Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, July 24, 202510:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 am[Opening Keynote] Leading the AI Revolution: A Strategic Briefing for ExecutivesSenior AI/ML Customer Engineer, Google CloudRegistration Level:Open Sessions
11:00 am - 11:45 amGenerative AI is reshaping industries. For leaders, the question is no longer if, but how to harness its power for sustainable growth and market leadership. This session is a condensed, strategic briefing designed to equip you with the foresight to navigate the AI landscape effectively.
Key takeaways include:
- The Competitive Edge: Go beyond theory to see how generative AI is practically applied to build moats, accelerate innovation, and outperform competitors.
- Mastering the Risks: Gain a clear understanding of the ethical, security, and organizational hurdles, and learn how to implement a robust governance framework.
- The Value Equation: Learn how to measure and articulate the ROI of generative AI, ensuring your investments translate into tangible enterprise value.
- The Implementation Blueprint: Acquire a high-level blueprint for identifying pilot projects and scaling them into core business functions.
Leave prepared to not just participate in the era of AI, but to lead it.
11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmPredatory AISr. Director, Cyber Security, Acumatica, Inc.Registration Level:Open Sessions
12:00 pm - 12:45 pmThe risks of predatory AI are multifaceted and include both real-world and hypothetical scenarios. One significant concern is the potential for AI to be used in predatory behavior, such as the manipulation of the technical and human behavior element through the exploitation of both types of vulnerabilities. For instance, AI algorithms can predict personal characteristics of users based on simple interactions such as “liking” content on social media platforms, which can then be used to manipulate behaviors. Couple that with the technological aspects and you have a potential worst-case scenario.
This presentation examines the types of AI services promoted as services and the links of those services back to Dark AI. From there, learn how to mitigate these risks through various security solutions for your company and personal interactions.
12:00 pmAvoid an AI Embarrassment: Addressing AI RiskSr. Solutions Engineer, HackerOneRegistration Level:Open Sessions
12:00 pm - 12:45 pmRushed AI deployments can translate to embarrassing incidents, reputational damage, and financial loss. Brands like Adobe, Snap, and Anthropic have joined a growing list of companies embracing AI red teaming to deploy AI responsibly and find emerging threats before bad actors. From the circumvention of AI guardrails to harmful content generation, HackerOne will share the latest threats to your AI deployment and methods to reduce AI risk.
12:00 pmCybersecurity GRC: Building Industry-Leading Programs Using AI and AutomationRegistration Level:Open Sessions
12:00 pm - 12:45 pmToday, cybersecurity GRC programs and processes often take significant investments and resources to perform risk and control testing, GRC operations and maintain GRC technologies. Strategic and high-value time of product and engineering teams can be taken away by GRC teams and external auditors to support audit and compliance activities. In this new AI world, how can CISOs and cyber GRC leaders think differently about meeting their customer and business commitments of maintaining a secure and compliant environment, in a cost-efficient way? Latest GenAI and related technologies can help provide the capability of building data pipelines with source systems, generating insights from unstructured information, and building reporting layers that can give near real-time risk and controls insights. However, there can also be several complexities and challenges associated with moving from a traditional GRC program to an AI-enabled GRC program. Learn more about how you can use AI effectively and efficiently for your cyber GRC programs.
12:00 pmHow to Manage AI Risk to Let Innovation ProsperRegistration Level:Open Sessions
12:00 pm - 12:45 pmJoin this risk-and-compliance-crossover session to learn how to navigate the complexities of AI risk and create a secure environment for innovation. While AI is often seen for its tremendous benefits or doomsday scenarios, attorneys and regulators actually advocate for a balanced approach that treats AI risk like any other risk assessment—considering priorities, efficiencies, security, and more. This session will examine AI risk from legal, regulatory, technical, and cultural perspectives, offering strategies to balance these without hindering AI-driven advancements. We all aim to be the “first out of the gate” in AI, but we must get there safely.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmThe Human Firewall: Why Your Culture Is the Weakest Link in AI and CybersecurityCybersecurity Advisor, Integrated Operations Division, Region 1, DHS CISARegistration Level:Open Sessions
1:00 pm - 1:45 pmYou can invest in the most cutting-edge AI tools or cybersecurity frameworks—but if your people don’t trust the systems, understand the risks, or feel empowered to act responsibly, even the best technology will fail. This talk examines how cultural blind spots, fear, and fatigue quietly erode organizational resilience. Blind spots emerge when decision-makers assume everyone has the same digital fluency, values, or risk tolerance. Fear surfaces in environments where staff worry about making mistakes, asking questions, or speaking up about ethical concerns. And fatigue sets in when teams are overloaded with change, compliance demands, and unclear expectations.
Through real-world examples from corporate, government, and educational settings, we’ll explore how AI and cybersecurity breakdowns often trace back not to tech—but to leadership, communication, and culture. This session challenges leaders to move beyond one-size-fits-all policies and toward frameworks that are mission-aligned, inclusive, and responsive to the lived realities of their teams. By building cultures of digital literacy, psychological safety, and shared accountability, organizations can strengthen their human firewall—and ensure that innovation doesn’t outpace responsibility.
1:00 pmArtificial Intelligence Acceptable Use PolicyRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pm[Panel] Compliance, Automation, and AIRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description coming soon.
1:00 pmStopping AI Tool-Driven Data LossRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmThe Mind Behind the Mask: Behavioral Profiling of Deepfake DeceptionCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:Open Sessions
2:00 pm - 2:45 pmAs deepfakes evolve from novelty to weaponized deception, understanding the human element behind these attacks becomes essential. This talk explores the intersection of behavioral science and synthetic media, offering a psychological lens to analyze how deepfakes are crafted, deployed, and believed. Drawing from principles of cognitive psychology, deception detection, and adversarial profiling, we examine how deepfake attackers exploit human perception, emotional triggers, and trust heuristics. We’ll dissect real-world cases where deepfakes were used in social engineering, fraud, influence operations, and identity manipulation, revealing patterns in attacker intent and behavioral signatures.
2:00 pm[Panel] Current AI Threats You Need to Know Now!Financial Fraud Investigator; Former U.S. Secret ServiceCybersecurity and Compliance Engineer, May MobilityRegistration Level:Open Sessions
2:00 pm - 2:45 pmArtificial Intelligence, while transformative, also fuels a new generation of sophisticated threats. This panel confronts the most urgent AI-driven dangers facing us today. We will dissect how malicious actors are leveraging AI to create advanced social engineering and phishing campaigns, AI-powered malware, and potent disinformation. Discover the risks of data poisoning, model theft, and privacy leakage. Gain essential insights into these evolving threats and learn proactive strategies to mitigate the immediate challenges of AI security. This session is crucial for understanding and preparing for the AI threat landscape.
2:00 pm[Panel] AI Myths Explained: Cutting Through the JargonRegistration Level:Open Sessions
2:00 pm - 2:45 pmAI exploded onto the scene late in the spring of 2023. Suddenly, people were losing their jobs, minds, and composure. It was like something out of a sci-fi novel. Surely robots would take over and enslave humans.
A year has passed and we’re all still here and mostly still employed. We’ve heard some interesting truths about AI over the year. This panel is going to focus on facts. Join our experts as we dive into some of the myths around corporate / organizational use of AI. We’ll talk about the current threats around this new technology and give insights on what’s next.
Bring your questions, as well!
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmThe AI DebriefCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:Open Sessions
3:00 pm - 3:45 pmThis presentation will provide a comprehensive overview of the current cyber landscape, focusing on both global and domestic government-related threats and incidents. We will delve into recent high-profile attacks, explore emerging trends, and discuss the evolving tactics employed by cybercriminals and nation-states. Additionally, the presentation will examine the ongoing challenges faced by governments in protecting critical infrastructure, securing sensitive data, and mitigating the risks posed by cyber espionage. By understanding the latest developments in the cyber threat environment, attendees will gain valuable insights into safeguarding government networks and systems.
3:00 pmHijacking AI: The Exploitable Architecture of AI AppsSr. Information Security Consultant, Blue MantisRegistration Level:Open Sessions
3:00 pm - 3:45 pmAs large language models and advanced AI technologies rapidly evolve, organizations are leveraging these tools to drive innovation—but with new capabilities come new security risks. The integration of AI into business architectures widens the attack surface, presenting challenges that differ significantly from those found in traditional applications.This session will delve into the distinctions between AI-enabled and legacy software, spotlighting prevalent and emerging attack vectors through real-world demonstrations. We’ll also discuss security gaps that traditional web testing misses, the current lack of standardized approaches for AI application testing, and the landscape of professional certifications in this emerging field. Attendees will leave with actionable knowledge to identify and address AI-specific security challenges.3:00 pmCyber Intel Briefing: Artificial IntelligenceRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:00 pmCognitive Computing in the New Age of AIRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pm[Closing Keynote] FAIK Everything: The Deepfake Playbook, UnleashedChief Human Risk Managment Strategist, KnowBe4Registration Level:Open Sessions
4:00 pm - 4:45 pmBrace yourself for a mind-bending journey into the world of digital deception! Generative AI is unleashing deepfakes so dangerously convincing they can manipulate even your most vigilant defenders. These aren’t just Hollywood special effects anymore–they’re the latest weapon in the cybercriminal’s arsenal, already targeting your organization’s vulnerabilities!
Join us for this heart-stopping session where Perry Carpenter, KnowBe4’s Chief Evangelist and Strategy Officer, rips the mask off the alarming rise of AI-powered social engineering. Whether you’re a security leader, red teamer, risk manager, or anyone responsible for keeping your organization safe in this brave new world, this session is your ticket to staying ahead of the curve.
In this eye-opening presentation, you’ll witness:
- Exclusive, jaw-dropping demos of deepfake tech in action – including video impersonations, voice cloning, and synthetic crisis scenarios
- Analysis of recent high-profile cases where synthetic media has been weaponized
- An insider look at the AI deception tools and techniques being deployed by sophisticated threat actors today
- “Adversarial thinking” strategies to identify your most vulnerable attack surfaces
- Organizational strategies to build resilience against narrative manipulation at scale
Don’t let your organization become the next victim of a deepfake disaster! Attend this crucial session and arm yourself with the knowledge to outsmart even the most convincing AI tricksters!
- Blue MantisBooth: n/a
Blue Mantis is a security-first IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization by applying next-generation technologies including managed services, cybersecurity and cloud. Headquartered in Portsmouth, New Hampshire, the company provides digital technology services and strategic guidance to ensure clients quickly adapt and grow through automation and innovation. Blue Mantis partners with more than 1,500 leading mid-market and enterprise organizations in a multitude of vertical industries and is backed by leading private equity firm, Recognize. For more information about Blue Mantis and its services, please visit www.bluemantis.com.
- C1Booth: n/a
C1’s Cybersecurity Solutions deliver advanced protection across networks, users, applications, endpoints, and cloud environments. Designed to ease the burden on IT teams, our services simplify security management, enhance efficiency, and proactively defend against emerging threats, ensuring your enterprise remains resilient and secure. C1 collaborates with most of the Fortune 100 companies along with other key global industry partners to deliver solutions with a total lifecycle approach. C1 holds more than 5,600 technical certifications across thousands of engineers throughout North America, including three Customer Success Centers.
- Google CloudBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- HackerOneBooth: n/a
HackerOne is the #1 hacker-powered security platform. More than 1,400 organizations, including the U.S. Department of Defense, General Motors, Google Play, Twitter, GitHub, Nintendo, Panasonic Avionics, Qualcomm, Starbucks, and Dropbox, trust HackerOne to find critical software vulnerabilities.
- KnowBe4Booth: n/a
We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
- TaniumBooth: n/a
Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).
The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.
For more information, visit: https://www.tanium.com.
- Traceable by HarnessBooth: n/a
Traceable is the industry’s leading API Security company that helps organizations achieve API visibility and attack protection in a cloud-first, API-driven world. Traceable is the only intelligent and context-aware solution that powers complete API security—API discovery and posture management, API security testing, attack detection and protection, anywhere your APIs live. Traceable enables organizations to minimize risk and maximize the value that APIs bring their customers. To learn more about how API security can help your business, book a demo with a security expert.
- WitnessAIBooth: n/a
WitnessAI enables safe and effective adoption of enterprise AI, through security and governance guardrails for public and private LLMs. The WitnessAI Secure AI Enablement Platform provides visibility of employee AI use, control of that use via AI-oriented policy, and protection of that use via data and topic security.
- Rihana MsadekSenior AI/ML Customer Engineer, Google Cloud
Guiding senior leaders in AI adoption and building innovative solutions.
Leveraging 8+ years of experience in Machine Learning to design and deploy cutting-edge AI solutions for businesses across Canada and the U.S. Rihana is known for being:
• AI Strategist & Implementer: Proven track record of implementing successful ML solutions for 100+ customers.
• Trusted Advisor: Strategic guidance for Senior Leaders on AI adoption and navigation of complex AI landscapes.
• Technical Communicator: 10 years of experience effectively communicating complex concepts through technical speaking engagements, and recently a Google speaker at 10+ Google branded events.Her diverse background, spanning studies and work across five countries and three continents, has instilled in her a deep appreciation for different perspectives and cultures. Her empathy allows her to connect with colleagues and clients on a human level, fostering inclusive and collaborative work environments. Holding two technical degrees and one business degree, she helps senior leaders navigate the complex world of AI by clearly articulating potential benefits and aligning them with strategic goals. She also enjoys facilitating informed decision-making and successful AI adoption.
Beyond her professional pursuits, Rihana is passionate about enriching the community. Her collaboration with the government of Quebec on an AI curriculum now implemented in all high schools across the province is a testament to her commitment to creating positive social impact.
- Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.
Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
- Monsurat OttunCybersecurity Advisor, Integrated Operations Division, Region 1, DHS CISA
- Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.). - Stephen DoughertyFinancial Fraud Investigator; Former U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen served as an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington, D.C.
- Hemanth TadepalliCybersecurity and Compliance Engineer, May Mobility
Hemanth Tadepalli is a Cybersecurity Compliance Engineer at May Mobility, excelling in the realm of autonomous transportation services. With a rich professional background spanning roles at AlixPartners, Mandiant, Google, and SensCy, he specializes in ensuring compliance with stringent standards like ISO 27001, SOC 2, ISO/SAE 21434, and others. Hemanth co-founded MYCAP (Michigan Young Cybersecurity Analysts and Professionals), fostering budding talents in the cybersecurity domain. Appointed by the Michigan Department of State in 2022, he served on the Collegiate Advisory Task Force, determined and implemented recommendations to improve voter education and engagement among universities across the state of Michigan. The task force played an important role in election security, integrity, and combatting the result of misinformation being spread.
Hemanth has presented at the Detroit Automotive Cybersecurity Conference and various other prominent industry events, showcasing his expertise and thought leadership. He holds a Computer Science degree with a cybersecurity concentration and minors in Pre-Law, Innovation, and Entrepreneurship from Kettering University. Currently pursuing a Master's in Cybersecurity at the University of California, Berkeley, he continues to drive innovation and excellence in the cybersecurity landscape.
- Google Representative
- KnowBe4 Representative
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
With more than 25 years at the forefront of AI, cloud, enterprise technologies, cybersecurity, privacy, and risk management, VJ is a proven leader, trusted advisor, and strategic investor. He has a demonstrated history of building and scaling successful programs for global enterprises and transforming innovative concepts into impactful products.
As a trusted Board advisor and subject matter expert, VJ guides organizations through intricate digital landscapes, fostering both innovation and strategic foresight. He brings particular value to Audit & Risk Management committees, where he rigorously evaluates and audits technology and cybersecurity organizations and programs, ensuring their veracity, efficiency, resilience, and strategic effectiveness.
A sought-after advisor across expert, incubator, and accelerator networks, VJ empowers VC and PE firms with incisive market analysis, competitive intelligence, and opportunity mapping.
VJ currently applies his diverse skills as the Founding Partner of CYFORIX, a strategic defense and technology risk advisory group, and as CEO of TORQE, a specialized firm focused on solution engineering and transformation.
- Derek Van NattaSr. Information Security Consultant, Blue Mantis
Derek Van Natta brings a diverse and comprehensive background to the penetration testing team, having initially served as a network engineer and systems administrator in the Marine Corps before advancing into cybersecurity roles as a SOC analyst and incident responder. His expertise spans a range of environments, including external and internal network penetration testing, web application assessments, wireless network testing, and mobile application security. As the team’s senior penetration tester, Derek leads engagements and ensures rigorous, detailed testing to identify and assess vulnerabilities, supporting clients in strengthening their security posture.
Derek holds an OSCP and is actively pursuing certification for the CRTO to enhance the depth of experience as a red team operator. He takes pride in delivering clear, actionable insights through meticulous reporting, grounded in a strong foundation of security principles and hands-on technical skill. Clients can expect a high level of professionalism and attention to detail, as well as a commitment to fostering secure and resilient systems through each engagement.
- Perry CarpenterChief Human Risk Managment Strategist, KnowBe4
Perry Carpenter is a multi-award-winning author, podcaster, and speaker, with more than two decades in cybersecurity focusing on how cybercriminals exploit human behavior. As the Chief Human Risk Management Strategist at KnowBe4, Perry helps build robust human-centric defenses against social engineering-based threats. His latest book, "FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions" (Wiley: Oct 2024), explores AI's role in deception. Perry also hosts the award-winning podcasts 8th Layer Insights and Digital Folklore.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!
