Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 20, 20269:00 am[PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive AdvantageCyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmYour CEO just asked about AI security. Do you have a clear answer?While you’re counting vulnerabilities, your competitors are deploying AI at scale.While security teams are still cataloging vulnerabilities, business units are deploying AI at scale. Marketing is using generative AI for campaigns. Sales is rolling out AI SDRs. Customer service is automating with chatbots.Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots. And your cybersecurity team? Still writing policies nobody reads.In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.What You’ll Master-
The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
-
Executive Translation — Turn technical AI risks into boardroom language
-
NIST AI RMF Implementation — Practical application, not theory
-
The $12M Question — Secure against deepfake fraud and AI-enabled attacks
-
Shadow AI Discovery — Find and govern the AI already in your organization
-
Business-First Security — Protect value, not just systems
Who Should AttendIdeal for:-
CISOs facing board questions about AI
-
Information Security Directors enabling digital transformation
-
IT VPs without dedicated security teams
-
Cybersecurity Consultants serving enterprise clients
-
Risk Managers governing AI initiatives
-
Aspiring decision makers and those reporting to one
Not designed for:-
Developers wanting to code AI models
-
Analysts seeking technical certifications
-
Anyone looking for hands-on hacking labs
What This Workshop Is (and Isn’t)This workshop is NOT about:-
Prompt injection techniques
-
Model architecture security
-
Technical vulnerability scanning
-
Writing 200-page policies
This workshop IS about:-
Speaking profit-and-loss to executives
-
Enabling your AI transformations
-
Building cybersecurity into AI from day one
-
Becoming the trusted AI advisor
What You’ll Leave With1. The Complete AIR-MAP Toolkit-
90-day implementation roadmap
-
Discovery templates and workflows
-
Risk scoring calculators
-
Executive presentation templates
2. Ready-to-Deploy Governance Assets-
AI Acceptable Use Policy (customize in minutes)
-
Vendor assessment questionnaires
-
Incident Response playbooks
3. A 30-Minute Strategy SessionA complimentary private consultation to apply AIR-MAP directly to your organization’s AI strategy and risk posture. - Thursday, May 21, 20267:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:
Open Sessions
8:00 am - 4:45 pmLocation / Room: Networking HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:
VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amInfraGard South Florida Members Alliance MeetingOpen to all attendeesRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:00 amSimple Daily Habits to Strengthen Your Security PostureRegistration Level:
Open Sessions
8:00 am - 8:45 amSession details to come.
8:45 amNetworking BreakRegistration Level:
Open Sessions
8:45 am - 9:00 amLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] The Future of IP in a Digital World: Redefining IP Risk & Opportunity in the Age of AI & CyberFocus Areas: AI Model Security; Intellectual Property; Cyber-Resilient Innovation & Governance; Algorithmic Theft; Data Poisoning DefenseCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Registration Level:
Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterIntellectual property is no longer just a legal asset, it is a dynamic, digital target. In an era defined by artificial intelligence, autonomous systems, and persistent cyber threats, the traditional boundaries of IP protection are dissolving. Today’s adversaries don’t just steal information; they extract models, replicate innovation at scale, manipulate training data, and weaponize digital access to undermine competitive advantage.
This keynote explores how AI and cyber capabilities are fundamentally reshaping intellectual property risk. From model inversion and prompt injection to algorithmic theft and data poisoning, the threat landscape is evolving faster than most organizations can measure it. At the same time, AI presents unprecedented opportunity, accelerating innovation, enhancing detection, and redefining how IP is created, protected, and monetized.
Attendees will gain a forward-looking framework for understanding modern IP exposure, governance blind spots, and the strategic decisions leaders must make to protect competitive advantage in a world where digital replication is instant and global. The future of IP will not be defended solely in courtrooms, it will be secured through architecture, policy, and proactive cyber resilience.
9:45 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:
Open Sessions
9:45 am - 10:15 amLocation / Room: Networking HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
10:15 amCyber Resilience by Design: What Hurricanes Teach About Timeless SecurityFocus Areas: Cyber Resilience and Incident ResponseDirector of Cybersecurity, Kemper Development CompanyRegistration Level:
Conference Pass
10:15 am - 10:50 amExtreme hurricanes have shown that structures built with intentional, resilient design can survive even the worst storms. The same principle applies to cybersecurity. By focusing on timeless security practices such as strong safeguards, rapid patching, zero trust, and tested response plans, organizations can withstand modern threats ranging from ransomware to AI-driven social engineering. The result is cyber resilience: the ability to anticipate, endure, and recover when the inevitable digital storm hits.
10:15 amIdentity Security Beyond MFA: Continuous Verification and Risk-Based ControlsRegistration Level:
Conference Pass
10:15 am - 10:50 amSession details to come.
10:15 am[Panel] Securing the Open Campus: Higher-Ed CISOs on AI, Identity, and CollaborationFocus Areas: CISO Leadership; Artificial Intelligence; Identity & Access Management (IAM)CISO, Miami Dade CollegeRegistration Level:
Open Sessions
10:15 am - 10:50 amHigher education institutions face distinct cybersecurity challenges—open environments, diverse user populations, and rapidly evolving technology adoption. In this panel, CISOs from colleges and universities across Florida come together to discuss how they are addressing today’s most pressing issues, including the use of AI in security programs, identity and access management at scale, data privacy obligations, and securing hybrid learning environments.
Panelists will share practical governance models, collaboration strategies, and lessons learned from operating in highly decentralized institutions. This session offers attendees a candid, peer-level look at what’s working in higher-ed cybersecurity today—and where leaders are still adapting.
10:50 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:
Open Sessions
10:50 am - 11:10 amLocation / Room: Networking HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
11:10 amFrom Zero to Defensible: A CISO Playbook for Building Cybersecurity Programs from ScratchFocus Areas: Career Development; Security AwarenessCISO, Kovack Financial NetworkRegistration Level:
Conference Pass
11:10 am - 11:45 amBuilding a cybersecurity program from scratch is one of the toughest challenges security leaders face—especially with limited budgets, small teams, and growing business risk. Drawing from real-world experience building multiple security programs, this session delivers a practical blueprint for establishing a defensible security posture. Attendees will learn how to prioritize controls, where AI adds real value (and where it introduces risk), and how to avoid common early-stage mistakes. This talk focuses on actionable strategies and proven lessons that can be immediately applied to new or evolving security programs.
11:10 amThe Rise of AI Assistants: New Insider Threat and Data Exposure ChallengesRegistration Level:
Conference Pass
11:10 am - 11:45 amSession details to come.
11:10 am[Panel] Navigating the Evolving Digital BattlefieldFocus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party RiskRegistration Level:
Open Sessions
11:10 am - 11:45 amAs organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.
Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Networking HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pm[Lunch Keynote] AI-Accelerated Attacks and Defenses: Preparing for Machine-Speed ThreatsRegistration Level:
Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession details to come.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)CISO, SemperisRegistration Level:
VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber ConnectProactive by Design: Anticipating Threats Before They StrikeRegistration Level:
Open Sessions
12:45 pm - 1:15 pmLocation / Room: Networking HallThe days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.
Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.
1:15 pmZero Trust in Practice: What Real-World Implementations Look Like NowRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pmBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Conference Pass
1:15 pm - 1:50 pmSession details to come.
1:15 pm[Panel] The Double-Edged Sword of AI in Cyber DefenseFocus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & AssuranceRegistration Level:
Open Sessions
1:15 pm - 1:50 pmAI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.
The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.
1:50 pmNetworking Break & Cyber ConnectWhat’s Keeping You Up at Night?Registration Level:
Open Sessions
1:50 pm - 2:10 pmLocation / Room: Networking HallHead to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.
2:10 pm[Panel] Voices that Strengthen Cyber: Women Leading with ImpactFocus Areas: Career DevelopmentDeputy CISO, OctusBISO, Carnival Cruise LineRegistration Level:
Conference Pass
2:10 pm - 2:45 pmDiverse perspectives are essential to defending today’s digital landscape. This panel highlights women whose unique backgrounds, experiences, and leadership styles are transforming cybersecurity. Through their stories, attendees will see how inclusion fuels innovation, resilience, and stronger security outcomes. Join us for a conversation that celebrates representation and explores how we can continue building a more inclusive cyber workforce.
Women enter cybersecurity through countless paths, and their stories show that there’s no single way to lead, succeed, or make an impact in this field.
2:10 pmAPI Security: Managing the Fastest-Growing Attack SurfaceRegistration Level:
Conference Pass
2:10 pm - 2:45 pmSession details to come.
2:10 pm[Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern EnterpriseFocus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge SecurityRegistration Level:
Open Sessions
2:10 pm - 2:45 pmModern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.
Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:
Open Sessions
2:45 pm - 3:00 pmLocation / Room: Networking HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Building High-Trust Security Cultures in an Era of Constant DisruptionRegistration Level:
Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterSession details to come.
3:45 pmHappy Hour & Dash for PrizesRegistration Level:
Open Sessions
3:45 pm - 4:45 pmLocation / Room: Networking HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
- BlackGirlsHackBooth: TBD
We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.
The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.
BlackGirlsHack is open to all!
- BlinkOpsBooth: TBD
Automate all things security in the Blink of AI.
BlinkOps is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless.
Whether you prefer code, low-code, or no-code, BlinkOps has you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt.
Use BlinkOps as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.
- Canary TrapBooth: TBD
Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.
Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.
- Concentric AIBooth: TBD
Concentric AI is intelligent data security made easy. Its Semantic Intelligence™ platform uses context-aware AI to discover sensitive data, monitor risks, automate remediation, simplify compliance, and accelerate investigations. It delivers smart, targeted protection by understanding how data is used, shared, and exposed. Concentric AI also offers managed services to keep security programs lean, scalable, and effective. This end-to-end platform protects data at rest, data in motion, and all the GenAI tools users interact with—so organizations can stay compliant, reduce exposure, and safeguard critical information wherever it lives and however it travels.
- Cyberminds Research InstituteBooth: TBD
CyberMinds Research Institute is a non-profit organization with an exceptionally talented staff of highly experienced Information Security, Cyber, and Privacy professional working with individuals and organizations to educate on cybersecurity best practices.
Our team is dedicated to enabling organizations to address their needs through strategic collaborations and cutting-edge research. Discover our innovative approach to information security and privacy protection.
- Cyversity South FloridaBooth: TBD
Cyversity South Florida is here! We are very much looking forward to engaging with you! We have lots of plans in-the-works, and hope you’ll join us in furthering our MISSION: “Achieving the consistent representation of women, underrepresented minorities, and all veterans in cybersecurity through programs designed to foster recruitment, inclusion and retention – one person at a time.”
- Harmonic SecurityBooth: TBD
Harmonic Security lets your teams adopt AI tools safely by protecting sensitive data in real time with minimal effort. It gives you full control and stops leaks so your teams can innovate confidently.
Recognized as an RSA Innovation Sandbox finalist in 2024, Harmonic Security redefines data protection for the GenAI era.
- InfraGard South Florida Members AllianceBooth: TBD
The mission of the InfraGard South Florida Members Alliance is to assist in protecting our region’s critical infrastructure from threats and attack, either physical or cyber. This mission is accomplished through the following:
- Secure facilitation of information sharing
- Collaboration with public/private industry professionals and government agencies at all levels (local, state, and federal)
- Training and education of our membership, and community outreach
- ISACA South FloridaBooth: TBD
Our Chapter was chartered as the 33rd chapter of the Information Systems Audit and Control Association® (ISACA®) on December 2nd, 1978. The South Florida chapter includes approximately 1,400 members in the South Florida region, which spans a large geographic territory, including Miami, Fort Lauderdale, West Palm Beach, Naples, Fort Myers, and Port St. Lucie.
Mission Statement: “To help South Florida realize the positive potential of technology.”
Vision Statement: “We are a diverse group of innovative thought leaders partnering with the community to serve as the first choice for professional development and a global role model for ISACA Chapters by 2024.”
- ISC2 South Florida ChapterBooth: TBD
We are the South Florida chapter of ISC2, a local non-for-profit association for information security leaders and practitioners.
Our chapter’s program is founded on the exchange of ideas and knowledge and focused on the development of leadership and professional skills aimed at advancing the profession of information security practitioners.
We invite all information technology and security professionals in our community to join our local chapter and make a positive impact in your community.
- IslandBooth: TBD
What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.
- NetskopeBooth: TBD
Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.
- Orca SecurityBooth: TBD
Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We’re the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.
- Seceon Inc.Booth: TBD
Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.
What Sets Seceon Apart:
- Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
- AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
- Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
- Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.
Why Organizations Choose Seceon:- Cut cybersecurity costs by 60% by replacing siloed tools
- Stop threats faster with AI-powered detection and automated response.
- Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.
Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.
- SemperisBooth: TBD
For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.
As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast and free identity security tools Purple Knight and Forest Druid.
- SentraBooth: TBD
Sentra’s multi-cloud data security platform, discovers, classifies, and prioritizes the most business-critical data security risks for organizations, enabling more effective, faster remediation and compliance adherence.
Specializing in Data Security Posture Management (DSPM), Sentra ensures that the correct security posture moves with sensitive cloud data.
By automatically detecting vulnerabilities, misconfigurations, over-permissions, unauthorized access, data duplication, and more – Sentra empowers data handlers to work freely and safely with public cloud data, while leveraging rich insights to drive business growth and innovation. - SnykBooth: TBD
Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.
- SoFloTechKidsBooth: TBD
At South Florida Tech Friends, our mission is to foster a vibrant community of technology professionals in the South Florida area. Through quarterly meet-ups, networking events, and knowledge-sharing sessions, we aim to facilitate meaningful connections, inspire collaboration, and advance the collective expertise of our members.
Our goal is to create an inclusive space that promotes learning, innovation, and professional growth within the dynamic landscape of technology. Together, we strive to cultivate a supportive environment where individuals can exchange ideas, explore emerging trends, and contribute to the evolution of technology in our region.
- South Florida ISSA ChapterBooth: TBD
The South Florida chapter of the Information System Security Association (ISSA) stands as a cornerstone within the global ISSA community, celebrated for its prominence and esteemed reputation.
Since its inception in 1998, the South Florida ISSA has consistently organized Security Conferences every two years. These events have featured keynote speeches from illustrious figures such as Orson Swindle, former head of the FTC, alongside other notable experts from leading corporations and academic institutions.
With a dynamic involvement in the InfoSec realm, South Florida ISSA engages a diverse audience ranging from managers to technical specialists, addressing a wide spectrum of InfoSec subjects. This engagement extends through their monthly meetings and various specialized events.
A highlight of our calendar is the Hack the Flag Challenge, which takes place annually in September. This event is acclaimed throughout Florida as a top-tier collaborative learning opportunity within the industry.
Furthermore, South Florida ISSA takes pride in being the professional sanctuary for numerous ISSA Senior Members, including the distinguished ISSA Fellow William A. Cellich, underscoring its significant contribution to the community and the field at large.
- Sublime SecurityBooth: TBD
Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.
- TeamOne.SupportBooth: TBD
TeamOne.Support, founded in 2022, blends technological innovation with a commitment to U.S. veterans, offering IT and cybersecurity training aimed at empowering and providing them with sustainable career paths in the tech industry. This initiative, driven by a deep sense of social responsibility, has evolved into a full-service IT provider with a focus on high-security standards and flexible veteran employment.
TeamOne.Support’s story is rooted in a unique confluence of technological expertise and a deep sense of social responsibility towards U.S. veterans. It began in 2022 with a commitment to provide veterans with IT and cybersecurity skills as a way to address veteran suicides. This project expanded rapidly, evolving from training programs into a full-fledged IT service provider by late 2023. As the organization grew, it maintained its focus on empowering veterans in the tech industry, ensuring high security standards in their services and creating flexible, meaningful job opportunities for veterans, reflecting a successful merger of professional skill development and impactful social contribution.
- TevoraBooth: TBD
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- TorqBooth: TBD
Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.
- WallarmBooth: TBD
Wallarm is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their APIs and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service. Customers can deploy Wallarm to protect legacy and brand new cloud-native APIs. Wallarm’s multi-cloud platform delivers capabilities to secure businesses against existing and emerging API threats.
- WiCyS Florida AffiliateBooth: TBD
- Zafran SecurityBooth: TBD
The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.
Rob Finch, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLCRob Finch is a Cyber Risk Analyst with Cyber Risk Opportunities (CRO). His job is to deliver the Managed Program, AI Risk Management Plans, other cyber risk services offered by CRO.
Rob enjoys creating tools that assist organizations in understanding and securely integrating AI tools into their operations. He focuses on developing practical, secure AI workflows that balance innovation with responsible risk management, helping teams use new technology effectively and safely.
Dr. Eric Cole, DPSCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Yuri SoldatenkovDirector of Cybersecurity, Kemper Development CompanyYuri is a cybersecurity leader with more than 20 years of experience in enterprise security strategy, risk management, and infrastructure resilience. As Director of Cybersecurity at Kemper Development Company, a Real Estate Development firm, he leads efforts to strengthen the organization's defenses and stay ahead of evolving threats. He has guided cloud security transformations, built enterprise security programs, and led organizational change across technology, manufacturing, logistics, and construction. He holds CISSP, CCSP, and three GIAC certifications, reflecting a deep commitment to continuous growth in the field.
Dr. Domingo Castillo, ModeratorCISO, Miami Dade CollegeDr. Castillo is the Chief Information Security Officer of the Miami Dade College (MDC) since 2020. Founded in 1959, MDC is the second-largest college or university in the United States, and it is the #1 in associated degrees awarded in Liberal Arts and Sciences, General Studies, and Humanities. Mr. Castillo’s prior roles include Chief Information Security Officer at the University of Arkansas (UofA), Fayetteville. The Carnegie Foundation classifies the University of Arkansas among only 3 percent of universities in America that have the highest level of research activity. Before joining UofA, Mr. Castillo was the Regional Information Security and Compliance Officer at Chubb where he was responsible for implementing and managing cost-effective solutions to successfully protect the information assets for the Company’s Latin America division.
In 2018, Mr. Castillo was awarded the (ISC)² Best Information Security Practitioner Award during the 2018 Information Security Leadership Awards (ISLA®) Americas ceremony at the eighth annual (ISC)² Security Congress in New Orleans, LA. The ISLA Awards Program celebrates the accomplishments of individuals in the private and public sectors throughout the Americas, outside of the U.S. federal government, who are inspiring change within the field of cybersecurity. (ISC)² is the world’s largest nonprofit association of certified cybersecurity professionals.
Mr. Castillo holds a Bachelor’s degree in computer science from APEC university. He holds a Master’s degree in Business Administration (MBA) from H. Wayne Huizenga School of Business, Nova Southeastern University. He also has a Master’s degree in Project Management (MPM) and a Master’s degree in Public Administration (MPA) from Keller Graduate School of Management, DeVry University. In addition, Mr. Castillo has a Juris Master's Cybersecurity and Privacy at Florida State University, and an Executive Doctorate of Business Administration Field of Study Information Security at St. Thomas University. Mr. Castillo holds several certifications, such as Certified Information System Security Professional (CISSP), Project Manager Professional (PMP), and CompTIA Security+.
Panel Discussion
Roberto GaldamezCISO, Kovack Financial NetworkRoberto Galdamez is a Chief Information Security Officer (CISO) and cybersecurity program builder known for transforming security operations in regulated and high-impact environments. He currently leads enterprise security strategy within financial services and has previously supported large-scale cybersecurity initiatives at the Miami Dolphins and VMware. Roberto specializes in building security programs from the ground up, modernizing detection and response, and aligning cyber risk with business outcomes. He holds a Master’s degree in Cybersecurity, multiple industry certifications, and is a frequent industry speaker and executive panelist.
Panel Discussion
Jim Doggett, ModeratorCISO, SemperisJames (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.
Panel Discussion
Supreet KaurDeputy CISO, OctusSupreet Kaur is an information security executive with 10+ years of experience across financial services, consulting, and fintech. She serves as Deputy CISO at Octus, where she joined as the company's first security hire and scaled the security program through three acquisitions as the company tripled in size. Her background includes roles at Blackstone and EY with deep expertise in M&A security integration, identity and access management, and enterprise risk.
Michelle Garcia, ModeratorBISO, Carnival Cruise LineMichelle Garcia is the Business Information Security Officer for Carnival Corporation, where she helps keep Carnival Cruise Line sailing smoothly through an ocean of cyber threats. With more than 20 years in IT security—and over 30 years of cruise industry know‑how—Michelle blends deep technical expertise with a true insider’s understanding of life at sea. Armed with a master’s degree in cybersecurity management and policy, she’s built her career around strengthening cyber resilience, championing smart risk management, and designing secure environments that can weather any storm. Before joining Carnival, Michelle held key leadership roles where she rolled out advanced security solutions and helped organizations level up their cyber defenses. At Carnival, she partners with security and business leaders to stay ahead of emerging threats and foster a proactive, collaborative security culture. She’s also a passionate advocate for diversity in tech and an active mentor to rising cybersecurity professionals—because she believes the industry is stronger when everyone has a seat at the table. When she’s not navigating the cyber seas, Michelle is usually exploring real ones. A lifelong traveler with a love for new destinations, she brings the same spirit of adventure to her work that fuels Carnival’s mission.
Panel Discussion
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.











