- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, August 3, 20228:30 amExhibitor Hall openRegistration Level:
- Open Sessions
8:30 am - 3:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:00 am[Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret ServiceFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:- Open Sessions
9:00 am - 9:45 am9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:00 amLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:00 amEffective Leadership: It's All About CommunicationCybersecurity Director, Gannett FlemingRegistration Level:- Open Sessions
10:00 am - 10:30 am10:00 amRansomware: #1 with a BulletCyber Security Advisor & Georgia State Coordinator, DHS CISARegistration Level:- Open Sessions
10:00 am - 10:30 amAll cyberattacks are evolving, and attacks are getting more and more adaptive and cunning. Recently, ransomware has dominated the headlines, and incidents among the nation’s state, local, tribal, territorial (SLTT) government entities, as well as critical infrastructure organizations, have been growing for years. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. Malicious actors continue to adapt their ransomware tactics over time, and in recent months “ransomware” attacks have outpaced so much so that they’re the #1 cyberattack in 2022 and continue to gain traction.
But don’t fret, there is hope! Come join us on a walkthrough of known countermeasures against ransomware attacks and many other attacks that could be a game changer in your security strategy: Proactivity, Awareness, Preparedness, and Resilience.
10:00 amNever Trust. Always Verify.Global Security Strategist, Check Point Software TechnologiesRegistration Level:- Open Sessions
10:00 am - 10:30 amHumans are inherently both trusting and distrusting, without even knowing it! We pick up on innumerable subtle micro expressions and nuances of our environment, instantly spotting what’s out of place. Without a second thought, our computer brains process and alert us to “things out of place” and focus our attention, silencing distractions so we can verify trust.
In this session, Eddie Doyle will demonstrate that when we design systems after our neuro-biology, we can focus our networks to eliminate threats in much the same manner as our natural born instincts.
10:30 amNetworking BreakRegistration Level:- Open Sessions
10:30 am - 10:45 amVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:45 am[PANEL] Advice from the Field: The Future of InfoSec WorkCISO, Georgia Department of Banking and FinanceSr. Director, Information Protection Assurance, CignaWiCys Kansas City Metroplex, PresidentContent Strategist, SecureWorldRegistration Level:- Open Sessions
10:45 am - 11:15 amJoin us for an interactive panel composed of female pioneers in the cybersecurity space where they’ll discuss the current climate and culture in cybersecurity. They will share their personal experiences being a woman in STEM, advice for charting your own career path, and the future of work for the InfoSec industry. This panel discuss will allow for open online Q&A discussion.
10:45 amPAM Back to BasicsChief Security Scientist & Advisory CISO, DelineaRegistration Level:- Open Sessions
10:45 am - 11:15 amWith so many high-profile breaches accomplished through compromising passwords on privileged accounts, PAM is a top priority for organizations of all sizes. Join Delinea’s Chief Security Scientist Joseph Carson, as he takes you on a brief journey through the PAM lifecycle to get you quickly up to speed and understand the PAM matrix of all the different types of privileged accounts that exist across all your different IT domains, often referred to as your privileged account attack surface.
11:15 amNetworking BreakRegistration Level:- Open Sessions
11:15 am - 11:30 amVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:30 am[Lunch Keynote] Modern Threat Detection, Investigation, and Response with Google Cloud's SecOps SuiteEngineer, Google Cloud SecurityRegistration Level:- Open Sessions
11:30 am - 12:00 pmTo stay secure in today’s growing threat landscape, organizations must uncover and remediate cyber threats at unprecedented speed and scale. This demonstration will showcase how Google Cloud’s Chronicle, Siemplify, and VirusTotal products are coming together to provide a holistic approach to modern threat detection, investigation, and response. Join us and discover how to:
- Uncover and analyze new and evolving threats at petabyte scale.
- Decrease alert fatigue and caseload by as much as 80% working threat-centric cases.
- Automate up to 98% of Tier 1 tasks with custom dynamic playbooks.
- Reduce mean time to detection (MTTD) and mean time to response (MTTR) with actionable threat intel and context-driven investigations.
- Hunt for new and advanced threats 90% faster than traditional SOC tools.
12:00 pmNetworking BreakRegistration Level:- Open Sessions
12:00 pm - 12:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:15 pm[Panel] Prioritizing the Current ThreatscapeSr. Director, Cybersecurity Strategy, OktaSales Engineering Manager, CISSP, C|EH, ProofpointSecurity Engineer, CybereasonRegistration Level:- Open Sessions
12:15 pm - 1:00 pmRansomware, business email compromise, cloud misconfigurations, social engineering, insider threats, third-party coding… the list goes on and on. The threats are everywhere. Some are new, but the old ones work just as well. How do you decide which threats are of the most concern to your organization? Do you report all of these to the Board? How do you provide the resources necessary to minimize the risks and still enable the business? Join our experts as they tackle how to identify and prioritize the current threats.
12:15 pmThe Inadvertent Remote Insider ThreatSr. Director, Cyber Security, Acumatica, Inc.Registration Level:- Open Sessions
12:15 pm - 1:00 pmThreat methods and controls utilized are very comprehensive and effective for those who are typically in the office, but what about the remote workforce of today? Their intent may not be malicious but rather inherent to poor practices.
This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and to help organizations identify existing critical controls needed to develop an Insider Threat Program using a white hat hacking methodology. Through live demonstrations, we will show simple techniques used to bypass various controls.
Objectives:
- Learn the methodologies utilized by individuals within the organization that would be defined as insider threat activity
- How to identify system based behavioral indicators
- Learn which existing or enhanced security layer can provide insider threat profile data
- Learn how areas of the organization, i.e. Legal, Procurement, and HR, are key stakeholders in assisting to identify insider threat activity
Key Takeaways:
- How to identify business processes which can contribute to remote work insider threats
- Enhance current security program on what controls are bypassed by utilizing routine IT procedures
- Enhance procedures required to identify insider threat exposures
- Enhance awareness training to include additional methods of insider threat
- Enhance existing physical and digital security layers to better identify specific insider threat activity
12:15 pmFive Things to Understand About Privacy Law Right NowCo-Founder & Managing Partner, XPAN Law PartnersRegistration Level:- Open Sessions
12:15 pm - 1:00 pmThis past year we have seen significant changes to privacy laws, states like California, Utah, Virginia, Colorado, and Connecticut have passed sweeping, and sometimes disparate, data privacy laws. In addition, privacy professionals are excited to see movement at the Federal level when the U.S. House of Representatives Subcommittee on Consumer Protection and Commerce passed by voice vote H.R. 8152, the American Data Privacy and Protection Act (“ADPPA”). And yet, privacy law is as misunderstood as the concept of privacy itself. Moreover, businesses face substantial challenges with legal compliance and individuals do not fully understand their rights.
This session will dispel myths and answer pressing questions about the concept of privacy itself. We will explore the changing domestic legal data privacy obligations and explain the similarities and differences businesses need to know. We will also provide a top 5 of things businesses need to understand about data privacy, what it is and how it applies to data they collect.
1:00 pmNetworking BreakRegistration Level:- Open Sessions
1:00 pm - 1:15 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmUkraine vs. Russia: The Cyber WarCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCRegistration Level:- Open Sessions
1:15 pm - 2:00 pm
- Check Point Software TechnologiesBooth:
Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.
- CybereasonBooth:
Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.
- DelineaBooth:
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
- Google CloudBooth:
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- ProofpointBooth:
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- OktaBooth:
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Tamika BassCybersecurity Director, Gannett Fleming
Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.
- Stanton GatewoodCyber Security Advisor & Georgia State Coordinator, DHS CISA
Stanton Gatewood is the US Department of Homeland Security /CISA - Region 4 Cyber Security Coordinator/Advisor - State of Georgia. Gatewood is the former Chief Information Security Officer (CISO) for the State of Georgia, Board of Regents of the University System of Georgia and the University of Georgia.
He has more than 35 years of cyber security/e-privacy experience in cyber security program management and strategic planning, executive leadership, including the U.S. federal, state, local, territorial, tribal governments, higher education, and several top-10 global corporations.
Gatewood is also a USAF veteran and has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University.
Stanton has built 2 centers of excellence, (1) cryptography and (2) cyber awareness & training.
- Eddie DoyleGlobal Security Strategist, Check Point Software Technologies
Eddie Doyle works with enterprise organizations, university think tanks and corporate leaders to articulate the complex subject of cyber security in an engaging manner, championing his customer’s initiatives to fruition and finding the holy grail of cyber security… making cyber a profit center for the business.
LinkedIn recognizes Eddie’s forté as a keynote speaker and livestreamer of cyber security strategy for the everyday user of technology. Leading Board discussions and attack/defense simulation, Eddie proudly works with executive on disaster recovery planning and holds a global revenue responsibility for a fortune 500 company.
- Felicia HedgebethCISO, Georgia Department of Banking and Finance
- Tammi LopezSr. Director, Information Protection Assurance, Cigna
- Dr. Cheryl Cooper, CISSPWiCys Kansas City Metroplex, President
Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solutions Engineer (CDPSE). Dr. Cooper is employed with T-Mobile Corporation as a Security Risk Manager. She has 20 years of telecommunications and Cyber security experience. She is also an adjunct professor teaching course curriculum under Cyber Security degree programs with the University of Wisconsin and University of New York. She sits on multiple cybersecurity boards and is an advocate for equal opportunity for women and minorities in STEM careers. She is passionate about helping others and has demonstrated this through her community works, as well as being the recipient of multiple awards for being a champion and a bridge builder.
- Moderator: Karly TarsiaContent Strategist, SecureWorld
Karly Tarsia is a Content Strategist at SecureWorld. Her focus is on bringing smart minds together to discuss challenges and insights the InfoSec community finds helpful and informative. Karly’s career began after she graduated from the University of Oregon in public relations where she worked with clients in technology, financial and consumer industries. When Karly is not writing for SecureWorld or connecting with speakers you can find her wearing her other hat as a wedding planner for couples in the PNW.
- Joseph CarsonChief Security Scientist & Advisory CISO, Delinea
Joseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical infrastructure, financial, and maritime industries.
- Severin SimkoEngineer, Google Cloud Security
Severin worked at Siemplify for nearly 3 years, 2.5 years of which were spent at TIP where he was team led for a team that was responsible for all integrations that Siemplify had. Nowadays he is focusing his work on Sales Engineering at Google Cloud Security and has been doing so for nearly half a year. Prior to that, Severin was working for a company in the Czech Republic where he designed, implemented and maintained SOCs mostly for customers from central Europe - banks and insurance companies.
- Marc RogersSr. Director, Cybersecurity Strategy, Okta
Marc Rogers is Senior Director of Cybersecurity Strategy at Okta. With a career that spans more than twenty years, he has been hacking since the 80’s and is now a white-hat hacker renowned for hacking technology like Apple's TouchID and the Tesla Model S. Prior to Okta, Marc served as the Head of Security for Cloudflare and spent a decade managing security for the UK operator, Vodafone. He's been a CISO in South Korea and has also co-founded the disruptive Bay Area security startup “Vectra”. In his role as technical advisor on “Mr. Robot,” he helped create hacks for the show. He's an organizer and the Head of Security for the world’s largest hacking conference: DEF CON. Recently Marc co-founded the CTI League, an award winning, multinational cybersecurity initiative that combines security industry professionals, government agencies and law enforcement from 80 different countries.
- Robert "Teall" RistSecurity Engineer, Cybereason
With over 34 years of industry experience, Robert “Teall” Rist has been immersed in all things security since originally beginning his career in law enforcement. In the 27 years since, he has joined multiple start ups and enterprise companies such as Verizon, CA Technologies, NetIQ, and IBM. While at IBM, Robert was a black-belt level subject matter expert on all things SIEM, IAM, and QRadar. Prior to joining Cybereason last September, Robert spent the previous 4 years working at Cyberproof on their Security Orchestration Automation and Response platform (SOAR).
- Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
- Rebecca RakoskiCo-Founder & Managing Partner, XPAN Law Partners
Rebecca L. Rakoski is the managing partner at XPAN Law Partners, LLC. Rebecca advises her clients on a proactive, multi jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She uses her extensive experience to work with her clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure.
Rebecca counsels and aggressively defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. As an experienced litigator, Rebecca has handled hundreds of matters in state and federal courts. Rebecca skillfully manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to minimize her client's litigation risks.
Rebecca regularly negotiates complex contractual provisions that are impacted by domestic and international data privacy regulations including the California Consumer Privacy Act of 2018, and the European Union's General Data Protection Regulation. She understands how the nature of the data can affect the role her client plays in the data transaction and uses that knowledge to mitigate corporate liability.
As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section.Rebecca has been appointed and served in multiple highly complex litigation matters by the New Jersey Superior Court as a Special Master in the areas of technology and eDiscovery. She also served on the Complex Business Litigation Committee that drafted and revised the New Jersey Court Rules involving electronic discovery. Rebecca was on the eDiscovery committee of her prior law firm and created its eDiscovery subgroup.
Rebecca is on the Board of Governors for Temple University Health Systems and is also the Acting Dean of Online Learning and an adjunct professor at Drexel University’s Thomas R. Kline School of Law.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes