panelists ranging from C-suite executives to rising stars, this session will explore the evolving role of women in the industry, strategies for career advancement, and the importance of mentorship in breaking barriers.

    Designed to foster connection and collaboration, the session includes time for audience Q&A and a networking opportunity to share experiences and insights. The conversation will transition into the 3:00 p.m. happy hour, providing an informal setting to build relationships and celebrate the growing community of women in security.

    Whether you’re a seasoned professional, just starting out, or simply looking for inspiration, this session is for anyone who believes in the power of diversity and inclusion to drive the future of cybersecurity.

    2:10 pm
    The Cybersecurity Talent Gap: Myth or Misconception?
    • session level icon
    speaker photo
    VP, Cybersecurity (CISO) & IT Operations, Jet Aviation
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    The cybersecurity industry is constantly sounding the alarm about a massive talent shortage, but what if the real issue isn’t a lack of talent—but where and how we’re looking for it? This session challenges the prevailing narrative of the cyber talent gap by examining hiring biases, over-reliance on certifications, and the untapped potential already within organizations. Instead of searching endlessly for the “perfect” candidate, companies need to rethink their approach to identifying, training, and developing cybersecurity talent. Join us as we explore how to bridge this so-called gap by unlocking the potential of the already-in-place workforce.

    2:10 pm
    Navigating Third-Party Risk and Vendor Resilience
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    In today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.

    To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 4:00 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

     

    3:30 pm
    [Closing Keynote] Ask a CISO: Navigating Career Progression and Leadership in Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm
    Location / Room: Keynote Theater

    As the cybersecurity landscape evolves, so too do the careers of those who defend our digital environments. In this interactive closing keynote session, a panel of local Chief Information Security Officers (CISOs) will provide valuable insights into the critical journey from cybersecurity practitioner to strategic leader.

    Attendees will have the unique opportunity to engage with these seasoned professionals, asking questions about career progression, succession planning, and how to successfully transition from technical roles to leadership positions. Whether you’re looking to move up the ranks, build your leadership skills, or understand what it takes to step into the CISO role, this session will offer practical advice, real-world experiences, and actionable strategies to guide your professional growth. Join us for a dynamic discussion that explores the intersection of technical expertise and leadership in today’s cybersecurity world.

Exhibitors
  • AppOmni
    Booth: 315

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • Axonius
    Booth: 100

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • BlackGirlsHack
    Booth: TBD

    We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.

    The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.

    BlackGirlsHack is open to all!

  • C1
    Booth: TBD

    C1 is transforming the industry by creating connected experiences that make a lasting impact on customers, our teams and our communities. More than 10,000 customers use C1 every day to help them build meaningful connections through innovative and secure experiences. Our NPS of 80, placing us in the World Class category for the fourth consecutive year, is a testament to our ability to provide customers with the highest level of customer satisfaction, responsiveness, and deep domain expertise. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Corellium
    Booth: 235

    Corellium is the world’s most powerful virtual hardware platform for Arm-powered devices. It has been adopted by federal, state, and local government agencies and service providers around the world.

    Corellium provides government agencies and service providers with virtual Arm-based devices, such as the iPhone and Android mobile phones, for Vulnerability Research, Exploit Research, Mobile App Pentesting, Malware Analysis, Cyber Ranges, Digital Twins, Mobile forensics, and DevSecOps. These devices are truly virtualized, rather than emulated, in order to run firmware and applications natively.

    Corellium can also create customized Arm-based devices to meet government requirements, such as SOHO routers and IoT devices.

    Corellium runs on both an on-premise, air-gapped, environment as well as in a public or private cloud environment.

  • Cribl
    Booth: 115

    Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.

    Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.

  • Cyberhaven
    Booth: 240

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Cyberminds Research Institute
    Booth: TBD

    CyberMinds Research Institute is a non-profit organization with an exceptionally talented staff of highly experienced Information Security, Cyber, and Privacy professional working with individuals and organizations to educate on cybersecurity best practices.

    Our team is dedicated to enabling organizations to address their needs through strategic collaborations and cutting-edge research. Discover our innovative approach to information security and privacy protection.

  • Cyversity South Florida
    Booth: TBD

    Cyversity South Florida is here! We are very much looking forward to engaging with you! We have lots of plans in-the-works, and hope you’ll join us in furthering our MISSION: “Achieving the consistent representation of women, underrepresented minorities, and all veterans in cybersecurity through programs designed to foster recruitment, inclusion and retention – one person at a time.”

  • InfraGard
    Booth: TBD

    InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.

    The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.

  • ISACA South Florida
    Booth: TBD

    Our Chapter was chartered as the 33rd chapter of the Information Systems Audit and Control Association® (ISACA®) on December 2nd, 1978. The South Florida chapter includes approximately 1,400 members in the South Florida region, which spans a large geographic territory, including Miami, Fort Lauderdale, West Palm Beach, Naples, Fort Myers, and Port St. Lucie.

    Mission Statement: “To help South Florida realize the positive potential of technology.”

    Vision Statement: “We are a diverse group of innovative thought leaders partnering with the community to serve as the first choice for professional development and a global role model for ISACA Chapters by 2024.”

  • ISC2 South Florida Chapter
    Booth: TBD

    We are the South Florida chapter of ISC2, a local non-for-profit association for information security leaders and practitioners.

    Our chapter’s program is founded on the exchange of ideas and knowledge and focused on the development of leadership and professional skills aimed at advancing the profession of information security practitioners.

    We invite all information technology and security professionals in our community to join our local chapter and make a positive impact in your community.

  • Island
    Booth: 310

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • National Cybersecurity Alliance
    Booth: TBD

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • Netskope
    Booth: 320

    The Netskope security cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device. Only Netskope understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

  • Orca Security
    Booth: 105

    We’re on a mission to make it fast, easy, and cost effective for organizations to address the critical security issues in their AWS, Azure, and GCP estates so that they can operate in the cloud with confidence.

  • Searchlight Cyber
    Booth: 120

    We provide organizations with relevant and actionable dark web threat intelligence to help them identify and prevent criminal activity.

    Founded in 2017 with a mission to stop criminals acting with impunity on the dark web, we have been involved in some of the world’s largest dark web investigations and have the most comprehensive dataset based on proprietary techniques and ground-breaking academic research.

    Today we help government and law enforcement, enterprises, and managed security services providers around the world to illuminate deep and dark web threats and prevent attacks.

  • Semperis
    Booth: 360

    Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.

  • Silverfort
    Booth: TBD

    Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.

  • SIM South Florida
    Booth: TBD

    The Chapter strives to strengthen professional communications among members who direct the application of information technology in private and pubic organizations. Chapter activities include:

    • Meeting to share innovative ideas and real world experiences which address enterprise information needs. We have excellent speakers both from our membership, and bring in industry executives and subject matter experts from many sources.
    • Providing presentations by leading national information-management professionals and executives who benefit from management-information systems.
    • Challenging our comfort levels by exchanging ideas with peers and business counterparts.
    • Being a resource for each other, and personal networking.
  • SoFloTechKids
    Booth: TBD

    At South Florida Tech Friends, our mission is to foster a vibrant community of technology professionals in the South Florida area. Through quarterly meet-ups, networking events, and knowledge-sharing sessions, we aim to facilitate meaningful connections, inspire collaboration, and advance the collective expertise of our members.

    Our goal is to create an inclusive space that promotes learning, innovation, and professional growth within the dynamic landscape of technology. Together, we strive to cultivate a supportive environment where individuals can exchange ideas, explore emerging trends, and contribute to the evolution of technology in our region.

  • South Florida ISSA Chapter
    Booth: TBD

    The South Florida chapter of the Information System Security Association (ISSA) stands as a cornerstone within the global ISSA community, celebrated for its prominence and esteemed reputation.

    Since its inception in 1998, the South Florida ISSA has consistently organized Security Conferences every two years. These events have featured keynote speeches from illustrious figures such as Orson Swindle, former head of the FTC, alongside other notable experts from leading corporations and academic institutions.

    With a dynamic involvement in the InfoSec realm, South Florida ISSA engages a diverse audience ranging from managers to technical specialists, addressing a wide spectrum of InfoSec subjects. This engagement extends through their monthly meetings and various specialized events.

    A highlight of our calendar is the Hack the Flag Challenge, which takes place annually in September. This event is acclaimed throughout Florida as a top-tier collaborative learning opportunity within the industry.

    Furthermore, South Florida ISSA takes pride in being the professional sanctuary for numerous ISSA Senior Members, including the distinguished ISSA Fellow William A. Cellich, underscoring its significant contribution to the community and the field at large.

  • Snyk
    Booth: 230

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • TeamOne.Support
    Booth: TBD

    TeamOne.Support, founded in 2022, blends technological innovation with a commitment to U.S. veterans, offering IT and cybersecurity training aimed at empowering and providing them with sustainable career paths in the tech industry. This initiative, driven by a deep sense of social responsibility, has evolved into a full-service IT provider with a focus on high-security standards and flexible veteran employment.

    TeamOne.Support’s story is rooted in a unique confluence of technological expertise and a deep sense of social responsibility towards U.S. veterans. It began in 2022 with a commitment to provide veterans with IT and cybersecurity skills as a way to address veteran suicides. This project expanded rapidly, evolving from training programs into a full-fledged IT service provider by late 2023. As the organization grew, it maintained its focus on empowering veterans in the tech industry, ensuring high security standards in their services and creating flexible, meaningful job opportunities for veterans, reflecting a successful merger of professional skill development and impactful social contribution.

  • ThreatLocker
    Booth: 110

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Women in CyberSecurity (WiCyS)
    Booth: TBD

    Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.

  • Zscaler
    Booth: 300

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Glen Sorensen, Instructor
    vCISO & Managing Director, Cyber Risk Opportunities LLC

    Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.

    Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.

  • speaker photo
    Avani Desai
    CEO, Schellman

    Avani Desai is the CEO of Schellman, the world’s largest niche cybersecurity assessment firm and the first ANAB-accredited ISO 42001 certification body. This accreditation positions Schellman to help organizations responsibly develop and deploy AI systems in line with the global AI governance standard. With expertise in information security and operations, Avani has led the firm in staying at the forefront of emerging technologies. She is committed to fostering trust and mitigating risks for clients, empowering them to navigate the complexities of AI with confidence while ensuring ethical and secure AI development.

  • speaker photo
    Deepak Patel
    Sr. Director of OT, Zscaler
  • speaker photo
    Yuri Soldatenkov
    Director of Cybersecurity, Kemper Development Company

    Yuri Soldatenkov is a relentlessly dedicated cybersecurity leader with 20+ years of front-line experience driving enterprise security strategy, risk management, and infrastructure resilience. As Director of Cybersecurity at Kemper Development Company, he leads initiatives to strengthen security defenses and keep the organization ahead of evolving threats. Passionate about safeguarding both the business and its people, he has championed Zero Trust adoption, guided cloud security transformations, and elevated enterprise defenses across multiple industries, including technology, manufacturing, real estate, logistics, and construction. As a CISSP, CCSP, and holder of 3x GIAC certifications, he applies deep expertise in cybersecurity operations and network security to safeguard critical systems, defend against advanced threats, and ensure secure business operations.

  • speaker photo
    Roger Auinger
    Head of Information Security, Governance, Risk & Compliance, Spirit Airlines

    Roger Auinger is a seasoned cybersecurity and risk management executive with extensive international experience in the financial services and aviation industries, currently leading GRC at a major airline. He has built and matured global cybersecurity frameworks, risk, and compliance programs. Previously, he advised financial institutions and private equity firms on cyber risk and served as a Chief Information Security and Chief Technology Risk Officer at a multinational bank, engaging with regulators on cybersecurity, risk, and compliance matters. With leadership roles in global financial institutions and consulting firms, Roger specializes in cyber risk, regulatory compliance, third-party risk management, and enterprise-wide security strategy, fostering resilient cyber security and risk cultures in complex organizations.

  • speaker photo
    Brian Robison
    Chief Evangelist , Corellium

    Brian boasts over 25 years of cybersecurity expertise, blending marketing acumen with captivating speaking prowess. As Chief Evangelist & VP Product Marketing at Corellium, he leads evangelism, thought leadership, and product marketing. Formerly, as VP Solutions Strategy at BlackBerry/Cylance, Brian hosted dynamic Hacking Exposed events, unveiling real-world threat actor techniques. A sought-after speaker at RSA, Black Hat, and ISC2 Think Tank, Brian previously defended against mobile threats at Citrix XenMobile and Good Technology. At McAfee, he spearheaded ePolicy Orchestrator, endpoint security and vulnerability management.

  • speaker photo
    Brittany Bodane
    Senior Product Marketing Manager, AppOmni

    Brittany Bodane is a Senior Product Marketer at AppOmni, where she works closely with security leaders, customers, and partners to better understand and communicate evolving SaaS security challenges. She translates these insights into strategies and education that help organizations secure their SaaS environments. Passionate about learning from security experts, she shares that knowledge to help protect user data and strengthen SaaS security practices.

  • speaker photo
    Matt Pour
    Sales Engineering, Island

    Matt Pour leads Island's North America Sales Engineers. Matt brings decades of Information Technology and Information Security experience from establishing ITIL practices and InfoSec programs in Fortune 500 companies to engineering/architecting InfoSec business challenges for customers of some of the world's leading technology and cybersecurity companies. Matt was previously a Field CTO at Broadcom and help technical leadership roles at Symantec, Blue Coat and IBM.

  • speaker photo
    Sean Deuby, Moderator
    Principal Technologist, North America, Semperis

    Sean Deuby brings more than 30 years’ experience in enterprise IT and hybrid identity security to his role as Semperis' Principal Technologist, North America. An original architect and technical leader of Intel's Active Directory and a 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception. His experience as an identity strategy consultant for many Fortune 500 companies and an industry journalism veteran give him a broad perspective on the challenges of today's identity-centered security.

  • speaker photo
    Dr. Natalie Johnson
    IT Security Administrator, Broward County Government; Co-Founder & Researcher, CyberMINDS Research Institute

    Dr. Johnson is a dedicated technology professional with 15+ years in compliance, security, and governance with a track record of success in security and strategic planning. Dr. Johnson’s research on the underrepresentation of Women of Color in InfoSec showcases her dedication to fostering inclusivity in the field. She has advanced degrees in Business Administration, InfoSec, and Cybersecurity complemented by several industry-sought certifications; her academic and professional journey underscores her commitment to privacy, infosec, and cybersecurity initiatives. Dr. Johnson is a co-founder of the CyberMINDS Research Institute and leader in the South Florida Chapter of Cyversity.

  • speaker photo
    Dr. Alexis Perdereaux-Weekes (Dr. Privacy)
    Co-Founder CyberMINDS Research Institute/ Chair, Data Privacy Policy Committee / Institutional Review Board

    Dr. Perdereaux-Weekes (Dr Privacy), a renowned Data Privacy expert, champions individuals' rights to own, control, and manage their personal information. With over 25 years of profound expertise, he is a leading Global figure in Data Privacy Regulation, Cybersecurity, Risk Management, and Compliance. His advocacy underscores the ethical handling of information and protecting personal data in an increasingly digital era. His research delves into Global Data Privacy Regulation, Biometrics, Consumer Data Protection, and Policy Compliance, focusing on GDPR, CCPA, LGPD, and HIPAA. Dr. Perdereaux-Weekes holds advanced degrees in Information Security, International Business, Privacy, and Cybersecurity Law, alongside sought-after industry certifications, affirming his dedication to mastering privacy and cybersecurity endeavors.

  • speaker photo
    Jorge Orchilles
    Sr. Director, Readiness and Proactive Security Team, Verizon

    Jorge Orchilles is a leader in Cyber Security and currently a Senior Director at Verizon running the Readiness and Proactive Security Team (Enterprise Vulnerability Assessment, Penetration Testing, Red Team, Dedicated Purple Team, and the AI Red Team). He is the author of the Purple Team Exercise Framework and creator of the C2 Matrix project. Prior to Verizon, he was the CTO at SCYTHE for 3 years, and led the offensive security team at Citi for over 10 years. Jorge is a SANS Principal Instructor, Purple Team Ambassador, and the author of SEC565: Red Team Operations and Adversary Emulation.

    Jorge contributes to a number of projects including MITRE ATT&CK, Atomic Red Team, and CVSSv3.1 He is the author of Microsoft Windows 7 Administrator’s Reference.
    Jorge holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science. He holds multiple certifications from GIAC, ISC2, and ISACA.
    Jorge is a Fellow at the Information Systems Security Association (ISSA) and National Security Institute.

  • speaker photo
    Damian Chung
    Senior Director, Business Security Office, Netskope

    Damian Chung is a cybersecurity leader with over ten years of security experience focused in healthcare. As the Business Information Security Officer at Netskope, Damian is responsible for overseeing corporate security tools and processes and acts as the subject matter expert in the healthcare vertical. He also serves as an adjunct professor for the cybersecurity program at the University of Advancing Technologies in Tempe, AZ.

  • speaker photo
    Ryan Frazier
    Sr. Solutions Engineer , Snyk

    Ryan Frazier is a Senior Solutions Engineer at Snyk, helping businesses build safer software. As a bridge between technology and people, Ryan works closely with developers, security teams, and executives to understand their needs and find the best ways to protect their applications from security threats and improve their security posture. Prior to Snyk, Ryan worked as a software developer with firsthand knowledge of the pain points that developers face in the current state of application security.

  • speaker photo
    Troy Wilkinson
    Global CISO & Member of the Cyberhaven CISO Advisory Board

    Troy Wilkinson began his career serving others as a Law Enforcement officer. He commanded a Joint Terrorism Task Force, was a lead bomb investigator, and violent crime and homicide detective. However, one of his greatest achievements came from his ability and skill investigating and prosecuting child exploitation and other electronic crimes. Wilkinson was recruited by the U.S. State Department to train police officers in Kosovo on cyber investigations. He was seconded to the United Nations and European Union to lead investigations into political corruption, organized crime, war crimes, financial crimes and terrorism. Together with a team of international investigators, Wilkinson built the first IT forensics lab in the European Union Mission in Kosovo.

    Wilkinson is the former Global Chief Information Security Officer with Interpublic Group (IPG), a Fortune 500 company. Prior to IPG, Wilkinson served as the CISO for International Cruise & Excursions. He is also the co-founder of Tego Cyber Inc, a threat intelligence and threat detection company, and serves on the Board of Directors.

    Wilkinson is a worldwide speaker on cybersecurity, co-authored an Amazon Best Seller, and serves as an advisor/consultant with several VC firms and cybersecurity startups. He contributes to national syndicated publications and participates in numerous conference panels on cybersecurity topics and careers.

  • speaker photo
    Michelle Garcia
    Director, Information Security & Compliance, Carnival Cruise Line

    Michelle is recognized as a leader in the fields of IT and OT Cyber Security with an extensive foundation of knowledge in ecommerce, security operations, technology globalization, and pioneering where cybersecurity and vessel safety converge. In Michelle's 30-year career, she has extensive experience leading diverse teams across multiple technologies and platforms. She also teaches cybersecurity, spreading her excitement for this field.

    Michelle has deep knowledge in the areas of SOX and PCI-DSS compliance, as well as international regulations specific to IMO and SOLAS. Her security expertise includes security management, attack surface management, application security, incident response, vulnerability management, and project management. She is a master at building and leading high-performance teams.

    Michelle holds a bachelor’s degree in Business Management with a concentration in Marketing and a master’s degree in Cyber Security Management and Policy, as well as multiple professional certifications.

  • speaker photo
    Gisela Novoa
    VP, Deputy Information Security Officer, Banesco USA
  • speaker photo
    Lena Licata, Moderator
    VP, Cybersecurity, Blackstone
  • speaker photo
    Brandon Pritz
    VP, Cybersecurity (CISO) & IT Operations, Jet Aviation

    Brandon Pritz is a forward-thinking cybersecurity leader serving as Vice President of Cybersecurity (CISO) and IT Operations at Jet Aviation in West Palm Beach, Florida. In this role, he’s revolutionized the security department, driving efficiency, and transforming it into a streamlined powerhouse that slashes breach risks while aligning with organizational goals. With over a decade of experience, Brandon excels at bridging cybersecurity with business needs, partnering closely with lines of business to position security as a strategic enabler rather than a pain point. His knack for offensive security and mentorship has fueled robust, business-friendly security programs that protect and empower, all while shaping the next wave of IT talent. His career spans roles like Senior Director of Cybersecurity at Jet Aviation, IT Security Manager at Wade Trim, and Penetration Tester at CDW & CBI, where he conducted pivotal security assessments for diverse clients. A U.S. Air Force veteran, he honed his technical skills managing a $36 million network as a Cyber Transport Technician.

    Brandon’s expertise in risk assessment, security audits, and penetration testing ensures complex protocols enhance rather than hinder business operations. Outside his CISO responsibilities, he actively mentors aspiring cybersecurity professionals. Eager to collaborate, Brandon welcomes opportunities to fortify strategies that make security a business ally.

  • speaker photo
    Happy Hour
  • speaker photo
    Marcos Marrero
    CISO, H.I.G Capital
  • speaker photo
    Panel Discussion
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.