googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, August 3, 2022
    8:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 3:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:00 am
    [Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:00 am
    Effective Leadership: It's All About Communication
    • session level icon
    speaker photo
    Cybersecurity Director, Gannett Fleming
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:30 am
    10:00 am
    Ransomware: #1 with a Bullet
    • session level icon
    speaker photo
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:30 am

    All cyberattacks are evolving, and attacks are getting more and more adaptive and cunning. Recently, ransomware has dominated the headlines, and incidents among the nation’s state, local, tribal, territorial (SLTT) government entities, as well as critical infrastructure organizations, have been growing for years. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. Malicious actors continue to adapt their ransomware tactics over time, and in recent months “ransomware” attacks have outpaced so much so that they’re the #1 cyberattack in 2022 and continue to gain traction.

    But don’t fret, there is hope! Come join us on a walkthrough of known countermeasures against ransomware attacks and many other attacks that could be a game changer in your security strategy: Proactivity, Awareness, Preparedness, and Resilience.

    10:00 am
    Never Trust. Always Verify.
    • session level icon
    speaker photo
    Global Security Strategist, Check Point Software Technologies
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:30 am

    Humans are inherently both trusting and distrusting, without even knowing it! We pick up on innumerable subtle micro expressions and nuances of our environment, instantly spotting what’s out of place. Without a second thought, our computer brains process and alert us to “things out of place” and focus our attention, silencing distractions so we can verify trust.

    In this session, Eddie Doyle will demonstrate that when we design systems after our neuro-biology, we can focus our networks to eliminate threats in much the same manner as our natural born instincts.

    10:30 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 10:45 am

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:45 am
    [PANEL] Advice from the Field: The Future of InfoSec Work
    • session level icon
    speaker photo
    CISO, Georgia Department of Banking and Finance
    speaker photo
    Sr. Director, Information Protection Assurance, Cigna
    speaker photo
    Business Information Security Officer (BISO), T-Mobile
    speaker photo
    Content Strategist, SecureWorld
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:15 am

    Join us for an interactive panel composed of female pioneers in the cybersecurity space where they’ll discuss the current climate and culture in cybersecurity. They will share their personal experiences being a woman in STEM, advice for charting your own career path, and the future of work for the InfoSec industry. This panel discuss will allow for open online Q&A discussion.

    10:45 am
    PAM Back to Basics
    • session level icon
    speaker photo
    Chief Security Scientist & Advisory CISO, Delinea
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:15 am

    With so many high-profile breaches accomplished through compromising passwords on privileged accounts, PAM is a top priority for organizations of all sizes. Join Delinea’s Chief Security Scientist Joseph Carson, as he takes you on a brief journey through the PAM lifecycle to get you quickly up to speed and understand the PAM matrix of all the different types of privileged accounts that exist across all your different IT domains, often referred to as your privileged account attack surface.

    11:15 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:15 am - 11:30 am

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:30 am
    [Lunch Keynote] Modern Threat Detection, Investigation, and Response with Google Cloud's SecOps Suite
    • session level icon
    speaker photo
    Engineer, Google Cloud Security
    Registration Level:
    • session level iconOpen Sessions
    11:30 am - 12:00 pm

    To stay secure in today’s growing threat landscape, organizations must uncover and remediate cyber threats at unprecedented speed and scale. This demonstration will showcase how Google Cloud’s Chronicle, Siemplify, and VirusTotal products are coming together to provide a holistic approach to modern threat detection, investigation, and response. Join us and discover how to:

    • Uncover and analyze new and evolving threats at petabyte scale.
    • Decrease alert fatigue and caseload by as much as 80% working threat-centric cases.
    • Automate up to 98% of Tier 1 tasks with custom dynamic playbooks.
    • Reduce mean time to detection (MTTD) and mean time to response (MTTR) with actionable threat intel and context-driven investigations.
    • Hunt for new and advanced threats 90% faster than traditional SOC tools.
    12:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:15 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:15 pm
    [Panel] Prioritizing the Current Threatscape
    • session level icon
    speaker photo
    Sr. Director, Cybersecurity Strategy, Okta
    speaker photo
    Sales Engineering Manager, CISSP, C|EH, Proofpoint
    speaker photo
    Security Engineer, Cybereason
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm

    Ransomware, business email compromise, cloud misconfigurations, social engineering, insider threats, third-party coding… the list goes on and on. The threats are everywhere. Some are new, but the old ones work just as well. How do you decide which threats are of the most concern to your organization? Do you report all of these to the Board? How do you provide the resources necessary to minimize the risks and still enable the business? Join our experts as they tackle how to identify and prioritize the current threats.

    12:15 pm
    The Inadvertent Remote Insider Threat
    • session level icon
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm

    Threat methods and controls utilized are very comprehensive and effective for those who are typically in the office, but what about the remote workforce of today? Their intent may not be malicious but rather inherent to poor practices.

    This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and to help organizations identify existing critical controls needed to develop an Insider Threat Program using a white hat hacking methodology. Through live demonstrations, we will show simple techniques used to bypass various controls.

    Objectives:

    • Learn the methodologies utilized by individuals within the organization that would be defined as insider threat activity
    • How to identify system based behavioral indicators
    • Learn which existing or enhanced security layer can provide insider threat profile data
    • Learn how areas of the organization, i.e. Legal, Procurement, and HR, are key stakeholders in assisting to identify insider threat activity

    Key Takeaways:

    • How to identify business processes which can contribute to remote work insider threats
    • Enhance current security program on what controls are bypassed by utilizing routine IT procedures
    • Enhance procedures required to identify insider threat exposures
    • Enhance awareness training to include additional methods of insider threat
    • Enhance existing physical and digital security layers to better identify specific insider threat activity
    12:15 pm
    Five Things to Understand About Privacy Law Right Now
    • session level icon
    speaker photo
    Co-Founder & Managing Partner, XPAN Law Partners
    Registration Level:
    • session level iconOpen Sessions
    12:15 pm - 1:00 pm

    This past year we have seen significant changes to privacy laws, states like California, Utah, Virginia, Colorado, and Connecticut have passed sweeping, and sometimes disparate, data privacy laws. In addition, privacy professionals are excited to see movement at the Federal level when the U.S. House of Representatives Subcommittee on Consumer Protection and Commerce passed by voice vote H.R. 8152, the American Data Privacy and Protection Act (“ADPPA”). And yet, privacy law is as misunderstood as the concept of privacy itself. Moreover, businesses face substantial challenges with legal compliance and individuals do not fully understand their rights.

    This session will dispel myths and answer pressing questions about the concept of privacy itself. We will explore the changing domestic legal data privacy obligations and explain the similarities and differences businesses need to know. We will also provide a top 5 of things businesses need to understand about data privacy, what it is and how it applies to data they collect.

    1:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:15 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Ukraine vs. Russia: The Cyber War
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm
Exhibitors
  • Check Point Software Technologies
    Booth:

    Check Point Software Technologies is a leading provider of cybersecurity solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other types of attacks. Our solutions offer multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention.

  • Cybereason
    Booth:

    Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.

  • Delinea
    Booth:

    Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

  • Google Cloud
    Booth:

    Google Cloud provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Proofpoint
    Booth:

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Okta
    Booth:

    Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Tamika Bass
    Cybersecurity Director, Gannett Fleming

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    Stanton Gatewood
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA

    Mr. Stanton Gatewood is the U.S. DHS/CISA - R4 Cyber Security Coordinator - State of Georgia. He is the former Chief Information Security Officer for the State of Georgia and Board of Regents of the University System of Georgia and the University of Georgia.

    Stanton has more than 35 years of experience in cybersecurity program management and strategic planning, executive leadership, including the U.S. military, state, local, federal governments, higher education, and several top 10 global corporations. He has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University. He has built two centers of excellence, one for cryptography and one for cyber awareness and training.

  • speaker photo
    Eddie Doyle
    Global Security Strategist, Check Point Software Technologies

    Eddie Doyle works with enterprise organizations, university think tanks and corporate leaders to articulate the complex subject of cyber security in an engaging manner, championing his customer’s initiatives to fruition and finding the holy grail of cyber security… making cyber a profit center for the business.

    LinkedIn recognizes Eddie’s forté as a keynote speaker and livestreamer of cyber security strategy for the everyday user of technology. Leading Board discussions and attack/defense simulation, Eddie proudly works with executive on disaster recovery planning and holds a global revenue responsibility for a fortune 500 company.

  • speaker photo
    Felicia Hedgebeth
    CISO, Georgia Department of Banking and Finance
  • speaker photo
    Tammi Lopez
    Sr. Director, Information Protection Assurance, Cigna
  • speaker photo
    Dr. Cheryl Cooper
    Business Information Security Officer (BISO), T-Mobile

    Dr. Cooper holds a doctorate in Computer Science. She holds a Master of Science in Criminal Justice and a Master of Arts in Business Administration. She has earned several security certifications; Certified Information System Security Professional (CISSP), Certified Information Systems Security Auditor (CISSA), and Certified Data Privacy Solutions Engineer (CDPSE). Dr. Cooper is employed with T-Mobile Corporation as a Security Risk Manager. She has 20 years of telecommunications and Cyber security experience. She is also an adjunct professor teaching course curriculum under Cyber Security degree programs with the University of Wisconsin and University of New York. She sits on multiple cybersecurity boards and is an advocate for equal opportunity for women and minorities in STEM careers. She is passionate about helping others and has demonstrated this through her community works, as well as being the recipient of multiple awards for being a champion and a bridge builder.

  • speaker photo
    Moderator: Karly Tarsia
    Content Strategist, SecureWorld

    Karly Tarsia is a Content Strategist at SecureWorld. Her focus is on bringing smart minds together to discuss challenges and insights the InfoSec community finds helpful and informative. Karly’s career began after she graduated from the University of Oregon in public relations where she worked with clients in technology, financial and consumer industries. When Karly is not writing for SecureWorld or connecting with speakers you can find her wearing her other hat as a wedding planner for couples in the PNW.

  • speaker photo
    Joseph Carson
    Chief Security Scientist & Advisory CISO, Delinea

    Joseph Carson has more than 25 years of experience in enterprise security, an InfoSec Award winner, author of "Privileged Account Management for Dummies" and "Cybersecurity for Dummies." He is a CISSP and an active member of the cyber community, speaking at conferences globally. He’s an advisor to several governments, as well as to critical infrastructure, financial, and maritime industries.

  • speaker photo
    Severin Simko
    Engineer, Google Cloud Security

    Severin worked at Siemplify for nearly 3 years, 2.5 years of which were spent at TIP where he was team led for a team that was responsible for all integrations that Siemplify had. Nowadays he is focusing his work on Sales Engineering at Google Cloud Security and has been doing so for nearly half a year. Prior to that, Severin was working for a company in the Czech Republic where he designed, implemented and maintained SOCs mostly for customers from central Europe - banks and insurance companies.

  • speaker photo
    Marc Rogers
    Sr. Director, Cybersecurity Strategy, Okta

    Marc Rogers is Senior Director of Cybersecurity Strategy at Okta. With a career that spans more than twenty years, he has been hacking since the 80’s and is now a white-hat hacker renowned for hacking technology like Apple's TouchID and the Tesla Model S. Prior to Okta, Marc served as the Head of Security for Cloudflare and spent a decade managing security for the UK operator, Vodafone. He's been a CISO in South Korea and has also co-founded the disruptive Bay Area security startup “Vectra”. In his role as technical advisor on “Mr. Robot,” he helped create hacks for the show. He's an organizer and the Head of Security for the world’s largest hacking conference: DEF CON. Recently Marc co-founded the CTI League, an award winning, multinational cybersecurity initiative that combines security industry professionals, government agencies and law enforcement from 80 different countries.

  • speaker photo
    Iván Hernández
    Sales Engineering Manager, CISSP, C|EH, Proofpoint
  • speaker photo
    Robert "Teall" Rist
    Security Engineer, Cybereason

    With over 34 years of industry experience, Robert “Teall” Rist has been immersed in all things security since originally beginning his career in law enforcement. In the 27 years since, he has joined multiple start ups and enterprise companies such as Verizon, CA Technologies, NetIQ, and IBM. While at IBM, Robert was a black-belt level subject matter expert on all things SIEM, IAM, and QRadar. Prior to joining Cybereason last September, Robert spent the previous 4 years working at Cyberproof on their Security Orchestration Automation and Response platform (SOAR).

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Rebecca Rakoski
    Co-Founder & Managing Partner, XPAN Law Partners

    Rebecca L. Rakoski is the managing partner at XPAN Law Partners, LLC. Rebecca advises her clients on a proactive, multi jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She uses her extensive experience to work with her clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure.

    Rebecca counsels and aggressively defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. As an experienced litigator, Rebecca has handled hundreds of matters in state and federal courts. Rebecca skillfully manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to minimize her client's litigation risks.

    Rebecca regularly negotiates complex contractual provisions that are impacted by domestic and international data privacy regulations including the California Consumer Privacy Act of 2018, and the European Union's General Data Protection Regulation. She understands how the nature of the data can affect the role her client plays in the data transaction and uses that knowledge to mitigate corporate liability.
    As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section.

    Rebecca has been appointed and served in multiple highly complex litigation matters by the New Jersey Superior Court as a Special Master in the areas of technology and eDiscovery. She also served on the Complex Business Litigation Committee that drafted and revised the New Jersey Court Rules involving electronic discovery. Rebecca was on the eDiscovery committee of her prior law firm and created its eDiscovery subgroup.

    Rebecca is on the Board of Governors for Temple University Health Systems and is also the Acting Dean of Online Learning and an adjunct professor at Drexel University’s Thomas R. Kline School of Law.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes