- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Tuesday, April 8, 20257:30 amRegistration openRegistration Level:
- Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Breakfast Roundtable (VIP / Invite Only)The Responsible Disclosure Vulnerabilities: Beyond Bug BountiesToronto Police Service, Cybercrime Unit (Ret.); Founder, KONCYBER & RB-Cyber Assurance; RCMP Contractor/InstructorRegistration Level:- VIP / Exclusive
8:00 am - 8:45 amThis session is for SecureWorld Advisory Council members only.
As the cybersecurity landscape evolves, the complexity of responsibly disclosing vulnerabilities has extended far beyond traditional bug bounty programs. The stakes are high: improperly handled disclosures can lead to data breaches, reputational damage, and exploitation by malicious actors. This interactive roundtable discussion brings together leading cybersecurity professionals, policymakers, and technology executives to explore the multifaceted challenges and opportunities in modern vulnerability disclosure practices.
This roundtable encourages an open, collaborative dialogue, with attendees sharing actionable insights into creating more effective and ethical vulnerability disclosure programs. Be prepared to leave with a deeper understanding of best practices, innovative strategies, and emerging trends that can help your organizations navigate the complexities of responsible vulnerability disclosure in an interconnected digital world.
Join us for this critical conversation and be part of shaping the future of vulnerability management beyond the bug bounty.
8:00 amAssociation Chapter MeetingsRegistration Level:- Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:- Open Sessions
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Radical Transparency Needed to Build TrustCISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks PodcastCo-Founder, Mind Over Cyber, Podcast Co-Host,, Bare Knuckles & Brass TacksRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterHold on to your socks, folks! The Georges are coming in strong. Join the co-hosts of the fast-growing, popular podcast, “Bare Knuckles and Brass Tacks,” as they kick off SecureWorld Toronto with a swift kick in the cybersecurity teeth.
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsCo-Founder, Mind Over Cyber, Podcast Co-Host, Bare Knuckles & Brass TacksRegistration Level:- Conference Pass
10:15 am - 11:00 amThis panel discussion confronts the challenge of building infosec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.
10:15 amInvesting in Your Application Security ProgramsRegistration Level:- Conference Pass
10:15 am - 11:00 amSession description to come.
10:15 amBug Bounties: Tips from the TriagerRegistration Level:- Open Sessions
10:15 am - 11:00 amHear directly how someone who has spent years reviewing and prioritizing bug bounty program submissions approaches the task. In this talk, discover how to craft reports that stand out, ensuring your findings are presented for maximum impact and value. Discover the most common pitfalls to avoid, tips on how to structure your reports for clarity and precision, and hear highlights of the key elements triagers focus on to determine the severity and validity of vulnerabilities.
10:15 amTabletop Exercises: The Fun KindRegistration Level:- Open Sessions
10:15 am - 11:00 amTabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!
This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amTracking the Massive Changes to Privacy Laws in the U.S.Registration Level:- Conference Pass
11:10 am - 11:55 amSession description to come.
11:10 amBuilding Trusted Partnerships to Enable Secure ProductsRegistration Level:- Conference Pass
11:10 am - 11:55 amIn today’s interconnected digital ecosystem, the security of any product is only as strong as its weakest link. This panel session explores the critical role of trusted partnerships in developing and maintaining secure products throughout their lifecycle.
Our distinguished panel delves into the challenges and opportunities of fostering collaborative relationships between vendors, suppliers, and customers to enhance product security. They examine how these partnerships can lead to more robust security measures, improved threat intelligence sharing, and faster response times to emerging vulnerabilities. Key topics include:
- Establishing trust in the supply chain
- Collaborative approaches to secure software development
- The role of transparency in building and maintaining trust
- Balancing intellectual property concerns with security needs
- Leveraging partnerships for more effective incident response
- Case studies of successful security-focused partnerships
11:10 amCyber Risk by the Numbers from a Cyber Insurance PerspectiveRegistration Level:- Open Sessions
11:10 am - 11:55 amYou’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.
11:10 am[Panel] Improving Incident Response Through Threat Intelligence, Cloud Resilience, and AI InnovationsRegistration Level:- Open Sessions
11:10 am - 11:55 amSession description to come.
12:00 pm[Lunch Keynote] A Leadership Strategy for Navigating a CrisisRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession description to come.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Registration Level:- VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmFrom Manual to Mastery: How GRC Automation Can Elevate Business EfficiencyDirector of GRC, GlobalVisionRegistration Level:- Conference Pass
1:15 pm - 2:00 pmSmall and medium-sized businesses (SMBs) face more and more challenges in managing GRC functions amid the fast-evolving regulatory, cyber threat, data privacy, and general risks landscape. SMBs are usually limited by smaller teams and limited funds, which makes manual processes ineffective and error prone. In contrast, major organizations frequently have specialized staff to perform these duties. The SMBs search for a solution to efficiently handle GRC functions without taxing resources or spending excessive amounts of money as cybersecurity threats and regulatory demands increase. As regulatory demands are always growing and cybersecurity threats constantly evolve, SMBs are searching for ways to manage GRC functions effectively without straining resources or spending too much dollars. This session goes through a case study of an SMB that successfully transitioned from manual GRC processes to a fully automated system. Through the adoption of GRC automation, the company streamlined its risk management program, reduced human errors, and aligned more easily with highly regulated clients, thus supporting its long-term growth and creating a scalable compliance framework for the future.
1:15 pmManaging Security and Technology After an AcquisitionRegistration Level:- Conference Pass
1:15 pm - 2:00 pmSession description to come.
1:15 pmAddressing the Cybersecurity Skill Shortage Internally and ExternallyRegistration Level:- Open Sessions
1:15 pm - 2:00 pmThis presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.
1:15 pm[Panel] The Secret Potential of AI and MLRegistration Level:- Open Sessions
1:15 pm - 2:00 pmArtificial intelligence (AI) and machine learning (ML) have emerged as powerful tools for cybersecurity professionals, offering the potential to revolutionize how organizations and individuals detect, analyze, and respond to cyber threats. Join us as we delve into the world of AI- and ML-powered cybersecurity, exploring the hidden potential of these technologies and their ability to transform cybersecurity superheroes into formidable defenders of the digital realm.
Our panel of experts unravel the intricate world of AI and ML in cybersecurity, shedding light on the latest advancements, emerging applications, and the challenges involved in harnessing the power of these technologies effectively. They discuss the use of AI in threat detection and analysis, ML-powered threat prediction, and the potential of AI-driven automated response capabilities.
Our panel provides a comprehensive overview of AI and ML in cybersecurity, empowering attendees to understand the hidden potential of these technologies and explore how they can be leveraged to enhance their organization’s cybersecurity posture. Learn how to identify and implement AI and ML solutions, overcome the challenges of data privacy and ethics, and embrace the future of AI-powered cybersecurity.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmAI-Induced Emotions and Cyber-Psychological Security TrainingA New Learning Paradigm for Emotional ResilienceAssistant Professor, Jackson State University; Visiting Professor of Education and Technology, School of Educational Sciences, Universidad Nacional Abierta y a DistanciaRegistration Level:- Conference Pass
2:10 pm - 2:55 pmIn this interactive, experiential and hands-on session with its own simulated AI-Induced environment prepared solely for this presentation, participants will discover how GenAI, specifically Large Language Models (LLMs), presents a new, unexpected cybersecurity challenge: AI-Induced Emotions (AIIEs).
What are these AIIEs? Are these different from human-human-generated emotions? Are they the same? Why does it matter to know about AIIEs? AIIEs are the emotions produced by the human interlocutor through his/her/their interaction with any AI model (Yang & Zhao, 2024).
This session plays off research with 195 anonymous participants which found that AIIEs are radically different. This difference is crucial to recognize and integrate in cybersecurity awareness training focusing on emotional resilience. Left untreated, AIIEs may create an unprecedented cybersecurity challenge because these novel emotional responses may bypass traditional security controls and create unexpected attack vectors.
Come learn how to address emotional vulnerabilities, helping your organization adapt its cybersecurity training to an evolving cyber psychological paradigm focusing on emotional resilience as a core competency.
2:10 pmIntegrating Transformative OT Cybersecurity ProgramsRegistration Level:- Conference Pass
2:10 pm - 2:55 pmSession description to come.
2:10 pmSocial Engineering: Training the Human FirewallRegistration Level:- Open Sessions
2:10 pm - 2:55 pmPhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.
2:10 pmNavigating Third-Party Risk and Vendor ResilienceRegistration Level:- Open Sessions
2:10 pm - 2:55 pmIn today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.
To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:00 pmHappy HourRegistration Level:- Open Sessions
3:00 pm - 4:00 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] Fast-Tack Funding of Your Cyber Initiatives by Focusing on Cyber ResilienceRegistration Level:- Open Sessions
3:30 pm - 4:15 pmLocation / Room: Keynote TheaterSession description to come.
- Wednesday, April 9, 20259:00 am[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous FutureSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
- SecureWorld Plus
9:00 am - 3:00 pmArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
9:00 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0Cyber Risk Analyst, Cyber Risk Opportunities LLCRegistration Level:- SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Arctic Wolf NetworksBooth: TBD
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- AnomaliBooth: TBD
Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.
- CyberhavenBooth: TBD
When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.
- ISACA TorontoBooth: TBD
The ISACA Toronto Chapter, with 2800 plus members, is the largest chapter in Canada and the 5th largest in the world. As of 2017, it will have existed in the Toronto information systems audit, control and governance community for 40 years, and is one of the most active ISACA chapters serving IT Governance, Risk, Audit, and Security professionals.
The aim of the Chapter is to sponsor local educational seminars and workshops, conducts regular chapter meetings, and help to further promote and elevate the visibility of the IS audit, control and security profession throughout the Greater Toronto Area.
ISACA (previously the Information Systems Audit and Control Association) is a worldwide association of IS governance professionals. The association currently focuses on assurance, security, and governance and provides globally recognized certification in assurance (Certified Information Systems Auditor), security (Certified Information Security Manager), and governance (Certified in the Governance of Enterprise IT).
- ISC2 TorontoBooth: TBD
Founded in 2013, the ISC2 Toronto Chapter is an official chapter of ISC2. Based in Toronto, our purpose is to provide educational opportunities for management, operational and technical aspects of the information security field, and to support the mission of ISC2.
- Leading Cyber Ladies – Toronto ChapterBooth: TBD
Leading Cyber Ladies is a global non-profit organization who focuses on bringing more women into the cyber field through educational cybersecurity sessions, mentorship, speaking opportunities, networking and career opportunities through close partnership with the business sector and other groups in the cybersecurity community.
While we are focusing on educating women, we are welcoming everyone, all genders and identities! Here we support each other in a friendly and encouraging environment. We are proud to partner with many sponsor companies across Toronto to bring our events to the community free of charge. Join our Meetup group for details on upcoming events!
We are proud to partner with many sponsor companies across Toronto to bring our events to the community free of charge. Join our Meetup group for details on upcoming events!
Learn more about LCL here: https://leadingcyberladies.com
- WiCyS Ontario AffiliateBooth: TBD
Women in Cybersecurity (WiCyS) is an organization dedicated to bringing women in cybersecurity together to share knowledge and experience through networking, education and mentoring. The WiCyS Ontario, established in April 2019, is a community of Ontario women interested in cybersecurity.
As the first Canadian Affiliate, our aim is to achieve gender parity for women in the cybersecurity field through outreach, awareness, networking, sharing, mentoring and engagement. As a WiCyS Affiliate, our group organizes activities and events which promote recruitment, retention and advancement of women in cybersecurity.
- Kenrick Bagnall, ModeratorToronto Police Service, Cybercrime Unit (Ret.); Founder, KONCYBER & RB-Cyber Assurance; RCMP Contractor/Instructor
Kenrick Bagnall has 17 years of law enforcement experience, the last eight of which were in the Coordinated Cyber Centre (C3) as a Cybercrime Investigator. Prior to law enforcement, he spent two decades working in the Information Technology industry primarily in the financial services sector. During this time, he spent twelve years in Bermuda where he was a Senior Network Analyst for the Bank of Butterfield, then an IT Manager for FLAG Telecom and then Senior Vice President of Information Technology for CAPITAL G Bank (now Clarien Bank) before returning to Canada in 2005. Kenrick is also a cybersecurity instructor, writer, and host of the KONCYBER podcast.
- George Al-KouraCISO, Ruby; Co-Host, Bare Knuckles & Brass Tacks Podcast
- George KamideCo-Founder, Mind Over Cyber, Podcast Co-Host,, Bare Knuckles & Brass Tacks
- Panel Discussion
- George Kamide, ModeratorCo-Founder, Mind Over Cyber, Podcast Co-Host, Bare Knuckles & Brass Tacks
- Panel Discussion
- Shruti MukherjeeDirector of GRC, GlobalVision
Shruti is a seasoned Governance, Risk, and Compliance (GRC) professional with over six years of experience designing and executing robust GRC programs for global organizations. With expertise in ISO certifications (9001, 27001, 27701, 27017/18, 42001), data privacy frameworks, and audit management, Shruti has consistently delivered improved compliance efficiency and minimized operational risks.
Known for leading cross-functional teams, mentoring professionals, and cultivating a culture of accountability, Shruti excels at aligning GRC strategies with business objectives to drive sustainable growth and strengthen stakeholder trust. Whether addressing regulatory challenges or optimizing organizational processes, Shruti brings a pragmatic and impactful approach to fostering compliance and resilience in today’s dynamic business environment.
- Panel Discussion
- Dr. Olga ShugurovaAssistant Professor, Jackson State University; Visiting Professor of Education and Technology, School of Educational Sciences, Universidad Nacional Abierta y a Distancia
- Happy Hour
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Rob Finch, InstructorCyber Risk Analyst, Cyber Risk Opportunities LLC
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.