Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, May 20, 2026
    9:00 am
    [PLUS Course] Securing & Enabling AI: Transform Chaos into Competitive Advantage
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm
    Your CEO just asked about AI security.  Do you have a clear answer?
    While you’re counting vulnerabilities, your competitors are deploying AI at scale.
    While security teams are still cataloging vulnerabilities, business units are deploying AI at scale. Marketing is using generative AI for campaigns. Sales is rolling out AI SDRs. Customer service is automating with chatbots.
    Every Monday, another department launches an AI tool. Marketing uses ChatGPT for campaigns. Sales deploys AI Sales Development Reps. Customer service automates with chatbots.  And your cybersecurity team? Still writing policies nobody reads.
    In this interactive workshop, learn you how to secure AI while accelerating innovation—not blocking it. Transform from AI Firefighter to Strategic Business Enabler, with a 90-day roadmap for secure AI deployment in your organization.
    What You’ll Master
    • The AIR-MAP Methodology™ — Your proven 90-day roadmap from AI chaos to governance
    • Executive Translation — Turn technical AI risks into boardroom language
    • NIST AI RMF Implementation — Practical application, not theory
    • The $12M Question — Secure against deepfake fraud and AI-enabled attacks
    • Shadow AI Discovery — Find and govern the AI already in your organization
    • Business-First Security — Protect value, not just systems
    Who Should Attend
    Ideal for:
    • CISOs facing board questions about AI
    • Information Security Directors enabling digital transformation
    • IT VPs without dedicated security teams
    • Cybersecurity Consultants serving enterprise clients
    • Risk Managers governing AI initiatives
    • Aspiring decision makers and those reporting to one
    Not designed for:
    • Developers wanting to code AI models
    • Analysts seeking technical certifications
    • Anyone looking for hands-on hacking labs
    What This Workshop Is (and Isn’t)
    This workshop is NOT about:
    • Prompt injection techniques
    • Model architecture security
    • Technical vulnerability scanning
    • Writing 200-page policies
    This workshop IS about:
    • Speaking profit-and-loss to executives
    • Enabling your AI transformations
    • Building cybersecurity into AI from day one
    • Becoming the trusted AI advisor
    What You’ll Leave With
    1. The Complete AIR-MAP Toolkit
    • 90-day implementation roadmap
    • Discovery templates and workflows
    • Risk scoring calculators
    • Executive presentation templates
    2. Ready-to-Deploy Governance Assets
    • AI Acceptable Use Policy (customize in minutes)
    • Vendor assessment questionnaires
    • Incident Response playbooks
    3. A 30-Minute Strategy Session
    A complimentary private consultation to apply AIR-MAP directly to your organization’s AI strategy and risk posture.
  • Thursday, May 21, 2026
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    InfraGard South Florida Members Alliance Meeting
    • session level icon
    Open to all attendees
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Session details to come.

    8:00 am
    Guardians of the Digital Future: Human-Centric Security and AI in an Age of Automation
    • session level icon
    Focus Areas: AI and and Human-Centric Security
    speaker photo
    CEO & Executive Director, BlackGirlsHack; Director of Technology, Dallas Mavericks
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    As artificial intelligence rapidly transforms the digital landscape, the cybersecurity community faces a critical question: Are we automating ourselves out of existence, or reshaping our tools to amplify human resilience? This presentation merges an intersectional view of AI’s societal and environmental impacts with an Afrofuturist approach to modern cybersecurity.

    We challenge the traditional notion of users as the “weakest link,” instead reframing them as empowered guardians and heroic survivors navigating hostile digital environments. By exploring the disparate impacts of automation based on identity and access, we propose a paradigm where telemetry and AI act as amplifiers of human intuition and creativity, rather than replacements for human judgment. Attendees will leave with a new, narrative-driven framework that bridges ancient principles of trust with modern identity assurance and recovery practices, ensuring that our digital future is secure, environmentally responsible, and inclusive for all.

    8:30 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 4:45 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    9:00 am
    [Opening Keynote] The Future of IP in a Digital World: Redefining IP Risk & Opportunity in the Age of AI & Cyber
    • session level icon
    Focus Areas: AI Model Security; Intellectual Property; Cyber-Resilient Innovation & Governance; Algorithmic Theft; Data Poisoning Defense
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Intellectual property is no longer just a legal asset, it is a dynamic, digital target. In an era defined by artificial intelligence, autonomous systems, and persistent cyber threats, the traditional boundaries of IP protection are dissolving. Today’s adversaries don’t just steal information; they extract models, replicate innovation at scale, manipulate training data, and weaponize digital access to undermine competitive advantage.

    This keynote explores how AI and cyber capabilities are fundamentally reshaping intellectual property risk. From model inversion and prompt injection to algorithmic theft and data poisoning, the threat landscape is evolving faster than most organizations can measure it. At the same time, AI presents unprecedented opportunity, accelerating innovation, enhancing detection, and redefining how IP is created, protected, and monetized.

    Attendees will gain a forward-looking framework for understanding modern IP exposure, governance blind spots, and the strategic decisions leaders must make to protect competitive advantage in a world where digital replication is instant and global. The future of IP will not be defended solely in courtrooms, it will be secured through architecture, policy, and proactive cyber resilience.

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Networking Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    10:15 am
    Cyber Resilience by Design: What Hurricanes Teach About Timeless Security
    • session level icon
    Focus Areas: Cyber Resilience and Incident Response
    speaker photo
    Director of Cybersecurity, Kemper Development Company
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Extreme hurricanes have shown that structures built with intentional, resilient design can survive even the worst storms. The same principle applies to cybersecurity. By focusing on timeless security practices such as strong safeguards, rapid patching, zero trust, and tested response plans, organizations can withstand modern threats ranging from ransomware to AI-driven social engineering. The result is cyber resilience: the ability to anticipate, endure, and recover when the inevitable digital storm hits.

    10:15 am
    AI Is Breaking Data Security… and Fixing It: The New Reality of AI-Driven Risk and How to Stay Ahead
    • session level icon
    Focus Areas: Cybersecurity Readiness & ROI; Strategic Data Governance; Context-Aware AI Defense
    speaker photo
    Sr. Cybersecurity Solutions Engineer, Concentric AI
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    AI is rapidly becoming one of the biggest drivers of productivity and innovation in the enterprise—and one of the fastest-growing sources of data security risk. As copilots, assistants, and public AI tools become integrated into daily work, sensitive data is flowing into systems that most security teams can’t fully see, understand, or control. 

    The problem is that traditional data security controls were never built for this. In fact, many organizations were already struggling to operationalize data security before AI accelerated the challenge. The good news? AI isn’t just creating the problem—it’s also enabling a smarter, more effective way to solve it.

    In this session, attendees will learn:

    • Why AI has become one of the fastest-growing and least visible sources of enterprise risk 
    • How GenAI is creating new exposure points for sensitive data 
    • Why legacy data security tools have failed to keep up—and why AI is making those gaps harder to ignore 
    • How context-aware, AI-driven data security can deliver more accurate visibility, stronger controls, and real-time enforcement 
    • What organizations can do to enable AI innovation without expanding their risk surface 

    Attendees will leave with a clearer understanding of how AI is reshaping data security—and how they can use that same technology to gain control, minimize exposure, and support safer AI adoption across the business.

    10:15 am
    [Panel] Securing the Open Campus: Higher-Ed CISOs on AI, Identity, and Collaboration
    • session level icon
    Focus Areas: CISO Leadership; Artificial Intelligence; Identity & Access Management (IAM)
    speaker photo
    CTO & CISO, Broward College
    speaker photo
    CISO, Florida International University
    speaker photo
    CISO, Nova Southeastern University
    speaker photo
    Information Security Director, Palm Beach State College
    speaker photo
    CISO, Miami Dade College
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    Higher education institutions face distinct cybersecurity challenges—open environments, diverse user populations, and rapidly evolving technology adoption. In this panel, CISOs from colleges and universities across Florida come together to discuss how they are addressing today’s most pressing issues, including the use of AI in security programs, identity and access management at scale, data privacy obligations, and securing hybrid learning environments.

    Panelists will share practical governance models, collaboration strategies, and lessons learned from operating in highly decentralized institutions. This session offers attendees a candid, peer-level look at what’s working in higher-ed cybersecurity today—and where leaders are still adapting.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Networking Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    11:10 am
    From Zero to Defensible: A CISO Playbook for Building Cybersecurity Programs from Scratch
    • session level icon
    Focus Areas: Career Development; Security Awareness
    speaker photo
    CISO, Kovack Financial Network
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Building a cybersecurity program from scratch is one of the toughest challenges security leaders face—especially with limited budgets, small teams, and growing business risk. Drawing from real-world experience building multiple security programs, this session delivers a practical blueprint for establishing a defensible security posture. Attendees will learn how to prioritize controls, where AI adds real value (and where it introduces risk), and how to avoid common early-stage mistakes. This talk focuses on actionable strategies and proven lessons that can be immediately applied to new or evolving security programs.

    11:10 am
    Building a Timeless SOC with Cisco & Splunk
    • session level icon
    Focus Areas: Agentic AI; AI Governance; Secure SOC
    speaker photo
    Senior Solutions Architect, C1
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    In the ancient world, the strength of a city lay not just in its walls, but in the equanimity and readiness of its defenders. Today, the “walls” are fluid, and the defenders are facing a digital siege characterized by “data gravity” and a new workforce of autonomous AI agents.

    In this session, Senior Solutions Architect Lucas Persell explores how to bridge 10+ years of traditional infrastructure with the future of Agentic AI. We will dive into the Cisco + Splunk synergy, moving beyond simple log ingestion to a unified “Data Fabric” that powers proactive orchestration. Learn how to architect a SOC that remains timeless—balancing the human element of security with autonomous agents that detect, reason, and act at machine speed.

    11:10 am
    [Panel] Navigating the Evolving Digital Battlefield
    • session level icon
    Focus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party Risk
    speaker photo
    Field CISO, Sentra
    speaker photo
    VP of Strategic Accounts, Seceon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    As organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.

    Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] Governance at the Edge: Balancing GenAI Innovation with Enterprise Control
    • session level icon
    speaker photo
    Director, Solution Engineering, Island
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    CIOs face increasing pressure to deliver on the promise of generative AI while maintaining strong governance, visibility, and compliance. As browser-based AI tools proliferate across the workforce, the challenge has shifted from adoption to responsible enablement. Employees are integrating AI into workflows to achieve new efficiencies, but often through unapproved or unmanaged applications that expose the enterprise to data leakage and compliance risks.

    In this session, CIOs and IT decision-makers will learn how to strike the right balance between productivity and control. This session will explore the operational, security, and compliance implications of “Shadow AI,” reveal how sensitive data finds its way out of the enterprise and into unauthorized AI tools, and share strategies for establishing policies that unlock AI’s potential safely. Attendees will leave with a clear understanding of how to maintain governance and visibility while empowering their organizations to capture the full business value of AI.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Proactive by Design: Anticipating Threats Before They Strike
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Networking Hall

    The days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.

    1:15 pm
    The Phishing Techniques AI Makes Easy Are the Ones Humans Can't Catch
    • session level icon
    Focus Areas: AI; Security Awareness; Threat Intelligence
    speaker photo
    Sr. Information Security Engineer, H.I.G Capital
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    A live behavioral experiment reveals which phishing techniques fool humans when AI eliminates grammar errors as a detection signal. Data from 86 participants shows fluent-prose phishing has a 21% miss rate while traditional credential harvesting is caught 94% of the time. When phishing passes email authentication, detection drops by 11 percentage points. This session covers the methodology, findings, and practical recommendations for security teams rethinking awareness training and email defense in the AI era. Based on a published study protocol (Zenodo DOI: 10.5281/zenodo.19059296). Live Platform: research.scottaltiparmak.com

    1:15 pm
    The Self-Healing SOC: How AI Is Closing the Loop VM and CTEM Left Open
    • session level icon
    speaker photo
    VP, Cloud Security Manager, UnitedBank
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Vulnerability management taught us to find flaws. CTEM taught us which ones actually mattered. Neither has closed the gap that defenders feel every day, the distance between a finding and a fix. AI is now closing that gap from both sides of the fight. Anthropic’s Mythos Preview showed what AI-assisted discovery looks like at machine speed, and the same capabilities are reshaping remediation, validation, and governance on the defender side. This session walks through the three eras of the vulnerability lifecycle, where banks and other regulated industries are running into the limits of human speed remediation, and what it takes to govern a self-healing security program without losing the audit trail, the change control discipline, or the seat at the regulator’s table.

    1:15 pm
    [Panel] The Double-Edged Sword of AI in Cyber Defense
    • session level icon
    Focus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & Assurance
    speaker photo
    Sr. Director, Product Management, Dataminr
    speaker photo
    Community Evangelist, Harmonic Security
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    AI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.

    The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    What’s Keeping You Up at Night?
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    Head to the Networking Lounge to connect with peers and sponsors. This open-ended discussion theme invites you to share what’s top of mind in your role—whether it’s emerging threats, resource challenges, or the next big project on your plate. Compare perspectives, swap strategies, and see how others in the community are tackling the same late-night concerns.

    2:10 pm
    Managing for Value: A Cybersecurity Organizational Culture
    • session level icon
    speaker photo
    VP, Information Security, TelevisaUnivision
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    Session description to come.

    2:10 pm
    Critical Condition: The Health-ISAC Global Threat Report
    • session level icon
    Focus Areas: Healthcare Security; Cyber Threat Intelligence; Supply Chain Security; Patient Safety; Operational Resilience
    speaker photo
    Strategic Threat Analyst, Health-ISAC
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    Healthcare is no longer just a target for data theft; it is a battleground for patient safety and operational resilience. In this exclusive session, the Health-ISAC (Health Information Sharing and Analysis Center) unpacks their Annual Global Threat Report, revealing the most dangerous trends facing the sector today. From the evolution of extortion tactics and supply chain vulnerabilities to the weaponization of AI, we will dissect the adversaries’ new playbook. Join us to move beyond the headlines and get the vital intelligence needed to immunize your digital estate against the next generation of cyber threats.

    2:10 pm
    [Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern Enterprise
    • session level icon
    Focus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge Security
    speaker photo
    Solutions Engineer, Wallarm
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Modern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.

    Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Networking Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Ask Us Anything! A Live Conversation with Security Leaders
    • session level icon
    Focus Areas: Leadership, Decision Making, Communication
    speaker photo
    CISO, H.I.G Capital
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater

    In an industry defined by constant change, some challenges have proven remarkably persistent. New technologies emerge, threat actors adapt, and the latest “revolution” captures headlines—but many of the core issues security leaders face today are the same ones they’ve been navigating for years.

    This interactive closing keynote brings together a panel of experienced security leaders for a candid, audience-driven conversation about what hasn’t changed in cybersecurity. From managing risk and influencing the business to building trust, leading teams, and responding to inevitable incidents, the discussion will focus on the enduring lessons that remain relevant—regardless of the tools, platforms, or trends of the moment.

    Attendees are encouraged to shape the conversation by asking live questions, sharing reflections, and sharing real-world scenarios. Whether the topic is AI, cloud, ransomware, or the next unknown disruption, this session offers perspective grounded in experience—and a reminder that while technology evolves, the fundamentals of security leadership remain surprisingly constant.

    Join us for an honest conversation, shared learning, and a thoughtful end to the day before we continue the discussion at happy hour.

    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Networking Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • BlackGirlsHack
    Booth: TBD

    We are a training-focused nonprofit organizations that was created to help increase diversity in cybersecurity by helping to bridge the gap between what is taught in educational institutions and what is necessary for careers in cybersecurity. We are one of the leading organizations in this space and set the standards for increasing diversity in technology and cybersecurity.

    The mission of BlackGirlsHack Foundation is to increase representation and empower Black girls and women in the field of information security and cyber security through skills training, mentoring, resume review, and access to low-cost resources in an inclusive environment.

    BlackGirlsHack is open to all!

  • BlinkOps
    Booth: 340

    Automate all things security in the Blink of AI.

    BlinkOps is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless.

    Whether you prefer code, low-code, or no-code, BlinkOps has you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt.

    Use BlinkOps as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.

  • Breeze Security
    Booth: 355

    The Breeze Platform preemptively identifies gaps across your entire stack, eliminating blind spots, misconfigurations, and weak links before they become breaches. Our AI agents analyze full attack path context, perform remediations, and generate real-time detections, so security teams fix what matters most, fast.

  • BTI – Cybersecurity, Data & AI Governance Experts
    Booth: TBD

    BTI is a leading cybersecurity consulting firm with over 20 years of experience, including 17 years as an IBM Business Partner. As an IBM Gold Partner, we serve clients across the Southeast U.S., the Caribbean, and Latin America, delivering best-in-class security, data, and AI-driven solutions across industries.

    With deep expertise in the IBM Security and Data portfolios, BTI helps organizations not only protect sensitive data and meet compliance requirements but also govern and secure AI initiatives with confidence. Our approach integrates cybersecurity, data protection, and AI governance to ensure visibility, control, and responsible innovation in today’s rapidly evolving landscape.

    Backed by more than 15 years of hands-on experience implementing IBM solutions, BTI consistently delivers measurable outcomes, helping clients reduce risk, strengthen resilience, and unlock the value of their data and AI investments.

    Visit our booth to connect with our experts and explore how to securely advance your data and AI strategy.

  • ConvergeOne
    Booth: 205

    C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Canary Trap
    Booth: 140

    Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.

    Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.

  • Concentric AI
    Booth: 210

    Concentric AI is intelligent data security made easy. Its Semantic Intelligence™ platform uses context-aware AI to discover sensitive data, monitor risks, automate remediation, simplify compliance, and accelerate investigations. It delivers smart, targeted protection by understanding how data is used, shared, and exposed. Concentric AI also offers managed services to keep security programs lean, scalable, and effective. This end-to-end platform protects data at rest, data in motion, and all the GenAI tools users interact with—so organizations can stay compliant, reduce exposure, and safeguard critical information wherever it lives and however it travels.

  • Cribl
    Booth: 110

    Cribl makes open observability a reality for today’s tech professionals. The Cribl product suite defies data gravity with radical levels of choice and control. Wherever the data comes from, wherever it needs to go, Cribl delivers the freedom and flexibility to make choices, not compromises. It’s enterprise software that doesn’t suck, enables techprofessionals to do what they need to do, and gives them the ability to say “Yes.” With Cribl, companies have the power to control their data, get more out of existing investments, and shape the observability future.

    Founded in 2018, Cribl is a remote-first company with an office in San Francisco, CA. For more information, visit www.cribl.io or our LinkedIn, Twitter, or Slack community.

  • Cyberminds Research Institute
    Booth: TBD

    CyberMinds Research Institute is a non-profit organization with an exceptionally talented staff of highly experienced Information Security, Cyber, and Privacy professional working with individuals and organizations to educate on cybersecurity best practices.

    Our team is dedicated to enabling organizations to address their needs through strategic collaborations and cutting-edge research. Discover our innovative approach to information security and privacy protection.

  • Cyversity South Florida
    Booth: TBD

    Cyversity South Florida is here! We are very much looking forward to engaging with you! We have lots of plans in-the-works, and hope you’ll join us in furthering our MISSION: “Achieving the consistent representation of women, underrepresented minorities, and all veterans in cybersecurity through programs designed to foster recruitment, inclusion and retention – one person at a time.”

  • Dataminr
    Booth: 360

    Dataminr has created a revolutionary AI platform for discovering real-time events, risks, and threats in public data, providing global organizations and corporations with critical and actionable information. Its pioneering multi-modal fusion AI pulls from more than one million unique public data sources to synthesize terabytes of data spanning text, image, video, audio, and sensor signals for accurate, real-time event detection across 150+ languages and 220+ countries and territories. Dataminr pushes the boundaries of real-time information with ReGenAI—an innovation that combines Predictive AI and Generative AI to describe breaking events and provide dynamic re-generating updates to events as they unfold. Powered by more than 50 proprietary large-language models, Dataminr delivers the earliest actionable information to enhance the security and resilience of organizations, infrastructure, and people.

    Dataminr is making its mark for growth and innovation, earning multi-year recognition on the Deloitte Technology Fast 500, Forbes AI 50, Forbes Cloud 100, and Built In Best Places to Work lists.

  • NecessityWorks
    Booth: 350

    NecessityWorks provides comprehensive cyber security services and solutions to protect clients’ networks and endpoints.

  • Harmonic Security
    Booth: 310

    Harmonic Security lets your teams adopt AI tools safely by protecting sensitive data in real time with minimal effort. It gives you full control and stops leaks so your teams can innovate confidently.

    Recognized as an RSA Innovation Sandbox finalist in 2024, Harmonic Security redefines data protection for the GenAI era.

  • Health-ISAC
    Booth: TBD

    Health-ISAC (Health Information Sharing and Analysis Center) plays an essential role providing situational awareness around cyber and physical security threats to the Health Sector so that companies can detect, mitigate, and respond to ensure operational resilience.

    The non-profit, private sector organization connects thousands of health security professionals globally to share peer insights, real-time alerts, and best practices in a trusted, collaborative environment.

    As the go-to source for timely, actionable, and relevant information, Health-ISAC is a force-multiplier that enables global health organizations of all sizes to enhance situation awareness, develop effective mitigation strategies, and proactively defend against threats every single day.

  • InfraGard South Florida Members Alliance
    Booth: TBD

    The mission of the InfraGard South Florida Members Alliance is to assist in protecting our region’s critical infrastructure from threats and attack, either physical or cyber. This mission is accomplished through the following:

    • Secure facilitation of information sharing
    • Collaboration with public/private industry professionals and government agencies at all levels (local, state, and federal)
    • Training and education of our membership, and community outreach
  • ISACA South Florida
    Booth: TBD

    Our Chapter was chartered as the 33rd chapter of the Information Systems Audit and Control Association® (ISACA®) on December 2nd, 1978. The South Florida chapter includes approximately 1,400 members in the South Florida region, which spans a large geographic territory, including Miami, Fort Lauderdale, West Palm Beach, Naples, Fort Myers, and Port St. Lucie.

    Mission Statement: “To help South Florida realize the positive potential of technology.”

    Vision Statement: “We are a diverse group of innovative thought leaders partnering with the community to serve as the first choice for professional development and a global role model for ISACA Chapters by 2024.”

  • ISC2 South Florida Chapter
    Booth: TBD

    We are the South Florida chapter of ISC2, a local non-for-profit association for information security leaders and practitioners.

    Our chapter’s program is founded on the exchange of ideas and knowledge and focused on the development of leadership and professional skills aimed at advancing the profession of information security practitioners.

    We invite all information technology and security professionals in our community to join our local chapter and make a positive impact in your community.

  • Island
    Booth: 180

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • Joon
    Booth: TBD

    Security Operations. Continuous by Design.
    Transform security operations into a self-improving defense system that prepares, validates, detects, and responds at AI scale—uninterrupted.

  • Netskope
    Booth: 150

    Netskope is a leader in modern security, networking, and analytics for the cloud and AI era. The unique architecture of its Netskope One platform enables real-time, context-based security for people, devices, and data wherever they go, and optimizes network performance—without trade-offs or sacrifices. Thousands of customers and partners trust the Netskope One platform, its patented Zero Trust Engine, and its powerful NewEdge Network to reduce risk, simplify converged infrastructure, and provide full visibility and control over cloud, AI, SaaS, web, and private application activity.

  • Orca Security
    Booth: 230

    Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We’re the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.

  • Seceon Inc.
    Booth: 330

    Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.

    What Sets Seceon Apart:

    • Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
    • AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
    • Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
    • Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.


    Why Organizations Choose Seceon:

    • Cut cybersecurity costs by 60% by replacing siloed tools
    • Stop threats faster with AI-powered detection and automated response.
    • Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.

    Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.

  • Semperis
    Booth: 200

    For security teams charged with defending hybrid and multi-cloud environments, Semperis ensures the integrity and availability of critical enterprise directory services at every step in the cyber kill chain and cuts recovery time by 90%. Purpose-built for securing hybrid Active Directory environments, Semperis’ patented technology protects more than 50 million identities from cyberattacks, data breaches, and operational errors. The world’s leading organizations trust Semperis to spot directory vulnerabilities, intercept cyberattacks in progress, and quickly recover from ransomware and other data integrity emergencies.

    As part of its mission is to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) ConferenceHIP Podcast and free identity security tools Purple Knight and Forest Druid.

  • Sentra
    Booth: 170

    Sentra’s multi-cloud data security platform, discovers, classifies, and prioritizes the most business-critical data security risks for organizations, enabling more effective, faster remediation and compliance adherence.

    Specializing in Data Security Posture Management (DSPM), Sentra ensures that the correct security posture moves with sensitive cloud data.
    By automatically detecting vulnerabilities, misconfigurations, over-permissions, unauthorized access, data duplication, and more – Sentra empowers data handlers to work freely and safely with public cloud data, while leveraging rich insights to drive business growth and innovation.

  • Snyk
    Booth: 245

    Snyk is a developer-first security company that helps organizations use open source and stay secure. Snyk is the only solution that seamlessly and proactively finds and fixes vulnerabilities and license violations in open source dependencies and container images. Founded in 2015, Snyk is based in London, England.

  • SoFloTechKids
    Booth: TBD

    At South Florida Tech Friends, our mission is to foster a vibrant community of technology professionals in the South Florida area. Through quarterly meet-ups, networking events, and knowledge-sharing sessions, we aim to facilitate meaningful connections, inspire collaboration, and advance the collective expertise of our members.

    Our goal is to create an inclusive space that promotes learning, innovation, and professional growth within the dynamic landscape of technology. Together, we strive to cultivate a supportive environment where individuals can exchange ideas, explore emerging trends, and contribute to the evolution of technology in our region.

  • South Florida ISSA Chapter
    Booth: TBD

    The South Florida chapter of the Information System Security Association (ISSA) stands as a cornerstone within the global ISSA community, celebrated for its prominence and esteemed reputation.

    Since its inception in 1998, the South Florida ISSA has consistently organized Security Conferences every two years. These events have featured keynote speeches from illustrious figures such as Orson Swindle, former head of the FTC, alongside other notable experts from leading corporations and academic institutions.

    With a dynamic involvement in the InfoSec realm, South Florida ISSA engages a diverse audience ranging from managers to technical specialists, addressing a wide spectrum of InfoSec subjects. This engagement extends through their monthly meetings and various specialized events.

    A highlight of our calendar is the Hack the Flag Challenge, which takes place annually in September. This event is acclaimed throughout Florida as a top-tier collaborative learning opportunity within the industry.

    Furthermore, South Florida ISSA takes pride in being the professional sanctuary for numerous ISSA Senior Members, including the distinguished ISSA Fellow William A. Cellich, underscoring its significant contribution to the community and the field at large.

  • Splunk, a Cisco Company
    Booth: 400

    Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.

  • Sublime Security
    Booth: 100

    Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.

  • Tevora
    Booth: 240

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • ThreatLocker
    Booth: 120

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Torq
    Booth: 160

    Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.

  • Veracode
    Booth: 390

    Veracode is intelligent software security. ​The Veracode Software Security Platform continuously finds flaws and vulnerabilities at every stage of the modern software development lifecycle.​ Using powerful AI trained on a carefully curated, trusted dataset from experience analyzing trillions of lines of code, Veracode customers fix flaws faster with high accuracy. ​ Trusted by security teams, developers, and business leaders from thousands of the world’s leading organizations, Veracode is the pioneer, continuing to redefine what intelligent software security means.

  • Wallarm
    Booth: 220

    Wallarm is the fastest, easiest, and most effective way to stop API attacks. Customers choose Wallarm to protect their APIs and AI agents because the platform delivers a complete inventory of APIs, patented AI/ML-based abuse detection, real-time blocking, and an API SOC-as-a-service. Customers can deploy Wallarm to protect legacy and brand new cloud-native APIs. Wallarm’s multi-cloud platform delivers capabilities to secure businesses against existing and emerging API threats.

  • WiCyS Florida Affiliate
    Booth: TBD
  • Zafran Security
    Booth: 320

    The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Rob Finch is a Cyber Risk Analyst with Cyber Risk Opportunities (CRO). His job is to deliver the Managed Program, AI Risk Management Plans, other cyber risk services offered by CRO.

    Rob enjoys creating tools that assist organizations in understanding and securely integrating AI tools into their operations. He focuses on developing practical, secure AI workflows that balance innovation with responsible risk management, helping teams use new technology effectively and safely.

  • speaker photo
    Rebekah Skeete
    CEO & Executive Director, BlackGirlsHack; Director of Technology, Dallas Mavericks

    Rebekah Skeete is a cybersecurity leader, nonprofit executive, and passionate advocate for accessibility and diversity in technology. As CEO and Executive Director of BlackGirlsHack, she empowers underrepresented communities through mentorship, education, and career development in cybersecurity. Recognized with the 2025 empowHERaccess Global Prestige Award for Community Leadership and named to the 2024 Dallas Business Journal 40 Under 40, Rebekah is celebrated for her innovation, leadership, and lasting impact on the industry. She has also served as a Senior Security Engineer, designing and managing secure infrastructures to protect critical systems. Holding certifications including GIAC Strategic Planning, Policy, and Leadership (GSTRT), and completing programs like the Women’s Entrepreneurship program at eCornell, Rebekah brings both technical expertise and strategic vision to her work. Beyond her professional achievements, she is a podcaster, speaker, and voice-over artist, inspiring the next generation of cybersecurity professionals to break barriers and thrive.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Yuri Soldatenkov
    Director of Cybersecurity, Kemper Development Company

    Yuri is a cybersecurity leader with more than 20 years of experience in enterprise security strategy, risk management, and infrastructure resilience. As Director of Cybersecurity at Kemper Development Company, a Real Estate Development firm, he leads efforts to strengthen the organization's defenses and stay ahead of evolving threats. He has guided cloud security transformations, built enterprise security programs, and led organizational change across technology, manufacturing, logistics, and construction. He holds CISSP, CCSP, and three GIAC certifications, reflecting a deep commitment to continuous growth in the field.

  • speaker photo
    Roger Reid
    Sr. Cybersecurity Solutions Engineer, Concentric AI

    Roger is a senior cybersecurity solutions engineer and AI security leader with deep expertise in technical product strategy and large‑scale program execution. Roger drives enterprise-wide initiatives that strengthen AI security, compliance, and governance while aligning product and solution portfolios to strategic business objectives. His leadership focuses on enabling secure, responsible, and scalable AI adoption across complex global environments.

  • speaker photo
    Brian Harrison, M.S.
    CTO & CISO, Broward College

    Brian Harrison is a seasoned IT veteran with over 35 years of technology leadership experience across South Florida. As Chief Technology Officer at Broward College, he oversees IT services and cybersecurity.
    A strong advocate of the philosophy “no time for down time”, Harrison’s focuses on operational resilience, cyber risk reduction, availability and service excellence. He has led multiple large-scale data center consolidations, cloud migrations and security architecture initiatives, delivering measurable improvements in security posture, operational efficiency and cost optimization.

    Harrison holds a Master of Computer Science from Nova Southeastern University and a Bachelor of Computer Science from the City University of New York.

  • speaker photo
    Helvetiella Longoria
    CISO, Florida International University

    Helvetiella has more than 20 years of experience in information and network security. During her tenure, she has played a critical role in the development and enhancement of FIU’s network, rolled out Two-Factor Authentication to more than 80,000 users, deployed a new cybersecurity awareness training program and a vulnerability management program.

    In 2014, Helvetiella received the prestigious Cybersecurity Leadership and Innovation Award in the Education Category by the Center for Digital Government, awarded to those in state and local government and education who have driven forward cybersecurity efforts in their communities. Currently, she is on the Organizing Committee for the annual National Initiative for Cybersecurity Education Conference and Expo, led by the National Institute of Standards and Technology.

  • speaker photo
    Frank Martinez
    CISO, Nova Southeastern University
  • speaker photo
    Mike Roytshteyn
    Information Security Director, Palm Beach State College

    Michail Roytshteyn is the Director of Information Security at Palm Beach State College in Lake Worth, FL. He is a Compliance and Risk Management Professional with a solid technical background and a highly analytical mind. He has been involved in the Information Technology field for more than 15 years, of which the last 10 years were in a professional occupation, with a specific focus on Security over the last seven years.

    Michail primarily serves as the linchpin between business and technical teams, leveraging his deep technical knowledge and strategic and tactical insights to anticipate multiple steps ahead, assess consequences, and ultimately deliver the best solution that combines key elements from the fields of information security, compliance, and IT risk management.

    Working in the Palm Beach State College Information Security Office since 2016, he has specialized in cybersecurity and used a wide range of industry-standard tools to mitigate threats and maintain compliance. Prior to his role in Information Security, Michail held various roles in Information Technology at Palm Beach State College, which gave him a range of perspectives on the IT landscape.

  • speaker photo
    Dr. Domingo Castillo, Moderator
    CISO, Miami Dade College

    Dr. Castillo is the Chief Information Security Officer of the Miami Dade College (MDC) since 2020. Founded in 1959, MDC is the second-largest college or university in the United States, and it is the #1 in associated degrees awarded in Liberal Arts and Sciences, General Studies, and Humanities. Mr. Castillo’s prior roles include Chief Information Security Officer at the University of Arkansas (UofA), Fayetteville. The Carnegie Foundation classifies the University of Arkansas among only 3 percent of universities in America that have the highest level of research activity. Before joining UofA, Mr. Castillo was the Regional Information Security and Compliance Officer at Chubb where he was responsible for implementing and managing cost-effective solutions to successfully protect the information assets for the Company’s Latin America division.

    In 2018, Mr. Castillo was awarded the (ISC)² Best Information Security Practitioner Award during the 2018 Information Security Leadership Awards (ISLA®) Americas ceremony at the eighth annual (ISC)² Security Congress in New Orleans, LA. The ISLA Awards Program celebrates the accomplishments of individuals in the private and public sectors throughout the Americas, outside of the U.S. federal government, who are inspiring change within the field of cybersecurity. (ISC)² is the world’s largest nonprofit association of certified cybersecurity professionals.

    Mr. Castillo holds a Bachelor’s degree in computer science from APEC university. He holds a Master’s degree in Business Administration (MBA) from H. Wayne Huizenga School of Business, Nova  Southeastern University. He also has a Master’s degree in Project Management (MPM) and a Master’s degree in Public Administration (MPA) from Keller Graduate School of Management, DeVry University. In addition, Mr. Castillo has a Juris Master's Cybersecurity and Privacy at Florida State University, and an Executive Doctorate of Business Administration Field of Study Information Security at St. Thomas University. Mr. Castillo holds several certifications, such as Certified Information System Security Professional (CISSP), Project Manager Professional (PMP), and CompTIA Security+.

  • speaker photo
    Roberto Galdamez
    CISO, Kovack Financial Network

    Roberto Galdamez is a Chief Information Security Officer (CISO) and cybersecurity program builder known for transforming security operations in regulated and high-impact environments. He currently leads enterprise security strategy within financial services and has previously supported large-scale cybersecurity initiatives at the Miami Dolphins and VMware. Roberto specializes in building security programs from the ground up, modernizing detection and response, and aligning cyber risk with business outcomes. He holds a Master’s degree in Cybersecurity, multiple industry certifications, and is a frequent industry speaker and executive panelist.

  • speaker photo
    Lucas Persell
    Senior Solutions Architect, C1

    Lucas brings over a decade of cybersecurity expertise to the C1 team, specializing in creating outcome-based security roadmaps for complex enterprise environments. With a background spanning systems engineering at Cisco and cloud architecture, he excels at bridging the gap between technical defense and business risk. Lucas is dedicated to helping clients navigate the evolving threat landscape through strategic design, zero-trust frameworks, and a relentless focus on long-term security resilience.

  • speaker photo
    Ward Balcerzak
    Field CISO, Sentra

    Ward Balcerzak is the Field Chief Information Security Officer at Sentra, where he helps global enterprises strengthen their data-security strategies across cloud, SaaS, and AI-driven environments. He brings nearly two decades of experience leading data-protection, insider-risk, and cybersecurity programs in highly regulated industries, with previous leadership roles at Fidelity National Financial, Accenture Security, and Allstate.

    Ward is known for translating complex business challenges into practical security architectures, emphasizing visibility, measurable risk reduction, and strong cultural alignment. His background spans defense, financial services, consulting, and emerging security technologies, supported by advanced degrees in information assurance and certifications including CISSP, GCIH, and GLEG.

    In addition to his work with Sentra, Ward hosts Guardians of the Data, a podcast focused on modern data-security challenges, leadership, and the evolving intersection of AI and cybersecurity. He is a frequent speaker and advisor on data security, insider risk, and building enterprise-ready security programs.

  • speaker photo
    Chris Bell
    VP of Strategic Accounts, Seceon

    IT and managed security sales specialist with over fifteen years of experience. Proficient at gathering business requirements, analyzing business needs, and presenting technology strategies and solutions that align with business objectives. My main goal is to help the enterprise increase user productivity, decrease risk and control costs.

    Specialties: Cybersecurity, EDR, MDR and XDR services, Managed aiSIEM, Penetration Testing & Vulnerability Assessment, Managed IT Services, Virtualization, Data Storage and Protection, Data Center Solutions, Disaster Recovery Expertise and Network Infrastructure Solutions.

  • speaker photo
    Panel Discussion
  • speaker photo
    Matt Pour
    Director, Solution Engineering, Island

    Matthew Pour is a seasoned leader in Information Technology and Information Security, currently leading Island's North America Solutions Engineers. With decades of experience, he has successfully established ITIL practices and InfoSec programs for Fortune 500 companies and engineered solutions for complex business challenges at leading technology and cybersecurity firms. Previously, Matthew served as a Field CTO at Broadcom and held key technical leadership roles at Symantec, Blue Coat, and IBM, consistently demonstrating his strategic vision and expertise in navigating the evolving landscape of information security.

  • speaker photo
    Jim Doggett, Moderator
    CISO, Semperis

    James (Jim) is a veteran in the information security and risk space. He previously served as partner at Ernst & Young, where he helped build the company’s cybersecurity practice during his 27-year tenure. Most recently, Jim worked as CISO and head of US operations at Panaseer. He has also held positions as CTRO at AIG, CSO and CTRO at Kaiser Permanente, and managing director at JP Morgan Chase, where he was global leader of Information Risk and Resiliency, Treasury and Security Services.

  • speaker photo
    Scott Altiparmak
    Sr. Information Security Engineer, H.I.G Capital

    Scott Altiparmak is a Senior Information Security Engineer at H.I.G. Capital, a $66B+ global alternative investment firm, where he focuses on identity security, security automation, and security operations. He holds a CISSP (ISC2), CompTIA Security+, and Microsoft SC-200, with 8+ years of experience across financial services, legal, and education. He created Threat Terminal, a game-based AI phishing detection research platform published on Zenodo, and Enterprise-Zapp, an open-source Entra ID audit tool. He serves as Director of Programming for the South Florida ISSA Chapter.

  • speaker photo
    Dr. Andy Santana
    VP, Cloud Security Manager, UnitedBank

    Dr. Andy Santana, CISSP is VP, Cloud Security Manager at BankUnited, where he leads security engineering, architecture, and First Line IT risk management across cloud, application, and data protection programs aligned to NIST and SOX. He is also an Adjunct Professor at Florida Atlantic University, teaching graduate level cybersecurity and IT governance, and holds a PhD in Cybersecurity Management along with multiple cybersecurity certifications. He speaks regularly on building secure, resilient programs in regulated environments.

  • speaker photo
    Joe Miller
    Sr. Director, Product Management, Dataminr
  • speaker photo
    Mariana Padilla
    Community Evangelist, Harmonic Security

    Mariana Padilla is the Community Evangelist at Harmonic Security and the former CEO and founder of HACKERverse. A seasoned entrepreneur and community builder, she created HACKERverse after growing frustrated with impersonal, transactional B2B buying experiences. Mariana believes human connection is the missing ingredient in B2B and that the companies who build genuine community and trust will be the ones that dominate their markets. She speaks on AI security, community-led growth, personal branding, and professional networking, and is deeply committed to increasing diversity, equity, and inclusion in cybersecurity.

  • speaker photo
    Torq Representative
  • speaker photo
    Dr. Emilio Del Riego
    VP, Information Security, TelevisaUnivision
  • speaker photo
    Ethan Muntz
    Strategic Threat Analyst, Health-ISAC

    Ethan Muntz is a Strategic Threat Analyst at Health-ISAC, where he specializes in identifying emerging threats to the global health sector and developing proactive risk mitigation strategies. With a strong background in Open Source Intelligence (OSINT) and dark web investigations, Ethan previously served as a task force member for the Anti-Human Trafficking Intelligence Initiative and led cybercrime operations at the Center for International Cyber Intelligence.

    He holds a Master of Science in Cyber Security and Privacy from the University of Central Florida and a B.S. in Global Security and Intelligence Studies. His expertise spans machine learning, incident handling, and geopolitical analysis, supported by his specialization in Chinese and Asian studies.

  • speaker photo
    Johanns Quiroz
    Solutions Engineer, Wallarm

    Johanns Quiroz is a seasoned cybersecurity and technology professional with over two decades of experience helping organizations design, secure, and scale modern digital environments. Currently serving as a Sr. Sales Engineer at Wallarm, Johanns supports customers across the Southeast U.S., LATAM, and Caribbean, where he focuses on application and API security, pre-sales strategy, and partner enablement. Prior to Wallarm, he held senior technical sales and engineering roles at Horizon3.ai, where he specialized in offensive security and helping organizations proactively identify and mitigate risk. Johanns also brings deep expertise in enterprise infrastructure, having spent over 20 years as a solutions architect designing complex environments across storage, virtualization, and cloud technologies. Known for his consultative approach and ability to bridge business and technical stakeholders, Johanns is passionate about helping organizations stay ahead of evolving cyber threats while enabling innovation and growth.

  • speaker photo
    Panel Discussion
  • speaker photo
    Marcos Marrero
    CISO, H.I.G Capital
  • speaker photo
    Panel Discussion
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.