googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, July 24, 2025
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Opening Keynote] Leading the AI Revolution: A Strategic Briefing for Executives
    • session level icon
    speaker photo
    Sr. AI/ML Customer Engineer, Google Cloud
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Generative AI is reshaping industries. For leaders, the question is no longer if, but how to harness its power for sustainable growth and market leadership. This session is a condensed, strategic briefing designed to equip you with the foresight to navigate the AI landscape effectively.

    Key takeaways include:

    • The Competitive Edge: Go beyond theory to see how generative AI is practically applied to build moats, accelerate innovation, and outperform competitors.
    • Mastering the Risks: Gain a clear understanding of the ethical, security, and organizational hurdles, and learn how to implement a robust governance framework.
    • The Value Equation: Learn how to measure and articulate the ROI of generative AI, ensuring your investments translate into tangible enterprise value.
    • The Implementation Blueprint: Acquire a high-level blueprint for identifying pilot projects and scaling them into core business functions.

    Leave prepared to not just participate in the era of AI, but to lead it.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Predatory AI
    • session level icon
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    The risks of predatory AI are multifaceted and include both real-world and hypothetical scenarios. One significant concern is the potential for AI to be used in predatory behavior, such as the manipulation of the technical and human behavior element through the exploitation of both types of vulnerabilities. For instance, AI algorithms can predict personal characteristics of users based on simple interactions such as “liking” content on social media platforms, which can then be used to manipulate behaviors. Couple that with the technological aspects and you have a potential worst-case scenario.

    This presentation examines the types of AI services promoted as services and the links of those services back to Dark AI. From there, learn how to mitigate these risks through various security solutions for your company and personal interactions.

    12:00 pm
    Avoid an AI Embarrassment: Addressing AI Risk
    • session level icon
    speaker photo
    Sr. Solutions Engineer, HackerOne
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Rushed AI deployments can translate to embarrassing incidents, reputational damage, and financial loss. Brands like Adobe, Snap, and Anthropic have joined a growing list of companies embracing AI red teaming to deploy AI responsibly and find emerging threats before bad actors. From the circumvention of AI guardrails to harmful content generation, HackerOne will share the latest threats to your AI deployment and methods to reduce AI risk.

    12:00 pm
    Locking the Future: Why Data Security Is the Key to Trustworthy AI
    • session level icon
    speaker photo
    Data Strategy and Data Information Architect, Bank of America
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    As AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.

    12:00 pm
    Securing AI by Design: Governance-Driven Penetration Testing Across the AI Lifecycle
    • session level icon
    speaker photo
    Chief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin College
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Running a vulnerability scan on your AI system? That’s just the beginning. AI introduces attack surfaces that your traditional pen tests aren’t built to catch—think adversarial inputs and APIs that go unchecked.

    This session breaks down how penetration testing fits into AI governance, why you need both automation and human insight, and how to stop AI risks before they reach production. No fluff, just practical strategies to help security professionals strengthen AI systems with the same rigor you bring to everything else you defend.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    The Human Firewall: Why Your Culture Is the Weakest Link in AI and Cybersecurity
    • session level icon
    speaker photo
    Cybersecurity Advisor, Integrated Operations Division, Region 1, DHS CISA
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    You can invest in the most cutting-edge AI tools or cybersecurity frameworks—but if your people don’t trust the systems, understand the risks, or feel empowered to act responsibly, even the best technology will fail. This talk examines how cultural blind spots, fear, and fatigue quietly erode organizational resilience. Blind spots emerge when decision-makers assume everyone has the same digital fluency, values, or risk tolerance. Fear surfaces in environments where staff worry about making mistakes, asking questions, or speaking up about ethical concerns. And fatigue sets in when teams are overloaded with change, compliance demands, and unclear expectations.

    Through real-world examples from corporate, government, and educational settings, we’ll explore how AI and cybersecurity breakdowns often trace back not to tech—but to leadership, communication, and culture. This session challenges leaders to move beyond one-size-fits-all policies and toward frameworks that are mission-aligned, inclusive, and responsive to the lived realities of their teams. By building cultures of digital literacy, psychological safety, and shared accountability, organizations can strengthen their human firewall—and ensure that innovation doesn’t outpace responsibility.

    1:00 pm
    Beyond Keywords and Regex: Scaling AI Adoption with Intentional Data Protection
    • session level icon
    speaker photo
    Head of Product Marketing, WitnessAI
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Traditional data protection strategies fail when applied to AI systems. While enterprises have long relied on keyword searches and regexes to identify and protect intellectual property, these approaches become obsolete when sensitive data flows through conversational AI interfaces and training datasets.

    This session explores why intention-based classifications and data protection frameworks are essential for large enterprises navigating AI deployment at scale. Using real-world examples, including how pharmaceutical companies struggle to track proprietary research data within AI conversations, we’ll examine the unique challenges facing organizations with large, diverse, and globally distributed workforces.

    Attendees will learn practical strategies for implementing proactive data governance that accounts for AI’s opaque nature, including risk assessment frameworks that go beyond traditional perimeter security. We’ll discuss how to build data protection systems that anticipate AI’s transformative impact rather than retrofitting legacy approaches that leave critical intellectual property exposed.

    This session provides key takeaways for security leaders responsible for protecting enterprise data in the age of AI.

    1:00 pm
    Securing AI Agents: GRC Strategies for Emerging Threats and Real-World Vulnerabilities
    • session level icon
    speaker photo
    Sr. Risk & Security Manager, Amazon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    This session tackles the critical security landscape of AI agents. We’ll explore core challenges like AI’s “black box” nature, unpredictable user inputs, supply chain risks, and data integrity. Through real-world case studies such as the 2024 medical imaging model poisoning, the 2023 “$1 Chevrolet Tahoe” exploit, and the discovery of backdoored AI models, attendees will grasp tangible threats. We’ll then discuss key threat categories and effective GRC mitigation strategies, concluding with best practices and future considerations for building secure AI systems.

    The presentation will cover comprehensive aspects of AI security agents, including:

    1. Introduction: The Security Landscape for AI Agents
    2. Core Security Challenges in AI Systems
      – Internal complexity of AI processes (“black box” nature)
      – Unpredictable multi-step user inputs
      – Supply chain vulnerabilities
      – Data integrity and protection
    3. Real-World Case Studies
      – Medical Imaging Model Poisoning (2024)
      – The $1 Chevrolet Tahoe Exploit (2023)
      – Backdoored AI Models Discovery (2024)
    4. Key Threat Categories and GRC Mitigation Strategies
    5. Best Practices and Future Considerations
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Thinking Like an Attacker: How to Fight Back with AI Defense
    • session level icon
    speaker photo
    Security & Network Solutions Architect, C1
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    In today’s interconnected environment, organizations face significant challenges in managing the intricate risks associated with artificial intelligence across diverse cloud and model infrastructures. This session will explore how to establish comprehensive security for the AI era, providing end-to-end protection for the entire AI lifecycle—from development to deployment and innovation.

    You’ll gain insight into how to automatically inventory AI workloads, applications, models, data, and users. We’ll cover methods for detecting misconfigurations, security vulnerabilities, and adversarial attacks. The discussion will also include real-time runtime protections that block adversarial attacks and harmful responses, addressing critical threats such as prompt injections, denial of service, and data leakage. We’ll also examine how to enforce network-embedded guardrails, leveraging advanced threat intelligence derived from AI research and threat intelligence sources. Finally, we’ll discuss leadership in AI security standards, including support for frameworks like NIST, MITRE ATLAS, and OWASP LLM Top 10. Join us to learn how to identify AI assets, understand potential risks, and mitigate threats in real time.

    2:00 pm
    The Mind Behind the Mask: Behavioral Profiling of Deepfake Deception
    • session level icon
    speaker photo
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    As deepfakes evolve from novelty to weaponized deception, understanding the human element behind these attacks becomes essential. This talk explores the intersection of behavioral science and synthetic media, offering a psychological lens to analyze how deepfakes are crafted, deployed, and believed. Drawing from principles of cognitive psychology, deception detection, and adversarial profiling, we examine how deepfake attackers exploit human perception, emotional triggers, and trust heuristics. We’ll dissect real-world cases where deepfakes were used in social engineering, fraud, influence operations, and identity manipulation, revealing patterns in attacker intent and behavioral signatures.

    2:00 pm
    AI, Quantum, and the Cryptographic Countdown: A Ticking Clock for Security Leaders
    • session level icon
    speaker photo
    Sr. Security Engineer, Exeter Finance LLC
    speaker photo
    Lead IT Security Engineer, Tyson Foods
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    As quantum computing threatens to undermine classical encryption, security leaders are racing to develop cryptographic models that can withstand its power. But quantum alone isn’t the whole story, and artificial intelligence is now accelerating both the development and the threat landscape of cryptographic systems.
    In this session, we’ll explore how AI is reshaping the field of quantum cryptography, from enhancing quantum key distribution protocols to automating the discovery of post-quantum vulnerabilities. We’ll examine real-world scenarios where AI accelerates the design of quantum-safe algorithms and how adversaries may weaponize AI to exploit cryptographic transitions.
    Whether you’re planning a migration to post-quantum cryptography or evaluating the security of your digital infrastructure, this talk provides a forward-looking perspective on how AI is shaping the cryptographic future. The era of AI-driven quantum security has begun. Are we ready for it?
    2:00 pm
    [Panel] Current AI Threats You Need to Know Now!
    • session level icon
    speaker photo
    Financial Fraud Investigator; Former U.S. Secret Service
    speaker photo
    Head of Global Solutions Architects, Google Threat Intelligence
    speaker photo
    VP, Global Executive Engagement, Tanium
    speaker photo
    Security Awareness Advocate, KnowBe4
    speaker photo
    Cybersecurity and Compliance Engineer, May Mobility
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Artificial Intelligence, while transformative, also fuels a new generation of sophisticated threats. This panel confronts the most urgent AI-driven dangers facing us today. We will dissect how malicious actors are leveraging AI to create advanced social engineering and phishing campaigns, AI-powered malware, and potent disinformation. Discover the risks of data poisoning, model theft, and privacy leakage. Gain essential insights into these evolving threats and learn proactive strategies to mitigate the immediate challenges of AI security. This session is crucial for understanding and preparing for the AI threat landscape.

     

     

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    The AI Debrief
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    This presentation will provide a comprehensive overview of the current cyber landscape, focusing on both global and domestic government-related threats and incidents. We will delve into recent high-profile attacks, explore emerging trends, and discuss the evolving tactics employed by cybercriminals and nation-states. Additionally, the presentation will examine the ongoing challenges faced by governments in protecting critical infrastructure, securing sensitive data, and mitigating the risks posed by cyber espionage. By understanding the latest developments in the cyber threat environment, attendees will gain valuable insights into safeguarding government networks and systems.

    3:00 pm
    Beyond the Buss: Your Blueprint for Responsible AI Acceptance and Use
    • session level icon
    speaker photo
    Application Analyst, Washburn University
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    As organizations harness Artificial Intelligence’s potential, many lack the guardrails needed to ensure AI is adopted ethically and in-line with business goals leading to risks of data breaches and compliance failures. This session equips leaders with a proven blueprint for crafting an AI Acceptance and Use Policy. Learn to engage stakeholders, assess security risks, define clear governance roles, integrate controls into MLOps and monitor compliance. Featuring real-world case studies that slashed AI incidents by 50% and increased safe deployments, this session delivers the strategic playbook needed to govern AI responsibly, maximize business value, and stay ahead of evolving regulations.

    Attendees will gain a clear, five-phrase framework to create, implement and continually refine an AI Acceptance and Use policy that ensures ethical, secure and value driven AI adoption across their organization.

    3:00 pm
    Hijacking AI: The Exploitable Architecture of AI Apps
    • session level icon
    speaker photo
    Sr. Information Security Consultant, Blue Mantis
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    As large language models and advanced AI technologies rapidly evolve, organizations are leveraging these tools to drive innovation—but with new capabilities come new security risks. The integration of AI into business architectures widens the attack surface, presenting challenges that differ significantly from those found in traditional applications.
    This session will delve into the distinctions between AI-enabled and legacy software, spotlighting prevalent and emerging attack vectors through real-world demonstrations. We’ll also discuss security gaps that traditional web testing misses, the current lack of standardized approaches for AI application testing, and the landscape of professional certifications in this emerging field. Attendees will leave with actionable knowledge to identify and address AI-specific security challenges.
    3:00 pm
    Securing API Ecosystems in the Age of AI-Driven Threats
    • session level icon
    speaker photo
    Sr. Director, Product Management, Traceable by Harness
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Organizations are increasingly exposing APIs to power AI-driven applications and models, but this expansion brings a wave of novel threats. Prompt injection, sensitive data leakage, and AI-powered abuse are now among the top risks identified by OWASP and industry leaders. In this session, Sudhir Patamsetti of Traceable by Harness provides a defense-in-depth strategy to secure API environments from both traditional and emerging AI threats.

    Key takeaways include:

    • Continuous API discovery and monitoring across cloud, on-prem, and hybrid systems using AI-enhanced detection
    • Proactive, adversarial testing, including prompt injection simulation and logic flaw detection
    • Runtime protection with behavior modeling and anomaly detection to block automated model-based attacks
    • Embedding AI-aware API security into DevSecOps pipelines with minimal friction

    This session equips API architects, AppSec teams, and DevOps engineers with a tactical blueprint to detect and defend against AI-targeted attacks, fortify model interactions, and automate security without disrupting delivery.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    [Closing Keynote] FAIK Everything: The Deepfake Playbook, Unleashed
    • session level icon
    speaker photo
    Chief Human Risk Managment Strategist, KnowBe4
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Brace yourself for a mind-bending journey into the world of digital deception! Generative AI is unleashing deepfakes so dangerously convincing they can manipulate even your most vigilant defenders. These aren’t just Hollywood special effects anymore–they’re the latest weapon in the cybercriminal’s arsenal, already targeting your organization’s vulnerabilities!

    Join us for this heart-stopping session where Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, rips the mask off the alarming rise of AI-powered social engineering. Whether you’re a security leader, red teamer, risk manager, or anyone responsible for keeping your organization safe in this brave new world, this session is your ticket to staying ahead of the curve.

    In this eye-opening presentation, you’ll witness:

    • Exclusive, jaw-dropping demos of deepfake tech in action – including video impersonations, voice cloning, and synthetic crisis scenarios
    • Analysis of recent high-profile cases where synthetic media has been weaponized
    • An insider look at the AI deception tools and techniques being deployed by sophisticated threat actors today
    • “Adversarial thinking” strategies to identify your most vulnerable attack surfaces
    • Organizational strategies to build resilience against narrative manipulation at scale

    Don’t let your organization become the next victim of a deepfake disaster! Attend this crucial session and arm yourself with the knowledge to outsmart even the most convincing AI tricksters!

Exhibitors
  • Blue Mantis
    Booth: n/a

    Blue Mantis is a security-first IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization by applying next-generation technologies including managed services, cybersecurity and cloud. Headquartered in Portsmouth, New Hampshire, the company provides digital technology services and strategic guidance to ensure clients quickly adapt and grow through automation and innovation. Blue Mantis partners with more than 1,500 leading mid-market and enterprise organizations in a multitude of vertical industries and is backed by leading private equity firm, Recognize. For more information about Blue Mantis and its services, please visit www.bluemantis.com.

  • C1
    Booth: n/a

    C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.

  • Google Cloud
    Booth: n/a

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • HackerOne
    Booth: n/a

    HackerOne is the #1 hacker-powered security platform. More than 1,400 organizations, including the U.S. Department of Defense, General Motors, Google Play, Twitter, GitHub, Nintendo, Panasonic Avionics, Qualcomm, Starbucks, and Dropbox, trust HackerOne to find critical software vulnerabilities.

  • KnowBe4
    Booth: n/a

    We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.

    KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.

    The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.

    Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.

  • Tanium
    Booth: n/a

    Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).

    The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.

    For more information, visit: https://www.tanium.com.

  • Traceable by Harness
    Booth: n/a

    Traceable is the leading platform for protecting modern applications and APIs across their entire lifecycle. Built for today’s cloud native, distributed environments, Traceable combines continuous discovery, real time threat detection, shift left testing, and intelligent runtime protection into a single integrated solution. Security, DevSecOps, and platform teams rely on Traceable to eliminate blind spots, stop advanced threats, simplify compliance, and accelerate secure delivery without slowing innovation.

  • WitnessAI
    Booth: n/a

    WitnessAI enables safe and effective adoption of enterprise AI, through security and governance guardrails for public and private LLMs. The WitnessAI Secure AI Enablement Platform provides visibility of employee AI use, control of that use via AI-oriented policy, and protection of that use via data and topic security.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Rihana Msadek
    Sr. AI/ML Customer Engineer, Google Cloud

    Guiding senior leaders in AI adoption and building innovative solutions.

    Leveraging 8+ years of experience in Machine Learning to design and deploy cutting-edge AI solutions for businesses across Canada and the U.S. Rihana is known for being:
    • AI Strategist & Implementer: Proven track record of implementing successful ML solutions for 100+ customers.
    • Trusted Advisor: Strategic guidance for Senior Leaders on AI adoption and navigation of complex AI landscapes.
    • Technical Communicator: 10 years of experience effectively communicating complex concepts through technical speaking engagements, and recently a Google speaker at 10+ Google branded events.

    Her diverse background, spanning studies and work across five countries and three continents, has instilled in her a deep appreciation for different perspectives and cultures. Her empathy allows her to connect with colleagues and clients on a human level, fostering inclusive and collaborative work environments. Holding two technical degrees and one business degree, she helps senior leaders navigate the complex world of AI by clearly articulating potential benefits and aligning them with strategic goals. She also enjoys facilitating informed decision-making and successful AI adoption.

    Beyond her professional pursuits, Rihana is passionate about enriching the community. Her collaboration with the government of Quebec on an AI curriculum now implemented in all high schools across the province is a testament to her commitment to creating positive social impact.

  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Paul Dyer
    Sr. Solutions Engineer, HackerOne
  • speaker photo
    Jennifer Fite
    Data Strategy and Data Information Architect, Bank of America

    Experienced data and security professional with a demonstrated history of working in the financial services industry. Skilled in architecture design, data patterns, data services to achieve desired business outcomes, information management, data governance, and data security practices. Strong research professional with a Doctor of Philosophy - PhD focused in Information Assurance and Security.

  • speaker photo
    Dr. Kimberly KJ Haywood
    Chief AI Governance & Education Advisor, AI Connex; Adjunct Cybersecurity Professor, Collin College

    Ms. Haywood brings a highly diverse skill set to businesses. For more than 17 years, prior to moving into Security, she specialized in Human Resources, Business Development, Risk Strategy, Contracts Management, and Program Audit. Combined with her eight years in Security Governance, Risk & Compliance, she is considered a multi-talented leader, supporting Fortune 500 companies and government organizations in an array of industries (e.g., Healthcare, Education, Financial, Federal, Technology). Ms. Haywood's knowledge and experience of security frameworks, governance standards (such as NIST 800-53, SOC1/2 Type 2, ISO 27001:2013, HIPPA-HITECH, PCI), and risk methodologies have led to her success in program development, management, and audits for companies. This applied skillset has resulted in a savings of more than $1.1 million in potential contract losses. Additionally, she’s designed and developed a Medical Device Cybersecurity program for one of the largest Healthcare organizations in the Dallas-Ft. Worth region of Texas. Ms. Haywood holds a certificate as a Cyber Security Practitioner.

  • speaker photo
    Monsurat Ottun
    Cybersecurity Advisor, Integrated Operations Division, Region 1, DHS CISA
  • speaker photo
    Sharat Ganesh
    Head of Product Marketing, WitnessAI
  • speaker photo
    Sahil Dhir
    Sr. Risk & Security Manager, Amazon

    As a Senior Manager at Amazon, Sahil is experienced in ensuring regulatory compliance and cybersecurity through comprehensive product and process evaluations and have proactively managed risks in deploying generative AI systems. He is passionate about technology and building great products.

    Sahil's core competencies include cybersecurity strategy, identity and access management, governance, risk and compliance, cloud security, vulnerability management, data security, and cybersecurity frameworks. He has successfully built and launched GRC products at Amazon, where he also led the design and implementation of analytics, and tooling integration for GRC. He is passionate about empowering organizations and individuals to protect their data, privacy, and assets from cyber threats, and enjoys coaching and mentoring others in this field.

  • speaker photo
    Craig Rees
    Security & Network Solutions Architect, C1

    Craig Rees is an experienced Security and Network Solutions Architect with a strong background in Information Technology, specializing in Cybersecurity. His expertise spans SASE solution development, Zero Trust Architecture, DevSecOps, and IT services. He has deep knowledge of Cisco Security, Palo Alto Networks, Meraki, and Fortinet, as well as Governance, Risk & Compliance, Data Center networking, and Enterprise networking, including routing and switching.

  • speaker photo
    Cameron H. Malin
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi

    Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.

    During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.

    He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
    Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).

  • speaker photo
    Ankit Gupta
    Sr. Security Engineer, Exeter Finance LLC

    Ankit Gupta is a cybersecurity leader with over 15 years of experience in cloud security, identity protection, and threat detection. He currently leads enterprise security initiatives at Exeter Finance, focusing on building resilient, future-ready architectures. Ankit holds multiple industry certifications, including CISSP and CCSP, and is a contributing author and speaker at IEEE. His work emphasizes secure design, AI governance, and preparing organizations for post-quantum threats.

  • speaker photo
    Shilpi Mittal
    Lead IT Security Engineer, Tyson Foods

    Shilpi Mittal is a Lead IT Security Engineer at Tyson Foods, where she leads strategic initiatives in secrets management, application security, cloud governance, and DevSecOps automation. She specializes in designing secure, scalable systems and enhancing the security posture of enterprise environments through streamlined processes and modern architecture.

    Her current areas of focus include applied cryptography and research on emerging quantum threats, particularly in the context of secure key management and the resilience of cryptographic protocols in a post-quantum world.

    Shilpi actively contributes to both internal security strategy and external cybersecurity forums. She combines deep technical knowledge with a forward-thinking approach, emphasizing automation, identity modernization, and risk-based decision-making.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator; Former U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen served as an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington, D.C.

  • speaker photo
    Tim Gallo
    Head of Global Solutions Architects, Google Threat Intelligence

    Tim Gallo is the Head of Global Solutions Architects at Google, he specializes in Cyber Threat Intelligence and Risk everything from Intelligence Operations and Cyber Threat Profile development to risk based analytic approaches to Security Operations. He Joined Google Cloud through the acquisition of Mandiant by Google in 2022, he had spent 5 years at Mandiant prior to the acquisition in a variety of field facing roles covering the aforementioned topics. Before joining Mandiant, Tim leveraged his over 20 years’ experience in information security and intelligence operations to aid in the development and deployment of a number of solutions. Including building client and organizational expertise in Intelligence Led Security and Business Operations. This included the development and product management of some of the first cyber intelligence solutions ever brought to market. These solutions have included threat and vulnerability management tools, IOC prediction algorithms, intelligence services, and strategic intelligence consulting. Today he spends his days helping clients understand the importance of Intelligence as a guiding principle for building out effective security processes and operations and helping clients and vendors find ways to leverage technologies responsibly to build their cyber defense centers and security operations practices. Every once in a while he can be found out in the desert, sometimes on his Harley with a flamethrower, sometimes with just a flamethrower

  • speaker photo
    Erik Gaston
    VP, Global Executive Engagement, Tanium

    Erik comes to Tanium from AppDynamics (part of Cisco), where he spent almost five years in field sales. For the past two years, he was the CTO for the East Sales Team, which is responsible for generating more than half of the company's revenue with a focus on large financial firms in the region. Prior to that he built out and headed the Business Value Consulting team for that region. He got his start in technology at Deutsche Bank years back where he helped lead the AM Platform and Data Services Global Organization serving as COO. From there he went to a SaaS SW company called INTTRA (large global trade / shipping logistics platform). At INTTRA, he started by leading the transformation of the company into becoming product and voice of customer led. After that, he became CTO heading all global technology. Following INTTRA, he went back to Financial Services spending time running Target State Architecture as the Global Head of Enterprise Infrastructure CTO Product Management at Morgan Stanley.

  • speaker photo
    Erich Kron
    Security Awareness Advocate, KnowBe4

    Erich Kron is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical integration and functional testing of multi-million-dollar enterprise level technology projects within the Department of Defense, as well as large military security programs. Erich has worked with information security professionals around the world to provide the tools, training and educational opportunities to succeed in the InfoSec industry.

  • speaker photo
    Hemanth Tadepalli
    Cybersecurity and Compliance Engineer, May Mobility

    Hemanth Tadepalli serves as the Senior Cybersecurity & Compliance Subject Matter Expert (SME) at May Mobility, a company revolutionizing mobility through advanced autonomous vehicle technology. His career spans notable roles at prestigious organizations, including management consulting firm AlixPartners, cybersecurity leader Mandiant, tech giant Google, and Michigan-based cybersecurity startup SensCy.

    Hemanth’s research focuses on advancing cybersecurity in critical areas such as autonomous vehicle security, Internet of Things (IoT) security, threat intelligence, risk management, security operations, API security, and election security. He was appointed by Michigan Secretary of State Jocelyn Benson to the Advisory Task Force overseeing statewide election security and integrity. Throughout his career, Hemanth has consistently demonstrated expertise in implementing and maintaining security measures to safeguard systems, networks, and data from cyber threats.

    In addition to his technical contributions, Hemanth has published numerous articles on cybersecurity and emerging technologies, showcasing his thought leadership. He is a sought-after speaker, invited to present at prominent cybersecurity conferences, serve as a distinguished panelist, and share insights on technology-focused podcasts. His impactful work has earned him accolades, including the 40 Under 40 recognition from Oakland County, Michigan, and the Governor’s Service Award for his philanthropic efforts and community service in cybersecurity.

    Hemanth holds a bachelor’s degree in Computer Science from Kettering University, with a concentration in cybersecurity and minors in Pre-Law, Innovation, and Entrepreneurship. He also earned his Master’s in Cybersecurity and Information from the University of California, Berkeley. Currently, Hemanth serves in public office for the City of Troy and sits on the Board of Directors for Kettering University. In addition to his professional and civic work, he is a violist with the Troy Metro Symphony Orchestra. Hemanth is also a Ph.D. candidate at Dakota State University, where his research focuses on Cyber Defense.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    With more than 25 years at the forefront of AI, cloud, enterprise technologies, cybersecurity, privacy, and risk management, VJ is a proven leader, trusted advisor, and strategic investor. He has a demonstrated history of building and scaling successful programs for global enterprises and transforming innovative concepts into impactful products.

    As a trusted Board advisor and subject matter expert, VJ guides organizations through intricate digital landscapes, fostering both innovation and strategic foresight. He brings particular value to Audit & Risk Management committees, where he rigorously evaluates and audits technology and cybersecurity organizations and programs, ensuring their veracity, efficiency, resilience, and strategic effectiveness.

    A sought-after advisor across expert, incubator, and accelerator networks, VJ empowers VC and PE firms with incisive market analysis, competitive intelligence, and opportunity mapping.

    VJ currently applies his diverse skills as the Founding Partner of CYFORIX, a strategic defense and technology risk advisory group, and as CEO of TORQE, a specialized firm focused on solution engineering and transformation.

  • speaker photo
    Ifeoluwa Wada
    Application Analyst, Washburn University

    Ifeoluwa Wada is a data and AI strategist with over a decade of experience driving enterprise-scale intelligence and security initiatives. As an Application Analyst at Washburn University, she manages enterprise systems vital to institutional operations. She is a recognized thought leader and has spoken at different conferences sharing her expertise in AI, data and emerging technologies including the Check Conference 2025 and AI summits. She has co-authored 10 peer-reviewed journals with over 300 citations worldwide. She is an active member of the Association for the Advancement of Artificial Intelligence, Women in Data, and Society of Women Engineers. She combines academic rigor with hands-on implementation to help organizations adopt AI responsibly.

  • speaker photo
    Derek Van Natta
    Sr. Information Security Consultant, Blue Mantis

    Derek Van Natta brings a diverse and comprehensive background to the penetration testing team, having initially served as a network engineer and systems administrator in the Marine Corps before advancing into cybersecurity roles as a SOC analyst and incident responder. His expertise spans a range of environments, including external and internal network penetration testing, web application assessments, wireless network testing, and mobile application security. As the team’s senior penetration tester, Derek leads engagements and ensures rigorous, detailed testing to identify and assess vulnerabilities, supporting clients in strengthening their security posture.

    Derek holds an OSCP and is actively pursuing certification for the CRTO to enhance the depth of experience as a red team operator. He takes pride in delivering clear, actionable insights through meticulous reporting, grounded in a strong foundation of security principles and hands-on technical skill. Clients can expect a high level of professionalism and attention to detail, as well as a commitment to fostering secure and resilient systems through each engagement.

  • speaker photo
    Sudhir Patamsetti
    Sr. Director, Product Management, Traceable by Harness

    Sudhir Patamsetti is a seasoned product executive with over a decade of experience in cybersecurity and cloud infrastructure. He has held leadership roles at companies such as Harness, F5, Fastly, Citrix, and Akamai, where he consistently drove innovation in application security and cloud-native technologies. At F5, he led the Distributed Cloud WAAP product line, earning significant industry recognition. Now at Traceable by Harness, Sudhir is advancing Application and API security and embedding security into modern development pipelines through automated, DevSecOps-aligned practices.

  • speaker photo
    Perry Carpenter
    Chief Human Risk Managment Strategist, KnowBe4

    Perry Carpenter is a multi-award-winning author, podcaster, and speaker, with more than two decades in cybersecurity focusing on how cybercriminals exploit human behavior. As the Chief Human Risk Management Strategist at KnowBe4, Perry helps build robust human-centric defenses against social engineering-based threats. His latest book, "FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions" (Wiley: Oct 2024), explores AI's role in deception. Perry also hosts the award-winning podcasts 8th Layer Insights and Digital Folklore.

Learn and connect virtually

Join your InfoSec peers for high-quality training and collaboration. Sign up today!