Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 22, 2025
    9:00 am
    [PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and Applications
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    AI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.

    Lesson 1: What is Artificial Intelligence?
    Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.

    Lesson 2: What are the AI threats?
    Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.

    Lesson 3: What are the AI vulnerabilities?
    Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.

    Lesson 4: What are AI security controls?
    Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.

    Lesson 5: What is AI risk management?
    Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.

    Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
    One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data Cards

    Lesson 7: What are the AI governance, AI compliance, AI audit requirements?
    Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    Lesson 8: Building an AI security program
    Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.

    Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    STUDENT TESTIMONIAL:
    “Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
    Andrew F. Powell Jr., Information Security Director, Williams College

    9:00 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours
    • session level icon
    speaker photo
    Cyber Risk Analyst, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    9:00 am - 3:00 pm

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

  • Thursday, October 23, 2025
    7:30 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:30 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    Association Chapter Meetings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Participating professional associations and details to be announced.

    8:00 am
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Ask a CISO: Challenges, Lessons, and the Future of Cybersecurity
    • session level icon
    speaker photo
    CISO & VP of Infrastructure Services, Carter’s, Inc.
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    Ever wondered what keeps CISOs up at night? In this interactive fireside chat, two seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead. Expect candid insights on topics like:

    • The toughest decisions CISOs face daily
    • Emerging threats and how security leaders are preparing
    • The future of security operations, compliance, and resilience
    • Strategies for bridging the gap between security teams and executive leadership
    • Advice for aspiring security leaders and practitioners

    This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    10:15 am
    Balancing Security and Operations in Building Control Systems
    • session level icon
    speaker photo
    National Practice Lead – Building Cybersecurity, Michael Baker International
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Building control systems are increasingly targeted in today’s threat landscape—but the bigger danger may lie in how IT and OT teams respond. In this engaging session, Fred shares lessons from a career that began in IT and shifted to building control system security after a wake-up call while supporting WarnerMedia global operations. Through real-world case studies—like a vulnerability scan that knocked 6,000 devices offline—Fred illustrates the hidden risks of misaligned IT/OT priorities.

    Attendees will explore how to implement right-sized security measures that safeguard building systems without disrupting critical operations. Key themes include risk assessment, the limitations of traditional IT tools in OT environments, and the enduring power of curiosity as a primary attack vector.

    10:15 am
    Tabletop Exercises: The Fun Kind
    • session level icon
    Registration Level:
    • session level iconConference Pass
    10:15 am - 10:50 am

    Tabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!

    This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.

    10:15 am
    [Panel] The Sorcerer's Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Senior Director, Vulnerability Management, Application Security and Control Monitoring, Cox Communications
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 10:50 am

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    10:50 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    10:50 am - 11:10 am
    Location / Room: Exhibitor Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    11:10 am
    Tracking the Massive Changes to Privacy Laws in the U.S.
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    Session description to come.

    11:10 am
    Cyber Risk by the Numbers from a Cyber Insurance Perspective
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    You’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] Cyber Stars™: Celebrating Excellence in Atlanta's Cybersecurity Community
    • session level icon
    speaker photo
    Founder & Managing Director, Class-LLC™
    speaker photo
    PHR, Sr. Human Resources Leader
    speaker photo
    Managing Director, Healthcare Cybersecurity, RSM US LLP
    speaker photo
    Independent Cybersecurity Consultant & Strategic Advisor
    speaker photo
    Sr. Application Security Architect, Tempus AI
    speaker photo
    Head of Customer Excellence - Identity, GuidePoint Security
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    The ISSA Metro Atlanta Chapter has partnered with SecureWorld to honor the city’s brightest cybersecurity professionals at the Cyber Stars™ Awards ceremony. This event celebrates excellence across five key categories, recognizing individuals at various stages of their careers:

    • Blazing Stars (Security Leaders)
    • Brilliant Stars (Senior-Level Professionals)
    • Shining Stars (Mid-Career Professionals)
    • Rising Stars (Entry-Level Professionals)
    • Emerging Stars (Pre-Professional/Students)
    These awards shine a spotlight on the extraordinary contributions of cybersecurity leaders within the Metro Atlanta area. Nominees and winners, selected by an independent panel of judges, represent the best of our field. Don’t miss the opportunity to celebrate these remarkable individuals who are helping to shape the future of cybersecurity!
    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Proactive by Design: Anticipating Threats Before They Strike
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    The days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.

    1:15 pm
    The Psychology of Phishing: Designing Human‑Centered Awareness Programs
    • session level icon
    speaker photo
    GRC Officer, Georgia Tech Research Institute
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    Phishing is still the most common attack method because it taps into natural human biases. In this session, we’ll break down the key psychological triggers—like authority, urgency, and social proof—that make these attacks work.

    You’ll learn how to build awareness programs that actually connect with employees by focusing on what motivates real behavior. We’ll walk through a practical framework for designing empathy-based simulations, tracking behavior change over time, and improving your training based on what works.

    You’ll walk away with a proven, psychology-based blueprint and ready-to-use templates to build phishing awareness programs that cut click rates by over 30% in just three months.

    1:15 pm
    Addressing the Cybersecurity Skill Shortage Internally and Externally
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 1:50 pm

    This presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.

    1:15 pm
    [Panel] Proactive Security: Building Digital Fortresses Against Modern Dragons
    • session level icon
    speaker photo
    Global Field CISO, Cohesity
    speaker photo
    Cybersecurity Engineering Lead, Paypal
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 1:50 pm

    In the realm of enterprise security, every organization faces a classic tale as old as time: the eternal battle between defenders and digital dragons. Just as fairy tale heroes relied on preparation, vigilance, and the right tools to protect their kingdoms, today’s cybersecurity professionals must deploy proactive measures to safeguard their digital domains.

    This panel session explores how preventative measures serve as the ultimate “happily ever after” for enterprise security. Our expert panel guides attendees through the enchanted forest of modern threats, revealing how proactive security architecture can transform organizations from vulnerable victims to empowered heroes.

    Panelists share real-world case studies, proactive security solutions, and how organizations can write their own security success stories.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber Talent Crisis: Recruiting, Retaining, and Reskilling Your Team
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    The cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.

    2:10 pm
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    speaker photo
    Cybersecurity Director, GFT
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    This panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.

    2:10 pm
    Zero Trust for Generative AI: Securing the Next Frontier of Enterprise Intelligence
    • session level icon
    speaker photo
    Principal Security Architect, ADP
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    Explore how Zero Trust security principles are evolving to protect against emerging threats in the era of Generative AI. This session will delve into real-world risks, including prompt injection, data leakage, and shadow AI, while showcasing how organizations can apply Zero Trust principles to secure AI models, data, and users. Learn practical strategies, industry case studies, and best practices to build AI-resilient infrastructure. Ideal for cybersecurity leaders, IT professionals, and AI practitioners aiming to future-proof their security posture.

    2:10 pm
    Social Engineering: Training the Human Firewall
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Phishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Final Entries for Dash for Prizes and Passport
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm
    Location / Room: Exhibitor Hall

    This is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!

    3:00 pm
    [Closing Keynote] Beyond Prevention: Building Cyber Resilience Through Recovery
    • session level icon
    speaker photo
    VP, Channel & Sales Enablement, 11:11 Systems
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    Location / Room: Keynote Theater
    Organizations invest heavily in prevention, but in today’s threat landscape it’s not a matter of if an attack will succeed, but when. The true differentiator between victims and survivors is the ability to recover quickly, cleanly, and confidently.
    In our presentation, we will discuss:
    • Why recovery is as critical as prevention, including the business and reputational costs of downtime.
    • Ways to improve your cyber resilience with these key components—immutability, disaster recovery as a service (DRaaS), clean room environments, and validation.
    • How to build a cyber recovery strategy that integrates people, process, technology, and clear communication.
    Ultimately, resilience is about more than surviving an attack—it’s about sustaining trust, continuity, and confidence in an unpredictable world.
    3:45 pm
    Happy Hour & Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:45 pm
    Location / Room: Exhibitor Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

     

Exhibitors
  • 11:11 Systems
    Booth: TBD

    11:11 Systems is a managed infrastructure solutions provider that empowers customers to modernize, protect, and manage mission-critical applications and data, leveraging 11:11’s resilient cloud platform.

  • Cloud Security Alliance (CSA)
    Booth: TBD

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Cohesity, Inc
    Booth: TBD

    We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. The company develops software that allows IT professionals to backup, manage, and gain insights from their data across multiple systems or cloud providers.

  • Cyberhaven
    Booth: TBD

    When the DLP market first emerged 20 years ago, the goal was to protect confidential information in on-premises databases, file servers, application servers, other data repositories, and endpoints. Today millions of sensitive documents, files, and other data are being exfiltrated in violation of corporate data policies every day because DLP is completely ineffective in the era of cloud-first applications and Zero Trust security. These data breaches result in stolen IP, damaged brands, and significant financial penalties. Let’s face it, DLP in its current form is nothing more than a compliance checkbox. Cyberhaven is transforming the DLP market and helping organizations secure all of the high-value data they must protect in order to compete and thrive in the digital economy. It’s a big hairy problem, and we are up to the challenge.

  • Cyversity Atlanta Chapter
    Booth: TBD

    Our mission is to achieve the consistent representation of women and underrepresented minorities in the cybersecurity industry through programs designed to diversify, educate, and empower. Cyversity tackles the “great cyber divide” with scholarship opportunities, diverse workforce development, innovative outreach, and mentoring programs.

  • InfraGard Atlanta Members Alliance
    Booth: TBD

    InfraGard Atlanta Members Alliance (IAMA) is a non-profit organization serving as a public-private partnership among U.S. Businesses, individuals involved in the protection and resilience of the U.S. critical Infrastructure and the Federal Bureau of Investigation.

    InfraGard National Members Alliance (INMA), which consists of local InfraGard Members Alliances (IMAs) throughout the country. An InfraGard “chapter” refers to the local FBI, the local IMA, and the local InfraGard members working together.

    IAMA is the Atlanta chapter of InfraGard. It is a local association of persons who represent businesses, academic institutions, state and local law enforcement agencies, non-profit organizations and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States.

  • ISACA Atlanta
    Booth: TBD

    The aim of the ISACA Atlanta Chapter is to sponsor local educational seminars and workshops, conduct regular chapter meetings, and help further promote and elevate the visibility of the IT audit, risk, control and security professions throughout the local area.

    Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organizations. ISACA leverages the expertise of its half-million engaged professionals in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI Institute, to help advance innovation through technology.

  • ISC2 Atlanta
    Booth: TBD

    ISC2 Atlanta chapter encompasses the Atlanta Metro area. Our chapter program provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques.

    Our mission is to advance information security in local communities throughout Atlanta, Georgia, by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects. ​

  • ISSA Metro Atlanta Chapter
    Booth: TBD

    The ISSA Metro Atlanta chapter has developed over the years into one of the largest ISSA chapters worldwide and the largest IT Security organization in the Metro Atlanta area. The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications, and peer interaction opportunities that enhance the knowledge, skill, and professional growth of its members.

  • Red Canary, a Zscaler company
    Booth: TBD

    Red Canary was founded to create a world where every organization can make its greatest impact without fear of cyber attacks. As a security operations ally, we arm businesses of all sizes with outcome-focused solutions to quickly identify and shut down attacks from adversaries. Security teams can make a measurable improvement to security operations within minutes.

  • ThreatLocker
    Booth: TBD

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Rob Finch, Instructor
    Cyber Risk Analyst, Cyber Risk Opportunities LLC

    Rob Finch is a Cyber Risk Analyst with Cyber Risk Opportunities (CRO). His job is to deliver the Managed Program and other cyber risk services offered by CRO.

    Rob graduated with honors from Washington State University with a Bachelors in Management Information Systems and went on to work for a local tech startup in the greater Seattle area. Before joining CRO, Rob interned at a local cyber testing facility based in Bellevue, Washington, and gained his first exposure to the fast-paced world of cybersecurity. His interest in cybersecurity has only increased as the cyber landscape continues to evolve. He looks forward to helping companies manage these constantly changing risks. Outside of work, Rob enjoys exploring the amazing state of Washington with his family.

  • speaker photo
    Kemper Seay
    CISO & VP of Infrastructure Services, Carter’s, Inc.

    Kemper Seay is a strategic technology executive with over 25 years of experience driving cybersecurity, ecommerce, and IT transformation across enterprise environments. As Chief Information Security Officer and Vice President of Infrastructure at Carter’s, Inc., she leads global cybersecurity strategy, cloud modernization, and IT operations, managing a team of 100+ professionals. Kemper previously built Carter’s ecommerce business from the ground up, growing it to over $400 million in annual sales. She is a recipient of the 2024 Women in Technology “Woman of the Year” award and a Georgia CISO ORBIE finalist. An advocate for STEM and youth leadership, she serves on multiple advisory boards and is a mentor for FIRST Robotics. Kemper is a candidate for the NACD Directorship Certification and holds a B.S. in Psychology.

  • speaker photo
    Panel Discussion
  • speaker photo
    Fred Gordy
    National Practice Lead – Building Cybersecurity, Michael Baker International

    Fred Gordy is the National Practice Lead, Building Cybersecurity at Michael Baker International. In this role, Fred spearheads cybersecurity strategies for operational technology systems (like HVAC, BAS, and lighting) across a wide range of facilities. With over two decades of experience in control systems security, Fred is a recognized thought leader in smart building cybersecurity. His leadership in advancing secure building operations and industry best practices earned him the prestigious Julie Devine Digital Impact Award in 2025. Fred’s work continues to shape cybersecurity standards and protect critical building infrastructure.

  • speaker photo
    Panel Discussion
  • speaker photo
    Jacob Prosser, Moderator
    Senior Director, Vulnerability Management, Application Security and Control Monitoring, Cox Communications

    Jacob Prosser is a seasoned cybersecurity professional with more than 14 years of experience in the field. As a Director of Cyber Defense at Cox Communications, he and his team play a critical role in keeping the company and its customers safe from cyber threats. His expertise spans various domains within cybersecurity including application security, identity and access management, security architecture, detection engineering, and incident response.

    Jacob graduated from the University of Georgia with a degree in Management Information Systems, and he holds a CISSP certification.

  • speaker photo
    Panel Discussion
  • speaker photo
    Keyaan Williams, Emcee
    Founder & Managing Director, Class-LLC™

    An MBA and JMT Certified Team Member, Keyaan followed a unique path to becoming a risk leader. The story begins with service in the U.S. Army as chemical weapons specialist. Later, he worked in communications security for the Army Reserve Command Headquarters. Then, he spent more than a decade in various IT and security roles at the Centers for Disease Control and Prevention (CDC) in Atlanta.

    CLASS-LLC was founded with a vision to help global customers benefit from strategy, governance, and program management lessons learned throughout his career. Beyond security, Keyaan is known for his service as the Past President of ISSA International, Chair of the risk committee for a global ministry, and Founding Member of the Private Directors Association Atlanta Chapter.

  • speaker photo
    Shelley Greenhalgh, Judge
    PHR, Sr. Human Resources Leader

    Now happily retired and enjoying the next chapter, Shelley Greenhalgh spent her career as a dynamic human resources leader, working for global and Fortune 150 companies to build stronger, more people-focused organizations. She’s best known for her ability to connect the dots between business strategy and talent—especially in fast-paced technology environments.

    Over the years, Shelley worked side-by-side with CTOs and senior execs to shape cultures where people could truly thrive. She played a key role in designing tech-focused compensation strategies and career pathing programs—tools that helped companies not just attract top talent, but keep them growing and engaged for the long haul.

    Along the way, she picked up a few credentials (because learning is kind of her thing). Shelley holds certification from SHRM, NTL certification in Organizational Development, certified mediator in the state of Georgia, and an Affirmative Action certification from Cornell University. These days, she’s traded boardrooms and conference rooms for good times with friends, but her passion for people, culture, and growth still shows up in everything she does.

  • speaker photo
    Lenny Levy, Judge
    Managing Director, Healthcare Cybersecurity, RSM US LLP

    Mr. Levy brings years of experience helping organizations address cybersecurity challenges. Prior to making the transition to Chief Information Security Officer (CISO) for healthcare organizations, he consulted on cybersecurity topics for organizations around the world based in the United States and Singapore. Now Mr. Levy leads RSM’s North America healthcare cybersecurity practice working with clients to reduce risk associated with emerging threats, regulatory compliance, data loss, and AI governance.

    He holds a Bachelor of Science in Decision and Information Sciences from the University of Florida and a Master of Business Administration (MBA) from Duke University Fuqua School of Business. He holds Certified Information Systems Security Professional (CISSP) and Certified Information Systems Auditor (CISA) certifications.

  • speaker photo
    Hiten Patel, Judge
    Independent Cybersecurity Consultant & Strategic Advisor

    Hiten is an independent cybersecurity consultant and strategic advisor with more than 20 years of experience advising Fortune 500 organizations and their executive leadership teams to build business-aligned security programs that drive organizational resilience. Specializing in executive advisory services for CISOs and C-suite leaders, he combines deep technical expertise with strategic business acumen to translate cybersecurity investments into measurable business outcomes. Hiten excels at bridging the gap between complex security requirements and business objectives across regulated industries.

    His current consultancy focuses on cybersecurity strategy development and CISO advisory services, drawing from his extensive background leading enterprise risk management and compliance programs spanning various cyber and privacy frameworks at Accenture, EY, and PwC, where he served clients across global markets. Having directed transformational security initiatives, he brings proven expertise in scaling security programs and developing governance frameworks that enable digital transformation while maintaining robust security controls across financial services, retail, healthcare, and manufacturing sectors.

  • speaker photo
    Damien Suggs, Judge
    Sr. Application Security Architect, Tempus AI

    Damien is a recognized leader in the Atlanta area. He is an OWASP Advocate and Threat Modelling Specialist with over twenty-three years of experience. He has worked in various industry verticals and a wide range of IT Security disciplines.
    Damien has been directly involved with penetration testing and ethical hacking of networks, applications, mobile applications, IoT devices, and cloud computing environments. He specializes in implementing all aspects of an application security program, including creating policies, processes, and procedures that govern the implementation of security practices into the fabric of the organization and company culture.

  • speaker photo
    Mark Whitesell, Judge
    Head of Customer Excellence - Identity, GuidePoint Security

    Mark Whitesell has been in the IT Security space for over 30 years. Mark has held leadership positions at RSA Security, Okta and Saviynt; and is widely considered an expert in identity management and governance space. Mark sits on the Advisory Board for ISSA Metro Atlanta, in addition to several other identity companies. Mark is a graduate of Georgia Tech and lives in the Atlanta area with his wife and four children.

  • speaker photo
    Emmanuel Nwajiaku
    GRC Officer, Georgia Tech Research Institute

    Emmanuel Nwajiaku is a GRC Officer at Georgia Tech Research Institute and an Instructor. He holds CISSP, Security+, and Network+ certifications, along with a Secret clearance. Emmanuel focuses on AI-enhanced security policies and human-centered defense strategies. He has led awareness programs that reduced phishing click rates by 30% and teaches these approaches in both corporate and academic settings.

  • speaker photo
    Dr. Joye Purser, CISSP
    Global Field CISO, Cohesity

    Dr. Joye Purser is Global Field CISO at Cohesity, the number-one maker of data backup systems. She also is the 2023 ISC2 Lifetime Achievement Award Winner in Cybersecurity.

    In 2022, she was the first-ever senior executive Regional Director for Cybersecurity in CISA Region 4, for the U.S. Department of Homeland Security. At CISA, the Cybersecurity and Infrastructure Security Agency, Dr. Purser delivered strategic vision for a geographically distributed team of security experts and strengthened partnerships with critical infrastructure owners in the region. Prior to that, Dr. Purser worked in the private sector at a large, global management consulting firm, where she facilitated enterprise risk management and business continuity activities for a 10,000-staff client. She led global pandemic recovery operations, enabling a county of 4.7 million people to organize, plan, and expend more than $400 million in COVID relief aid.

    Working for 20 years in Washington, Dr. Purser was selected to serve in the White House at the Office of Management and Budget (OMB), where she oversaw development of the $95 billion Department of Defense technology budget. While at OMB, she led an effort that galvanized federal agencies, the private sector, and Congress to unify to secure and strengthen the semiconductor supply chain.

    Dr. Purser led audit activities at the Pentagon for a decade, advising on the design and deployment of multi-billion-dollar IT programs such as financial management systems and electronic health records. A governance, risk, and compliance expert, she authored internal policies establishing new authorities for the Director of Cost Assessment and Program Evaluation (OSD/CAPE) for an agency with a two-million-person workforce.

    Before that, Dr. Purser worked on Capitol Hill as a seasoned legislative staffer, guiding the agenda for two members of Congress on the House Science Committee. There, she steered the House Diversity and Innovation Caucus; drafted a bill promoting a more diverse technology workforce that passed into law; organized constituent town hall events; worked on a presidential campaign; and contributed to the drafting of the Affordable Care Act.

    Earlier in her career, Dr. Purser has consulted on federal engagement strategy as Vice President of Artemis Strategies; and she worked at the nonprofit, Research America, to educate scientists on how to engage with Congress more effectively and in their communities. She serves on the Board of Cyversity; mentors a large group of security professionals; and devotes her gifts of communication, strategy, and coalition-building in a number of volunteer activities in her community.

    A graduate of Georgia Tech, Dr. Purser has a technical background as an accomplished researcher. Her first scientific publication has been cited more than three hundred times. She resides in Atlanta with her spouse and children.

  • speaker photo
    Chamon Gayton, Moderator
    Cybersecurity Engineering Lead, Paypal

    Chamon Gayton is a highly motivated and accomplished cybersecurity professional and retired military veteran, bringing over 17 years of proven experience in security operations, governance, risk and compliance (GRC), and information assurance within both federal and private sector environments. Specializing in leading enterprise-wide security initiatives, Chamon has a distinguished record of successfully guiding organizations through complex compliance and security challenges, with deep expertise in federal frameworks including FISMA, FedRAMP, StateRAMP, NIST (800-53, 800-53A, 800-18, 800-60), FIPS 199 & 200, and DoD standards.

    Throughout her career, Chamon has demonstrated a consistent ability to build and lead high-performing cybersecurity teams, while developing cross-functional programs from initial planning through implementation — mitigating risk, ensuring compliance, and delivering strong internal and customer-facing outcomes. Her leadership style emphasizes strategic collaboration, continuous improvement, and mission-focused execution.

    With a sharp analytical mindset and strong data analysis capabilities, Chamon excels at identifying and addressing security vulnerabilities, synthesizing large datasets to drive decision-making, and enhancing long-term security postures. She has successfully performed and overseen numerous security assessments, audits, and readiness reviews, ensuring adherence to critical state, federal, and industry regulations.

    Drawing on her military discipline and leadership acumen, Chamon is known for her ability to mentor emerging security professionals, establish trusted relationships across technical and executive teams, and cultivate a security-first culture. Her hands-on approach and clear communication style make her a valuable contributor to any initiative aimed at elevating security maturity and resilience.

    Chamon holds multiple industry certifications and continues to stay at the forefront of evolving cyber threats, emerging regulations, and risk management strategies. Whether advising senior leadership or leading tactical execution, she brings both vision and operational excellence to every engagement.

  • speaker photo
    Panel Discussion
  • speaker photo
    Tamika Bass, Moderator
    Cybersecurity Director, GFT

    Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.

  • speaker photo
    Sanat Pattanaik
    Principal Security Architect, ADP

    Sanat is a senior cybersecurity leader with a proven track record of building and scaling enterprise security programs that align with business strategy and enable digital transformation. With deep expertise in Zero Trust, cloud security, and the NIST Cybersecurity Framework, he has successfully led cross-functional teams to secure AI-driven architectures and address emerging risks. A strong advocate of security-by-design, Sanat combines technical acumen with strategic vision to help organizations navigate the evolving landscape of Generative AI securely. As a trusted advisor to executives and boards, he emphasizes embedding security as a business enabler in the AI era.

  • speaker photo
    Jack Bailey
    VP, Channel & Sales Enablement, 11:11 Systems

    Jack Bailey is the Vice President of Sales & Channel Enablement at 11:11 Systems. He is a driven IT sales and learning professional with demonstrated success in management, solving customer challenges and sales enablement. He oversees the alignment of advanced networking protocols, virtualization architecture, and multi-vendor/protocol support of production, testing, and disaster recovery solutions to customer challenges.

  • speaker photo
    Happy Hour
Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.