Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 20, 20269:00 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive AdvantageCyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmYour CEO just asked about AI security. Do you have an answer?While you’re counting vulnerabilities, your competitors are deploying AI at scale.Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.And your cybersecurity team? Still writing policies nobody reads.In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.You’ll master:• The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance• Executive Translation — Turn technical AI risks into boardroom language• NIST AI RMF Implementation — Practical application, not theory• The $12M Question — Secure against deepfake fraud and AI-enabled attacks• Shadow AI Discovery — Find and govern the AI already in your organization• Business-First Security — Protect value, not just systemsWho should attend:Perfect fit:• CISOs facing board questions about AI• Information Security Directors enabling digital transformation• IT VPs without dedicated security teams• Cybersecurity Consultants serving enterprise clients• Risk Managers governing AI initiatives• Aspiring decision makers and those reporting to oneWrong course:• Developers wanting to code AI models• Analysts seeking technical certifications• Anyone looking for hands-on hacking labsThis workshop is NOT about:• Prompt injection techniques• Model architecture security• Technical vulnerability scanning• Writing 200-page policiesThis workshop IS about:• Speaking profit-and-loss to executives• Enabling your AI transformations• Building cybersecurity into AI from day one• Becoming the trusted AI advisorYou’ll leave with:1. The Complete AIR-MAP Toolkit• 90-day implementation roadmap• Discovery templates and workflows• Risk scoring calculators• Executive presentation templates2. Ready-to-Deploy Policies• AI Acceptable Use Policy (customize in minutes)• Vendor assessment questionnaires• Incident Response playbooks3. 30-Minute Strategy SessionComplementary private consultation to apply AIR-MAP to your specific situation. - Thursday, May 21, 20267:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:
Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amSimple Daily Habits to Strengthen Your Security PostureRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] You Are Not a CISO, You Are a 'CO IS'Focus Areas: Security Leadership; Executive Alignment; Career DevelopmentCybersecurity Expert; Author of “Cyber Crisis”Registration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
9:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
10:15 amQuantum Readiness: Preparing Your Organization for a Post-Quantum FutureRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 amIdentity Security Beyond MFA: Continuous Verification and Risk-Based ControlsRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 am[Panel] Securing the Open Campus: Higher-Ed CISOs on AI, Identity, and CollaborationFocus Areas: CISO Leadership; Artificial Intelligence; Identity & Access Management (IAM)CISO, Miami Dade CollegeRegistration Level:
Open Sessions
10:15 am - 10:50 amHigher education institutions face distinct cybersecurity challenges—open environments, diverse user populations, and rapidly evolving technology adoption. In this panel, CISOs from colleges and universities across Florida come together to discuss how they are addressing today’s most pressing issues, including the use of AI in security programs, identity and access management at scale, data privacy obligations, and securing hybrid learning environments.
Panelists will share practical governance models, collaboration strategies, and lessons learned from operating in highly decentralized institutions. This session offers attendees a candid, peer-level look at what’s working in higher-ed cybersecurity today—and where leaders are still adapting.
10:50 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
11:10 amFrom Zero to Defensible: A CISO Playbook for Building Cybersecurity Programs From ScratchFocus Areas: Career Development and Security AwarenessCISO, Kovack Financial NetworkRegistration Level:
Conference Pass
11:10 am - 11:45 amBuilding a cybersecurity program from scratch is one of the toughest challenges security leaders face — especially with limited budgets, small teams, and growing business risk. Drawing from real-world experience building multiple security programs, this session delivers a practical blueprint for establishing a defensible security posture. Attendees will learn how to prioritize controls, where AI adds real value (and where it introduces risk), and how to avoid common early-stage mistakes. This talk focuses on actionable strategies and proven lessons that can be immediately applied to new or evolving security programs.
11:10 amThe Rise of AI Assistants: New Insider Threat and Data Exposure ChallengesRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] AI-Accelerated Attacks and Defenses: Preparing for Machine-Speed ThreatsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession details to come.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)CISO, SemperisRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber ConnectProactive by Design: Anticipating Threats Before They StrikeRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallThe days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.
Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.
1:15 pmZero Trust in Practice: What Real-World Implementations Look Like NowRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pmBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceRegistration Level:
Open Sessions
1:15 pm - 1:50 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:50 pmNetworking Break & Cyber ConnectWhat’s Keeping You Up at Night?Registration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallHead to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.
2:10 pmAPI Security: Managing the Fastest-Growing Attack SurfaceRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pmBuilding Incident Response Plans for Highly Distributed WorkforcesRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Building High-Trust Security Cultures in an Era of Constant DisruptionRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterSession details to come.
3:45 pmHappy Hour & Dash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- AppOmniBooth: TBD
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- BlackGirlsHackBooth: TBD
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- Canary TrapBooth: TBD
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Concentric AIBooth: TBD
Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.
- Cyberminds Research InstituteBooth: TBD
CyberMinds Research Institute is a non-profit organization with an exceptionally talented staff of highly experienced Information Security, Cyber, and Privacy professional working with individuals and organizations to educate on cybersecurity best practices.
Our team is dedicated to enabling organizations to address their needs through strategic collaborations and cutting-edge research. Discover our innovative approach to information security and privacy protection.
- Cyversity South FloridaBooth: TBD
Cyversity South Florida is here! We are very much looking forward to engaging with you! We have lots of plans in-the-works, and hope you’ll join us in furthering our MISSION: “Achieving the consistent representation of women, underrepresented minorities, and all veterans in cybersecurity through programs designed to foster recruitment, inclusion and retention – one person at a time.”
- Harmonic SecurityBooth: TBD
Harmonic Security lets your teams adopt AI tools safely by protecting sensitive data in real time with minimal effort. It gives you full control and stops leaks so your teams can innovate confidently.
Recognized as an RSA Innovation Sandbox finalist in 2024, Harmonic Security redefines data protection for the GenAI era.
- InfraGard South Florida Members AllianceBooth: TBD
The mission of the InfraGard South Florida Members Alliance is to assist in protecting our region’s critical infrastructure from threats and attack, either physical or cyber. This mission is accomplished through the following:
- Secure facilitation of information sharing
- Collaboration with public/private industry professionals and government agencies at all levels (local, state, and federal)
- Training and education of our membership, and community outreach
- ISACA South FloridaBooth: TBD
Our Chapter was chartered as the 33rd chapter of the Information Systems Audit and Control Association® (ISACA®) on December 2nd, 1978. The South Florida chapter includes approximately 1,400 members in the South Florida region, which spans a large geographic territory, including Miami, Fort Lauderdale, West Palm Beach, Naples, Fort Myers, and Port St. Lucie.
Mission Statement: “To help South Florida realize the positive potential of technology.”
Vision Statement: “We are a diverse group of innovative thought leaders partnering with the community to serve as the first choice for professional development and a global role model for ISACA Chapters by 2024.”
- ISC2 South Florida ChapterBooth: TBD
We are the South Florida chapter of ISC2, a local non-for-profit association for information security leaders and practitioners.
Our chapter’s program is founded on the exchange of ideas and knowledge and focused on the development of leadership and professional skills aimed at advancing the profession of information security practitioners.
We invite all information technology and security professionals in our community to join our local chapter and make a positive impact in your community.
- IslandBooth: TBD
What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.
- NetskopeBooth: TBD
Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.
- Orca Security Inc.Booth: TBD
We’re on a mission to make it fast, easy, and cost effective for organizations to address the critical security issues in their AWS, Azure, and GCP estates so that they can operate in the cloud with confidence.
- SemperisBooth: TBD
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- SoFloTechKidsBooth: TBD
At South Florida Tech Friends, our mission is to foster a vibrant community of technology professionals in the South Florida area. Through quarterly meet-ups, networking events, and knowledge-sharing sessions, we aim to facilitate meaningful connections, inspire collaboration, and advance the collective expertise of our members.
Our goal is to create an inclusive space that promotes learning, innovation, and professional growth within the dynamic landscape of technology. Together, we strive to cultivate a supportive environment where individuals can exchange ideas, explore emerging trends, and contribute to the evolution of technology in our region.
- South Florida ISSA ChapterBooth: TBD
The South Florida chapter of the Information System Security Association (ISSA) stands as a cornerstone within the global ISSA community, celebrated for its prominence and esteemed reputation.
Since its inception in 1998, the South Florida ISSA has consistently organized Security Conferences every two years. These events have featured keynote speeches from illustrious figures such as Orson Swindle, former head of the FTC, alongside other notable experts from leading corporations and academic institutions.
With a dynamic involvement in the InfoSec realm, South Florida ISSA engages a diverse audience ranging from managers to technical specialists, addressing a wide spectrum of InfoSec subjects. This engagement extends through their monthly meetings and various specialized events.
A highlight of our calendar is the Hack the Flag Challenge, which takes place annually in September. This event is acclaimed throughout Florida as a top-tier collaborative learning opportunity within the industry.
Furthermore, South Florida ISSA takes pride in being the professional sanctuary for numerous ISSA Senior Members, including the distinguished ISSA Fellow William A. Cellich, underscoring its significant contribution to the community and the field at large.
- Sublime SecurityBooth: TBD
Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.
- TeamOne.SupportBooth: TBD
TeamOne.Support, founded in 2022, blends technological innovation with a commitment to U.S. veterans, offering IT and cybersecurity training aimed at empowering and providing them with sustainable career paths in the tech industry. This initiative, driven by a deep sense of social responsibility, has evolved into a full-service IT provider with a focus on high-security standards and flexible veteran employment.
TeamOne.Support’s story is rooted in a unique confluence of technological expertise and a deep sense of social responsibility towards U.S. veterans. It began in 2022 with a commitment to provide veterans with IT and cybersecurity skills as a way to address veteran suicides. This project expanded rapidly, evolving from training programs into a full-fledged IT service provider by late 2023. As the organization grew, it maintained its focus on empowering veterans in the tech industry, ensuring high security standards in their services and creating flexible, meaningful job opportunities for veterans, reflecting a successful merger of professional skill development and impactful social contribution.
- TevoraBooth: TBD
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.
- TorqBooth: TBD
Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.
- WiCyS Florida AffiliateBooth: TBD
- Zafran SecurityBooth: TBD
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
Rob Finch, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLCRob Finch is a Cyber Risk Analyst with Cyber Risk Opportunities (CRO). His job is to deliver the Managed Program, AI Risk Management Plans, other cyber risk services offered by CRO.
Rob enjoys creating tools that assist organizations in understanding and securely integrating AI tools into their operations. He focuses on developing practical, secure AI workflows that balance innovation with responsible risk management, helping teams use new technology effectively and safely.
Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Dr. Domingo Castillo, ModeratorCISO, Miami Dade CollegeDr. Castillo is the Chief Information Security Officer of the Miami Dade College (MDC) since 2020. Founded in 1959, MDC is the second-largest college or university in the United States, and it is the #1 in associated degrees awarded in Liberal Arts and Sciences, General Studies, and Humanities. Mr. Castillo’s prior roles include Chief Information Security Officer at the University of Arkansas (UofA), Fayetteville. The Carnegie Foundation classifies the University of Arkansas among only 3 percent of universities in America that have the highest level of research activity. Before joining UofA, Mr. Castillo was the Regional Information Security and Compliance Officer at Chubb where he was responsible for implementing and managing cost-effective solutions to successfully protect the information assets for the Company’s Latin America division.
In 2018, Mr. Castillo was awarded the (ISC)² Best Information Security Practitioner Award during the 2018 Information Security Leadership Awards (ISLA®) Americas ceremony at the eighth annual (ISC)² Security Congress in New Orleans, LA. The ISLA Awards Program celebrates the accomplishments of individuals in the private and public sectors throughout the Americas, outside of the U.S. federal government, who are inspiring change within the field of cybersecurity. (ISC)² is the world’s largest nonprofit association of certified cybersecurity professionals.
Mr. Castillo holds a Bachelor’s degree in computer science from APEC university. He holds a Master’s degree in Business Administration (MBA) from H. Wayne Huizenga School of Business, Nova Southeastern University. He also has a Master’s degree in Project Management (MPM) and a Master’s degree in Public Administration (MPA) from Keller Graduate School of Management, DeVry University. In addition, Mr. Castillo has a Juris Master's Cybersecurity and Privacy at Florida State University, and an Executive Doctorate of Business Administration Field of Study Information Security at St. Thomas University. Mr. Castillo holds several certifications, such as Certified Information System Security Professional (CISSP), Project Manager Professional (PMP), and CompTIA Security+.
Panel Discussion
Roberto GaldamezCISO, Kovack Financial NetworkRoberto Galdamez is a Chief Information Security Officer (CISO) and cybersecurity program builder known for transforming security operations in regulated and high-impact environments. He currently leads enterprise security strategy within financial services and has previously supported large-scale cybersecurity initiatives at the Miami Dolphins and VMware. Roberto specializes in building security programs from the ground up, modernizing detection and response, and aligning cyber risk with business outcomes. He holds a Master’s degree in Cybersecurity, multiple industry certifications, and is a frequent industry speaker and executive panelist.
Panel Discussion
Jim Doggett, ModeratorCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
Panel Discussion
Panel Discussion
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.









