Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, June 17, 2026
    8:30 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 3:00 pm

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    9:00 am
    [Opening Keynote] The State of Cybersecurity in 2026: Threats, Trends, and What Comes Next
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am

    Session details to come.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:00 am
    Inside the Digital Mind: How Cyberpsychology Shapes Behavior, Risk, and the Cyber Landscape
    • session level icon
    Focus Areas: Social Engineering, Security Awareness & Culture, Human-Centric Security, Cyber Psychology, Risk Management
    speaker photo
    Associate CISO, St. Luke's University Health Network
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    This session explores how human behavior in digital environments directly shapes modern cyber risk. Drawing from the research of forensic cyberpsychologist and author Mary Aiken, this talk reveals why people think, react, trust, click, overshare, and make decisions differently online — and how attackers exploit those predictable patterns. Participants will learn how digital psychology influences threat exposure, identity compromise, misinformation, social engineering, and organizational security culture. Attendees will walk away with practical, human-centered strategies for building safer digital environments and strengthening security programs by aligning controls with real human behavior.

    10:00 am
    Operationalizing Zero Trust
    • session level icon
    Focus Areas: Application Security, Cloud Security, Encryption, DLP, Endpoint, IoT Security, Identity and Access Management, Network Security, & Zero Trust
    speaker photo
    Washington Technology Solutions, Enterprise Architect
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am
    The presentation outlines how to operationalize Zero Trust by moving from strategy to enforceable architecture using SASE and SSE. It covers Zero Trust principles, alignment with CISA’s maturity model, and modernization of network segmentation and enforcement. It emphasizes replacing legacy VPNs with ZTNA, securing SaaS access, and converging networking and security through SASE. The roadmap includes phased implementation, governance, and measurable KPIs, culminating in a unified, policy-driven architecture that enables continuous verification, reduces risk, and improves enterprise resilience.
    Zero Trust becomes effective only when operationalized through a phased, measurable architecture; leveraging SASE/SSE and CISA’s maturity model to enable continuous, identity-driven security and reduce enterprise risk.
    10:00 am
    Burnout in Cybersecurity: Recognizing, Preventing, and Managing Team Fatigue
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Session details to come.

    10:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:00 am

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:00 am
    Identity Security Beyond Login: Continuous Trust Signals in an AI World
    • session level icon
    Focus Areas: Identity and Access Management; Machine Identity; Secure API; AI
    speaker photo
    Engineering Manager, Identity, LinkedIn
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    While many organizations invest in SSO and MFA, attackers increasingly bypass these controls using compromised accounts or synthetic identities. In an AI-accelerated threat landscape, identity security must evolve toward continuous, signal-driven trust. Using lessons from LinkedIn and Oracle Health Sciences, this session outlines how to layer a “trust signals” service on top of existing IAM to continuously evaluate identity actions. This talk breaks down three signal families: authenticity, credibility of roles, and behavioral uniqueness. Attendees will walk away with concrete design patterns and a roadmap for integrating continuous trust scores into access decisions across web apps, APIs, and admin tools without compromising the user experience.

    11:00 am
    Beyond the Signature: Advanced Endpoint Detection and Hardening
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Session details to come.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Securing Competitive Advantage in the Age of AI
    • session level icon
    Focus Areas: AI; Agentic AI; AI Strategy; Automation; Resilience
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In today’s digital economy, your most valuable assets are no longer sitting in filing cabinets or protected by patents alone—they are embedded in data, algorithms, models, and cloud infrastructure. Artificial intelligence has accelerated innovation, but it has also dramatically expanded the attack surface for security teams. Adversaries are no longer just stealing files; they are extracting insights, replicating capabilities, and exploiting weak governance around AI systems. The speed of digital replication means competitive advantage can erode faster than most organizations realize. For CISOs and security leaders, protecting intellectual property now requires a fundamentally different mindset.

    This session explores how AI is reshaping cybersecurity strategy and why traditional controls are no longer enough. Security teams must think beyond perimeter defense and start viewing AI systems, training data, and automation pipelines as crown-jewel assets. The challenge is not just preventing breaches, but ensuring resilience when systems are targeted. Governance gaps between innovation teams and security functions are creating blind spots that attackers can exploit. Leaders who understand this shift will move from reactive defense to proactive architectural protection.

    At the same time, AI is not just a source of risk—it is a force multiplier for defense. When deployed strategically, AI can enhance detection, reduce dwell time, and strengthen operational resilience. The organizations that win will be those that integrate security into AI development from the start rather than bolting it on later. Competitive advantage in the digital era will belong to companies that treat cybersecurity as a business enabler, not a compliance requirement. The future will not be defined by who builds AI fastest, but by who secures it best.

    12:00 pm
    Beyond the Noise: Mastering Code Analysis and Mitigating Alert Fatigue
    • session level icon
    Focus Areas: Application Security; DevOps; Secure Coding; SOC; False Positives
    speaker photo
    Founder, CyberSpeak Labs LLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In the modern Security Operations Center (SOC), the sheer volume of alerts can often obscure genuine threats. One of the primary drivers of this “noise” is the difficulty in distinguishing between truly vulnerable code and persistent false positives. This session explores the critical delta between these two states and examines how a deep understanding of secure coding standards can streamline triage. By aligning SOC operations with robust development practices, security teams can significantly reduce alert fatigue, improve detection accuracy, and foster a more proactive defense posture.

    12:00 pm
    Data Privacy in 2026: Navigating New Regulations and Compliance Pressures
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session details to come.

    12:00 pm
    From Alert Fatigue to Adaptive Defense: Operationalizing AI in the SOC
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session details to come.

    12:45 pm
    Networking Break
    Registration Level:
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Breaking the Firewall: How Women in Cybersecurity Rise from Entry-Level to the C-Suite
    • session level icon
    Focus Areas: Career Development; Women in Leadership
    speaker photo
    VP of Information Security, Brightside Health
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Only 7% of CISOs are women. That’s not a pipeline problem—it’s a strategy problem. This session delivers a frank, tactics-first roadmap for women in cybersecurity who are mid-career and ready to move up. Covering the mid-career cliff, the negotiation gap, the difference between mentorship and sponsorship, and what it actually takes to reach the C-suite, this is the session most organizations never offer and most professionals never get. Come with your current role. Leave with your next move.

    1:00 pm
    Securing Cloud-Native Environments: Containers, Kubernetes, and Serverless
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session details to come.

    1:00 pm
    The Rise of AI Assistants: New Insider Threat and Data Exposure Challenges
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session details to come.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    CLOSING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
Exhibitors
  • Google Cloud Security
    Booth: N/A

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Infoblox
    Booth: N/A

    Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.

  • Sumo Logic
    Booth: N/A

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Krista Arndt
    Associate CISO, St. Luke's University Health Network

    Krista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.

    Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

    When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.

  • speaker photo
    Mike Costello
    Washington Technology Solutions, Enterprise Architect

    Mikel Costello is an and enterprise architect and former IT executive with 25+ years of experience in digital transformation, cybersecurity, and cloud strategy across government and military sectors. At Washington Technology Solutions, he leads statewide IT strategy, designs secure multi-cloud environments, and develops governance frameworks to enhance cybersecurity and reduce technical debt. A Zero Trust and SASE thought leader, he authored Washington’s Zero Trust White Paper. His career includes managing large technology portfolios, modernizing infrastructure, and delivering cost-efficient, resilient, and mission-aligned IT solutions across multi-agency environments.

  • speaker photo
    Shubham Anandani
    Engineering Manager, Identity, LinkedIn

    Shubham Anandani is an Engineering Manager at LinkedIn, where he leads teams focused on AI and professional identity platforms. Previously, at Oracle Health Sciences, he architected pioneering SaaS infrastructure for clinical trial randomization, serving Tier-1 pharmaceutical companies and ensuring FDA 21 CFR Part 11 compliance.

    He holds a Master’s in Software Engineering from Carnegie Mellon University and is a Senior Member of IEEE. Shubham combines deep expertise in distributed systems with a focus on responsible AI to solve complex security and identity challenges.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Reanna Schultz
    Founder, CyberSpeak Labs LLC

    Reanna Schultz, from Kansas City, MO, holds both a Bachelor’s and Master’s degree in Cybersecurity. With over six years of professional experience, Reanna has contributed to various corporate environments, leveraging her expertise to strengthen cybersecurity practices.

    Throughout her career, Reanna has worn many hats, including roles in Endpoint Security Engineering, Detection Engineering, and leading a Security Operations Center (SOC) team. In addition to her primary responsibilities, Reanna serves as an adjunct professor at the University of Central Missouri (UCM) and is also an entrepreneur.

    Reanna is the founder of CyberSpeak Labs, a platform dedicated to fostering community engagement through collaboration. She hosts the podcast Defenders in Lab Coats, where she delves into cyber threats and occasionally invites passionate guests to share their insights.
    Driven by her passion for cybersecurity, Reanna frequently travels to speak at events, sharing her industry knowledge and empowering others to improve their organizations' cybersecurity practices.

  • speaker photo
    Roberta Anderson
    VP of Information Security, Brightside Health

    Roberta Anderson is a 25-year cybersecurity veteran, Air Force veteran, and published author whose career spans the DoD, Fortune 500, healthcare, and government. She served as the City of Colorado Springs' first CISO, where she built the city's information security program from scratch, and today serves as VP of Information Security at national telehealth company.

    Her credentials—CISSP, CRISC, CDPSE, Security+, Network+—represent the full arc of a GRC and risk management career. She holds an M.S. in Cybersecurity and Information Assurance from National University and a B.S. in Cybercrime Investigation from Colorado Technical University. She is the author of Breaking the Firewall: How Women in Cybersecurity Rise from Entry-Level to the C-Suite (2026) and AI for Beginners in the Digital Age (2025). For more than two decades, she has mentored women in cybersecurity—resume by resume, negotiation by negotiation, promotion by promotion. She is a member of WiCyS, ISC2, ISACA, and ISSA.

Stay up to date and earn 6 CPEs

Learn insights and best practices from trusted cybersecurity leaders and solution providers. Sign up for free!