Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, June 17, 2026
    8:30 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 3:00 pm

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    9:00 am
    [Opening Keynote] The State of Cybersecurity in 2026: Threats, Trends, and What Comes Next
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am

    Session details to come.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:00 am
    API Security: Managing the Fastest-Growing Attack Surface
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Session details to come.

    10:00 am
    Building Incident Response Plans for Highly Distributed Workforces
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Session details to come.

    10:00 am
    Burnout in Cybersecurity: Recognizing, Preventing, and Managing Team Fatigue
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Session details to come.

    10:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:00 am

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:00 am
    Identity Security Beyond MFA: Continuous Verification and Risk-Based Controls
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Session details to come.

    11:00 am
    Modern Ransomware: Double Extortion, Data Destruction, and Targeted Campaigns
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Session details to come.

    11:00 am
    Beyond the Signature: Advanced Endpoint Detection and Hardening
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Session details to come.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Securing Competitive Advantage in the Age of AI
    • session level icon
    Focus Areas: AI; Agentic AI; AI Strategy; Automation; Resilience
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In today’s digital economy, your most valuable assets are no longer sitting in filing cabinets or protected by patents alone—they are embedded in data, algorithms, models, and cloud infrastructure. Artificial intelligence has accelerated innovation, but it has also dramatically expanded the attack surface for security teams. Adversaries are no longer just stealing files; they are extracting insights, replicating capabilities, and exploiting weak governance around AI systems. The speed of digital replication means competitive advantage can erode faster than most organizations realize. For CISOs and security leaders, protecting intellectual property now requires a fundamentally different mindset.

    This session explores how AI is reshaping cybersecurity strategy and why traditional controls are no longer enough. Security teams must think beyond perimeter defense and start viewing AI systems, training data, and automation pipelines as crown-jewel assets. The challenge is not just preventing breaches, but ensuring resilience when systems are targeted. Governance gaps between innovation teams and security functions are creating blind spots that attackers can exploit. Leaders who understand this shift will move from reactive defense to proactive architectural protection.

    At the same time, AI is not just a source of risk—it is a force multiplier for defense. When deployed strategically, AI can enhance detection, reduce dwell time, and strengthen operational resilience. The organizations that win will be those that integrate security into AI development from the start rather than bolting it on later. Competitive advantage in the digital era will belong to companies that treat cybersecurity as a business enabler, not a compliance requirement. The future will not be defined by who builds AI fastest, but by who secures it best.

    12:00 pm
    Data Privacy in 2026: Navigating New Regulations and Compliance Pressures
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session details to come.

    12:00 pm
    From Alert Fatigue to Adaptive Defense: Operationalizing AI in the SOC
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session details to come.

    12:45 pm
    Networking Break
    Registration Level:
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Securing the SaaS Jungle: Access Control and Shadow Data in the Cloud
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session details to come.

    1:00 pm
    Securing Cloud-Native Environments: Containers, Kubernetes, and Serverless
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session details to come.

    1:00 pm
    The Rise of AI Assistants: New Insider Threat and Data Exposure Challenges
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session details to come.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    CLOSING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
Exhibitors
  • Google Cloud Security
    Booth: N/A

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Sumo Logic
    Booth: N/A

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

Stay up to date and earn 6 CPEs

Learn insights and best practices from trusted cybersecurity leaders and solution providers. Sign up for free!