Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, June 17, 20268:30 amNetworking Hall openRegistration Level:
Open Sessions
8:30 am - 3:00 pmYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
9:00 am[Opening Keynote] The State of Cybersecurity in 2026: Threats, Trends, and What Comes NextRegistration Level:
Open Sessions
9:00 am - 9:45 amSession details to come.
9:45 amNetworking BreakRegistration Level:
Open Sessions
9:45 am - 10:00 amVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
10:00 amAPI Security: Managing the Fastest-Growing Attack SurfaceRegistration Level:
Open Sessions
10:00 am - 10:45 amSession details to come.
10:00 amBuilding Incident Response Plans for Highly Distributed WorkforcesRegistration Level:
Open Sessions
10:00 am - 10:45 amSession details to come.
10:00 amBurnout in Cybersecurity: Recognizing, Preventing, and Managing Team FatigueRegistration Level:
Open Sessions
10:00 am - 10:45 amSession details to come.
10:45 amNetworking BreakRegistration Level:
Open Sessions
10:45 am - 11:00 amVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
11:00 amIdentity Security Beyond MFA: Continuous Verification and Risk-Based ControlsRegistration Level:
Open Sessions
11:00 am - 11:45 amSession details to come.
11:00 amModern Ransomware: Double Extortion, Data Destruction, and Targeted CampaignsRegistration Level:
Open Sessions
11:00 am - 11:45 amSession details to come.
11:00 amBeyond the Signature: Advanced Endpoint Detection and HardeningRegistration Level:
Open Sessions
11:00 am - 11:45 amSession details to come.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmSecuring Competitive Advantage in the Age of AIFocus Areas: AI; Agentic AI; AI Strategy; Automation; ResilienceCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Registration Level:
Open Sessions
12:00 pm - 12:45 pmIn today’s digital economy, your most valuable assets are no longer sitting in filing cabinets or protected by patents alone—they are embedded in data, algorithms, models, and cloud infrastructure. Artificial intelligence has accelerated innovation, but it has also dramatically expanded the attack surface for security teams. Adversaries are no longer just stealing files; they are extracting insights, replicating capabilities, and exploiting weak governance around AI systems. The speed of digital replication means competitive advantage can erode faster than most organizations realize. For CISOs and security leaders, protecting intellectual property now requires a fundamentally different mindset.
This session explores how AI is reshaping cybersecurity strategy and why traditional controls are no longer enough. Security teams must think beyond perimeter defense and start viewing AI systems, training data, and automation pipelines as crown-jewel assets. The challenge is not just preventing breaches, but ensuring resilience when systems are targeted. Governance gaps between innovation teams and security functions are creating blind spots that attackers can exploit. Leaders who understand this shift will move from reactive defense to proactive architectural protection.
At the same time, AI is not just a source of risk—it is a force multiplier for defense. When deployed strategically, AI can enhance detection, reduce dwell time, and strengthen operational resilience. The organizations that win will be those that integrate security into AI development from the start rather than bolting it on later. Competitive advantage in the digital era will belong to companies that treat cybersecurity as a business enabler, not a compliance requirement. The future will not be defined by who builds AI fastest, but by who secures it best.
12:00 pmData Privacy in 2026: Navigating New Regulations and Compliance PressuresRegistration Level:
Open Sessions
12:00 pm - 12:45 pmSession details to come.
12:00 pmFrom Alert Fatigue to Adaptive Defense: Operationalizing AI in the SOCRegistration Level:
Open Sessions
12:00 pm - 12:45 pmSession details to come.
12:45 pmNetworking BreakRegistration Level:12:45 pm - 1:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmSecuring the SaaS Jungle: Access Control and Shadow Data in the CloudRegistration Level:
Open Sessions
1:00 pm - 1:45 pmSession details to come.
1:00 pmSecuring Cloud-Native Environments: Containers, Kubernetes, and ServerlessRegistration Level:
Open Sessions
1:00 pm - 1:45 pmSession details to come.
1:00 pmThe Rise of AI Assistants: New Insider Threat and Data Exposure ChallengesRegistration Level:
Open Sessions
1:00 pm - 1:45 pmSession details to come.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmCLOSING KEYNOTERegistration Level:
Open Sessions
2:00 pm - 2:45 pm
- Google Cloud SecurityBooth: N/A
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- Sumo LogicBooth: N/A
Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.
Dr. Eric Cole, DPSCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Learn insights and best practices from trusted cybersecurity leaders and solution providers. Sign up for free!
