Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, July 22, 2026
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.

    11:00 am
    OPENING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Securing Competitive Advantage in the Age of AI
    • session level icon
    Focus Areas: AI; Agentic AI; AI Strategy; Automation; Resilience
    speaker photo
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In today’s digital economy, your most valuable assets are no longer sitting in filing cabinets or protected by patents alone—they are embedded in data, algorithms, models, and cloud infrastructure. Artificial intelligence has accelerated innovation, but it has also dramatically expanded the attack surface for security teams. Adversaries are no longer just stealing files; they are extracting insights, replicating capabilities, and exploiting weak governance around AI systems. The speed of digital replication means competitive advantage can erode faster than most organizations realize. For CISOs and security leaders, protecting intellectual property now requires a fundamentally different mindset.

    This session explores how AI is reshaping cybersecurity strategy and why traditional controls are no longer enough. Security teams must think beyond perimeter defense and start viewing AI systems, training data, and automation pipelines as crown-jewel assets. The challenge is not just preventing breaches, but ensuring resilience when systems are targeted. Governance gaps between innovation teams and security functions are creating blind spots that attackers can exploit. Leaders who understand this shift will move from reactive defense to proactive architectural protection.

    At the same time, AI is not just a source of risk—it is a force multiplier for defense. When deployed strategically, AI can enhance detection, reduce dwell time, and strengthen operational resilience. The organizations that win will be those that integrate security into AI development from the start rather than bolting it on later. Competitive advantage in the digital era will belong to companies that treat cybersecurity as a business enabler, not a compliance requirement. The future will not be defined by who builds AI fastest, but by who secures it best.

    12:00 pm
    Beyond the Hype: Designing AI that Actually Delivers
    • session level icon
    Focus Areas: AI; Resilience; Governance/GRC
    speaker photo
    Director of GRC, GlobalVision
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    As organizations rush to implement artificial intelligence, many are developing AI capabilities just to stay up with the competition, rather than to solve important challenges. This rush for visibility and innovation has resulted in a rising gap between existing AI systems and those that provide genuine value. The end effect is increased complexity, operational risk, and a misalignment of technology, business needs, and governance.

    This session investigates why intention and discipline, simply not speed, are the foundations of good AI. It questions the premise that quicker AI adoption inherently leads to better outcomes and investigates how poorly specified AI initiatives frequently generate technical debt, privacy risks, and governance gaps while offering little demonstrable impact. Through a governance and risk-informed lens, the conversation focuses on what useful AI looks like when it is designed to address real operational bottlenecks, customer requirements, and business outcomes. It emphasizes the importance of responsible design, oversight frameworks, and cross-functional accountability in developing AI systems that are both innovative and sustainable.

    Attendees will leave with a practical methodology for determining whether an AI idea is worth developing, how to incorporate responsibility and discipline into the AI lifecycle, and how to move beyond innovation theatre to AI that adds true value and has long-term impact.

    12:00 pm
    Defending the Digital Soul: Data Integrity, Global Bias, and a Three-Pillar Defense Against AI Scraping
    • session level icon
    Focus Areas: DLP; AI Governance; Application Security; Privacy; CISO Playbook
    speaker photo
    Sr. Manager, Data Protection, CARFAX
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Organizations are pivoting toward Agentic AI, which results in large-scale data misappropriation evolving from technical nuisance to board-level fiduciary crisis. Drawing on research submitted to the White House OSTP and the Purdue AI Management & Policy program, this session outlines a strategic blueprint for protecting proprietary data. Attendees will explore a Three-Pillar Defense: Technical Architecture, Product-Embedded Safeguards, and Policy-Driven Governance. This session bridges the gap between technical defense and executive risk reporting, providing a practitioner’s roadmap for operationalizing the NIST AI RMF to ensure long-term resilience and data integrity.

    Attendees will gain a three-pillar strategic framework to reframe AI scraping as a board-level fiduciary risk while learning actionable steps to operationalize NIST AI RMF standards for long-term data integrity.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Governing AI without Starting Over: How to Apply Your GRC Framework to AI Tools Before the Risk Gets Away from You
    • session level icon
    Focus Areas: AI; Privacy; Cloud Security; IAM; Encryption / DLP; Threat Intel
    speaker photo
    VP of Information Security, Brightside Health
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    AI adoption inside organizations is accelerating faster than governance frameworks can keep up. While much of the conversation focuses on securing large language models and understanding how they work, many organizations are overlooking a more immediate risk: how AI tools are being introduced, accessed, and used across the business.

    This session reframes AI governance through a familiar lens—Governance, Risk, and Compliance (GRC). Rather than treating AI as a completely new and undefined risk category, we explore how existing security and risk management practices can be effectively extended to AI tools and platforms.

    Most organizations don’t need a brand-new AI governance framework—they need to operationalize the one they already have.

    Attendees will learn how to evaluate AI solutions using practical, established criteria: encryption in transit and at rest, access controls, data handling practices, regulatory alignment (HIPAA, PCI, SOC 2, where applicable), and disaster recovery capabilities. The session walks through how to incorporate AI into vendor risk assessments, third-party risk management programs, and internal control frameworks—delivering a pragmatic approach for security and risk leaders who need to move quickly without reinventing their entire governance model.

    Attendees will leave with a practical, immediately actionable framework for governing AI tools using the GRC practices they already have—so they can safely enable AI in their organizations without waiting for the industry to agree on a standard.

    • Understand why AI governance should be integrated into existing GRC frameworks rather than treated as a separate discipline
    • Learn how to apply traditional risk assessment methodologies to AI tools and platforms
    • Identify key control areas for AI: encryption, access controls, compliance alignment, data governance, and operational resilience
    • Incorporate AI tools into vendor risk management and third-party assessment programs
    • Walk away with a practical framework to begin governing AI immediately—starting Monday morning
    1:00 pm
    Out of the Shadows: Hardening the AI Frontier with ISO 42001
    • session level icon
    Focus Areas: AI; Shadow IT; BYOD; Governance/GRC; Resilience
    speaker photo
    Senior Cybersecurity and Compliance SME, May Mobility
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Shadow AI is the new “Bring Your Own Device,” but the stakes are significantly higher. When employees feed proprietary code or sensitive data into unvetted LLMs, the perimeter doesn’t just leak—it dissolves. In this session, Hemanth Tadepalli breaks down the anatomy of AI Data Risk and provides a tactical roadmap for bringing these “shadow” operations into the light. Using the ISO 42001 framework as our North Star, we will discuss how to build a resilient AI Management System (AIMS) that tames the chaos of unauthorized AI usage while keeping your organization’s data under lock and key.

    1:00 pm
    The Rise of AI Assistants: New Insider Threat and Data Exposure Challenges
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Session details to come.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Trust Signals for AI-Agent Access: Stopping Synthetic Identities Before They Reach Production
    • session level icon
    Focus Areas: Identity and Access Management; AI Governance; Agentic AI; API Security
    speaker photo
    Engineering Manager, Identity, LinkedIn
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Generative AI has made it trivial to create synthetic identities and autonomous agents that behave like real users until it is too late. Traditional IAM and API security focus on authentication rather than whether an identity should be trusted with a specific action.

    Drawing on experience from LinkedIn identity systems and Oracle Health Sciences, this session explores how to design trust signals for AI-agent access. Attendees will learn architectural patterns for building a dedicated trust-signal layer, combining authentication with behavioral usage patterns and credential provenance.

    The session will cover how to expose these signals to security controls and generate human-understandable explanations for access decisions, helping organizations safely adopt AI agents while defending against automated abuse.

    2:00 pm
    Threat Hunting with AI: Turning Noise into Actionable Intelligence
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Session details to come

    2:00 pm
    Burnout in Cybersecurity: Recognizing, Preventing, and Managing Team Fatigue
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Session details to come.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    AI Cyber Debrief: Geopolitics, Algorithmic Warfare, and the Frontier of AI Resilience
    • session level icon
    Focus Areas: Agentic AI; Threat Intel; Nation-States; Resilience; Governance/GRC
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Founder & President, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Artificial Intelligence is no longer just a driver of productivity; it is the primary battlefield of modern global conflict. This session connects the dots between geopolitical volatility and the immediate risks to model integrity, data sovereignty, and cognitive security. We will examine how shifting alliances involving major powers like Russia, China, and the EU are reshaping the cyber threat landscape—specifically targeting sovereign AI clusters, decentralized compute networks, and the global semiconductor supply chain.

    The discussion will pivot to the “internal” evolution of the sector, analyzing the rapid integration of Agentic AI in critical infrastructure and the resulting “black box” regulatory and privacy minefield. From state-aligned actors seeking to poison training datasets to sophisticated syndicates deploying automated exploit-generation engines, we will profile the adversaries threatening the global digital order.

    Join us for a 2026 outlook that moves beyond mere ethical frameworks, offering a battle-tested strategy for maintaining operational resilience and model alignment in the face of unprecedented global instability.

    3:00 pm
    From Alert Fatigue to Adaptive Defense: Operationalizing AI in the SOC
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session details to come.

    3:00 pm
    The Deepfake Dividend: How Fraudsters Turned 'Looks Real' into Real Money
    • session level icon
    Focus Areas: AI-Powered Fraud; Deepfakes; Social Engineering; AI Governance, Cyber Forensics
    speaker photo
    Director of Information Security & Regulatory Compliance, ETS
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Fraud has always exploited trust. Deepfakes industrialize it.

    This session explores a forensic analysis of the $25M Arup deepfake-enabled fraud case. Attendees will learn how attackers combined social engineering, real-time voice/video impersonation, and “routine” business processes to trigger high-value payments and approvals.

    You’ll leave with a practical, investigation-ready response framework built for security leaders, fraud examiners, and risk teams working together:

    • Triage: fast signal detection and decision routing when a request “feels real” but smells wrong
    • Preserve: capturing the right artifacts (transactions, communications, video/voice originals, metadata) to avoid losing proof
    • Validate: out-of-band confirmation and corroboration that separates deception from reality
    • Report: bank/law enforcement escalation, internal notification, and documentation that stands up to scrutiny

    We’ll also pressure-test common misconceptions; why “better deepfake detectors” won’t save you by themselves, how attackers weaponize urgency and authority, and which finance-process controls reduce loss fastest.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    CLOSING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm
Exhibitors
  • Gigamon
    Booth: n/a

    Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com. 

  • Google Cloud Security
    Booth: n/a

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Proofpoint
    Booth: n/a

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Security Journey
    Booth: n/a

    Security Journey offers robust application security education tools to help developers and the entire SDLC team recognize and understand vulnerabilities and threats and proactively mitigate these risks. The knowledge learners acquire in our programs goes beyond helping learners code more securely–it turns everyone in the SDLC into security champions.

    Our platform takes a unique level approach, transitioning learners from security basics to language-specific knowledge to the experiential learning required to become security champions. With lessons offered in multiple formats, including text, video, and hands-on sandbox environments, there is a modality that resonates with every learning style. Organizations with teams of security champions develop a security-first mindset that allows them to deliver safer, more secure applications.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Shruti Mukherjee
    Director of GRC, GlobalVision

    Shruti Mukherjee is a Governance, Risk, and Compliance (GRC) specialist helping organizations transform compliance into a business enabler. She bridges strategy, regulation, and technology to build resilient, privacy-driven frameworks aligned with global standards. With experience leading ISO, privacy, and AI governance programs, Shruti simplifies complex risk landscapes into actionable insights. Her work empowers leadership teams to turn compliance outcomes into trust and market advantage. Recognized as a thought leader and speaker, she brings clarity, innovation, and impact to modern governance.

  • speaker photo
    Areejit Banerjee
    Sr. Manager, Data Protection, CARFAX

    Areejit Banerjee is an AI Policy Researcher at Purdue University and a Senior Data Protection Leader with more than years of experience at global institutions including Carfax (S&P Global), Broadridge and the World Bank. He specializes in bridging technical defense with executive governance. A named contributor to the "OWASP Automated Threat Handbook," Areejit has authored policy briefs for the White House OSTP and is published in Dark Reading and Corporate Compliance Insights. Currently pursuing an M.S. in AI at Purdue, he holds an MBA and PGP in AI/ML, focusing on operationalizing the NIST AI RMF to protect enterprise data assets.

  • speaker photo
    Roberta Anderson
    VP of Information Security, Brightside Health

    Roberta Anderson is a 25-year cybersecurity veteran, Air Force veteran, and published author whose career spans the DoD, Fortune 500, healthcare, and government. She served as the City of Colorado Springs' first CISO, where she built the city's information security program from scratch, and today serves as VP of Information Security at national telehealth company.

    Her credentials—CISSP, CRISC, CDPSE, Security+, Network+—represent the full arc of a GRC and risk management career. She holds an M.S. in Cybersecurity and Information Assurance from National University and a B.S. in Cybercrime Investigation from Colorado Technical University. She is the author of Breaking the Firewall: How Women in Cybersecurity Rise from Entry-Level to the C-Suite (2026) and AI for Beginners in the Digital Age (2025). For more than two decades, she has mentored women in cybersecurity—resume by resume, negotiation by negotiation, promotion by promotion. She is a member of WiCyS, ISC2, ISACA, and ISSA.

  • speaker photo
    Hemanth Tadepalli
    Senior Cybersecurity and Compliance SME, May Mobility

    Hemanth Tadepalli serves as the Senior Cybersecurity & Compliance Subject Matter Expert (SME) at May Mobility, a company revolutionizing transportation through advanced autonomous vehicle technology. His career spans notable roles at prestigious organizations, including management consulting firm AlixPartners, cybersecurity leader Mandiant, tech giant Google, and Michigan-based cybersecurity startup SensCy.

    Hemanth’s research focuses on advancing cybersecurity in critical areas such as autonomous vehicle security, Internet of Things (IoT) security, threat intelligence, risk management, API security, and election security. He was appointed by Michigan Secretary of State Jocelyn Benson to the Advisory Task Force overseeing statewide election security and integrity.

    In addition to his technical contributions, Hemanth has published numerous articles on cybersecurity and emerging technologies, showcasing his thought leadership. He is a sought-after speaker, invited to present at prominent cybersecurity conferences, serve as a distinguished panelist, and share insights on technology-focused podcasts. His impactful work has earned him accolades, including the 40 Under 40 recognition from Oakland County, Michigan, and the Governor’s Service Award for his philanthropic efforts and community service in cybersecurity.

    Hemanth earned his bachelor’s degree in Computer Science from Kettering University, concentrating in cybersecurity and minoring in Pre-Law, Innovation, and Entrepreneurship. He went on to earn his master’s degree in Cybersecurity and Information from the University of California, Berkeley, where he was honored as the student commencement speaker. He is currently a Ph.D. candidate at Dakota State University, specializing in cyber defense. In addition to his academic pursuits, Hemanth serves in elected office for the City of Troy and sits on the Board of Directors for Kettering University.

  • speaker photo
    Shubham Anandani
    Engineering Manager, Identity, LinkedIn

    Shubham Anandani is an Engineering Manager at LinkedIn, where he leads teams focused on AI and professional identity platforms. Previously, at Oracle Health Sciences, he architected pioneering SaaS infrastructure for clinical trial randomization, serving Tier-1 pharmaceutical companies and ensuring FDA 21 CFR Part 11 compliance.

    He holds a Master’s in Software Engineering from Carnegie Mellon University and is a Senior Member of IEEE. Shubham combines deep expertise in distributed systems with a focus on responsible AI to solve complex security and identity challenges.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Founder & President, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.

    Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.

  • speaker photo
    Steven F. Fox
    Director of Information Security & Regulatory Compliance, ETS

    Creating value-add business outcomes through security and privacy design is the core of my professional mission. I prioritize understanding my clients’ organizational goals and culture to ensure their infrastructure and processes reflect their ethos. As an IT-to-business translator with extensive technical and business advisory experience, I have successfully led audits testing controls from standards such as NIST CSF, ISO 27001, GDPR, and PCI-DSS. My contributions to the security community include publications in ISSA Journal and CSOonline, and presentations at RSA Conference, Blackhat Executive Summit, and DefCon. As a member of the SecureWorld Expo Advisory Committee, I remain actively engaged in advancing the field of cybersecurity.

Propel your cyber career at SecureWorld!

Hone your skills and knowledge and earn 6 CPE credits.