googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, March 12, 2025
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk / Lobby

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future - Part 1
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    7:30 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 1
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Boardroom Bootcamp: Mastering the CISO's Message
    speaker photo
    VP, Global Security & Privacy, SharkNinja
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Presenting cybersecurity strategies and risks to the board of directors is one of the most high-stakes responsibilities for CISOs. Yet, translating technical jargon into actionable business insights can be a daunting challenge. This closed-door roundtable discussion brings together seasoned CISOs to share their experiences, strategies, and tips for effectively communicating with board members.

    From aligning cybersecurity metrics with business goals to handling tough questions about ROI and risk tolerance, this session explores practical approaches to building trust and influencing decision-makers at the highest levels. Leave with actionable advice on how to craft compelling narratives, leverage visuals and data effectively, and create meaningful dialogues with your boards.

    8:00 am
    ISACA New England Chapter Meeting (Open to all attendees)
    • session level icon
    Managing the Complexity of Cybersecurity and Privacy in the Real World
    speaker photo
    Professor, Boston College, Carroll School of Management
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Managing cybersecurity in the real world today is all about managing complexity and communications. Managing communications, from an organizational perspective, is exceedingly difficult given the diversity and increasing number of partners, vendors, and industry and government players. The complexity, and the problems that come from it, are driven by the rapidly changing technology, the diversity and scale of the threats, and the wide-ranging and shifting regulatory environment.  Given these challenges, which will only grow more difficult with the increasing use of AI, managing cybersecurity and privacy today can only be managed by using a structured approach based on a consistent set of models, tools and frameworks.  A simple example of this is the CIA triad, while the CIS Controls, COBIT and NIST CSF provide more elaborate frameworks.

    This presentation discusses how to analyze, choose and then implement a small number of frameworks that best meet your organization’s technical, regulatory and management structure. This workshop-style session a lot of discussion since any framework must be tailored to the organization to be successful. This approach is based on the experiences gleamed from teaching graduate level computer science courses on protocol and network design, and MBA courses on cybersecurity strategy and management.

    8:00 am
    Are You in a Dysfunctional Relationship with the HR Department?
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    When HR and security teams understand their respective roles, value each other, and have an open, productive partnership, life is good. They can help each other be more effective and complement each other’s functions. Unfortunately, that symbiotic state can be hard to achieve. For security teams, HR folks can be hard to understand. Sometimes they seem like a great advocate for security, and at other times they can seem more like a blocker of our efforts to better secure the organization.

    For HR professionals, dealing with the security team can be a challenge. For example, the security team might send out an emotionally-triggering simulated phish to everyone in the organization, causing numerous employee complaints that HR has to manage. So what can you do if you don’t have the best relationship with the HR team?

    This talk, based on years of experience navigating the relationship between HR and security teams, will cover the issues that cause the biggest disconnects between HR and security. We’ll look at the issues from both sides and cover proposed solutions for each. Improving the relationships for both departments can lead to happier HR and security professionals who are more effective in their roles, and a company that’s better protected and prepared against cyber threats.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Cybercrime: Protecting Vulnerable Communities in New England
    • session level icon
    speaker photo
    CIO & Commissioner, Department of Information Technology, State of New Hamsphire
    speaker photo
    CISO, State of Connecticut
    speaker photo
    Commonwealth CISO & Chief Risk Officer, Massachusetts Executive Office of Technology Services and Security
    speaker photo
    CISO, State of New Hamsphire
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    As cybercrime evolves, vulnerable communities across New England face increasing risks, from phishing scams targeting seniors to ransomware attacks on small municipalities. This panel brings together CISOs and a CIO from New England states to discuss the unique challenges and strategies for safeguarding these communities. Our panelists share insights on regional collaboration, public-private partnerships, and proactive measures to strengthen cybersecurity resilience. Come ready to gain a deeper understanding of how state governments are working to protect their most at-risk populations and critical infrastructures.

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    What Are We Looking For? Navigating Cybersecurity Priorities
    • session level icon
    speaker photo
    CISO, Massachusetts Bay Transportation Authority (MBTA)
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    This session provides a unique perspective on how the CISO of the MBTA navigates cybersecurity challenges in critical infrastructure. Scott Margolis will delve into managing an ever-evolving threat landscape with constrained resources while prioritizing safety, operational resilience, and the secure, effective use of digital assets. Attendees will learn practical strategies for balancing risks and focusing efforts on actions that have the greatest impact on protecting vital operations and ensuring continuity.

    10:15 am
    [Panel] Beyond the Single Point of Failure
    • session level icon
    Lessons from Recent Vendor Incidents and Strategies for Resilience
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    Recent incidents involving major cybersecurity vendors like CrowdStrike and Microsoft have highlighted the critical issue of single-point failures in our digital defense ecosystems. This panel session delves into the aftermath of these events and explores the broader implications for organizational cybersecurity strategies. Our expert panel discusses:

    • The dangers of over-reliance on single vendors: Exploring the risks associated with putting all your security eggs in one basket.
    • Developing a multi-vendor strategy: Balancing the benefits of integrated solutions with the need for redundancy and resilience.
    • Incident response planning: Preparing for vendor-related outages or failures as part of your overall cybersecurity strategy.
    • Future outlook: How the industry might evolve to address these challenges.

    Gain valuable insights into creating more resilient security architectures that can withstand vendor-specific incidents.

    10:15 am
    The Evolution of SaaS Security: From Breaches to Resilience
    • session level icon
    speaker photo
    Head of Product, AppOmni
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    As SaaS adoption accelerates, so do the risks—31% of organizations have already faced a SaaS-related data breach. This session explores emerging SaaS security threats, common misconfigurations, and evolving attacker tactics. By leveraging AppOmni’s insights, we’ll cover proactive threat detection and risk mitigation strategies to help you safeguard critical data and maintain business resilience in today’s dynamic threat landscape.

    10:15 am
    Harnessing Data Analytics for Robust Fraud Detection and Prevention
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Session description to come.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    RedShifting Left: Rethinking DevSecOps in the Age of AI Software Development
    • session level icon
    speaker photo
    CISO, Advarra
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    As AI continues to reshape the software development landscape, traditional DevSecOps practices must evolve to meet new challenges. This presentation will explore the integration of AI technologies into DevSecOps pipelines, highlighting how security, automation, and collaboration can be redefined for the next generation of AI-driven software. Attendees will learn how to balance innovation with security, navigate emerging risks, and optimize workflows for AI-centric development environments. By understanding the unique requirements of AI software, organizations can better protect their systems while accelerating delivery.

    Key takeaways from this session include:

    • Strategies for balancing the age-old tension with innovation and security
    • The role of automation and AI in enhancing DevSecOps processes
    • Adapting DevSecOps to secure AI-driven development workflows
    • How to mitigate new risks in AI-powered software system development
    11:10 am
    Bridging the Gap: Communicating Security Risk to Non-Technical Stakeholders
    • session level icon
    speaker photo
    Vice President, Security, Net Health
    speaker photo
    Sr. Vice President, Information Security, Semrush
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    As cybersecurity professionals, we know that technical risks can have profound business implications. But translating these risks into language that resonates with non-technical stakeholders – like executives, board members, or cross-functional leaders – remains a critical challenge. This session explores how to bridge the gap between technical jargon and business priorities to drive meaningful action. Key takeaways include:

    • Speaking Their Language: Learn how to frame cybersecurity risks in terms of business impact, such as financial, operational, and reputational consequences, rather than technical vulnerabilities.
    • Visualizing Risk: Discover tools and techniques for presenting complex risk assessments through storytelling, metrics, and visuals that engage and inform non-technical audiences.
    • Building Trust and Buy-In: Understand how to position cybersecurity as a business enabler, not a cost center, to gain alignment and support from decision-makers.
    • Adapting to Stakeholder Perspectives: Master the art of tailoring your communication style to diverse audiences, from risk-averse executives to budget-conscious financial officers.

    Whether you’re pitching a budget increase for security initiatives or explaining the implications of a recent threat, this session equips you with strategies to ensure your message lands effectively and inspires informed decision-making.

    11:10 am
    Micro Segmentation: What You Need to Know
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Session description to come.

    11:10 am
    [Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and Resilience
    • session level icon
    speaker photo
    Director, Solutions Engineering, Pentera
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    Today’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.

    12:00 pm
    [Lunch Keynote] Learning How to Story Tell to Move Cybersecurity Forward
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Session description to come.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    A CISO's Guide to What Works in the Real World to Defeat Ransomware
    speaker photo
    Data-Driven Defense Evangelist, KnowBe4
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Ransomware attacks are causing significant financial and operational damage to organizations around the world. In this roundtable, we’ll look at tactics that have proven to defeat ransomware – and which have missed the mark.

    This moderated interactive discussion tackles how to stop, detect, and mitigate ransomware. As leaders in the trenches, come ready to share and learn which steps you can take to transform security from a mere compliance exercise into a cornerstone of your company’s resilience and long-term success. Don’t miss this opportunity to have a peer-to-peer conversation on how to safeguard your organization from today’s most pervasive cyber threats.

    Sponsored by:

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Principle-Based Leadership: Recruiting and Retaining Top Talent
    • session level icon
    speaker photo
    VP, Global Security & Privacy, SharkNinja
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Technology alone cannot safeguard your organization – your people are your most important security tool. This session dives into the essence of principle-based leadership and its transformative role in recruiting, developing, and retaining top cybersecurity talent.

    Brian explores:

    • Why People Are Key: Cybersecurity tools and systems are only as effective as the individuals managing them. Learn how to prioritize your human resources as the linchpin of a resilient security strategy.
    • Leadership Essentials: Discover the leadership skills and practices security leaders need to inspire and cultivate high-performing teams. From fostering continuous learning opportunities to providing meaningful feedback, we’ll discuss actionable strategies for employee development.
    • Clear Communication for Team Success: Great leadership requires clarity and alignment. This session will unpack how to communicate priorities effectively, align team members with your security goals, and create an environment where every individual understands their contribution to organizational success.

    Join the session for practical insights into fostering a culture where top talent thrives, enabling your security team to become a competitive differentiator.

    1:15 pm
    Get to Know, and Get Along with, Your General Counsel and CFO
    • session level icon
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Session description to come.

    1:15 pm
    Building a Strong Defense with PCI Compliance
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    As the cybersecurity landscape evolves, the associated PCI requirements supporting those security considerations are also changing. Is your organization well positioned to adapt to the updated guidance issued with version 4.0.1 and the upcoming implementation deadlines for the March 31, 2025, requirements? This presentation explores the essential quick wins for payment card security and PCI compliance related to the new version, 4.0.1, and how to best guard your cardholder data without committing the whole IT team defensive line to compliance-related tasks.

    Key topics include:

    • Rule Changes: Updates to PCI DSS in version 4.0.1
    • Game Footage: Common High-Risk Misses
    • Away Games: Future Dated (2025) Requirements
    1:15 pm
    [Panel] Guardians of the Cyber Realm: Building Castles in the Cloud
    • session level icon
    speaker photo
    Vice President, Sales, Zluri
    speaker photo
    CISO, Advent International
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    As organizations migrate to the cloud, securing these virtual kingdoms requires a blend of innovation and vigilance. This panel will explore the challenges of cloud security, from defending against breaches to managing access, and how organizations can build cloud “castles” that are both robust and adaptable in the face of evolving threats.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    Digital Desperados: A Citizen’s Guide to Cybercrime in the Crypto Age
    • session level icon
    speaker photo
    Special VP, Board of Directors, InfraGard National Members Alliance; Chairman, American Security and Resilience Foundation
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    This session unveils the latest trends in cyber threats and equips attendees with practical strategies to protect themselves and their organizations in an increasingly connected world. The session explores:

    • The alarming 257% increase in cryptocurrency-related phishing attempts over the past year
    • How cybercriminals are adapting to the volatile crypto market, with North Korean state-sponsored actors stealing $1.34 billion in cryptocurrency this year alone
    • The shift toward stablecoins as the preferred currency for illicit transactions
    • The rise of AI-powered malware and deepfake fraud in the crypto space
    • Practical tips to safeguard your digital assets and crypto wallets

    Whether you’re a crypto enthusiast or a concerned citizen, you’ll gain valuable insights into the evolving landscape of cybersecurity in the age of digital currencies. Don’t miss this opportunity to strengthen your personal and business cyber defenses and become a proactive guardian of you and your organization’s online presence in the face of increasingly sophisticated digital desperados.

    2:10 pm
    Managing AI Platform Risk: How Security and Engineering Partner to Deliver Trusted Models
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    This panel discusses why trust is so important to Salesforce and how we approach securing our Generative AI offerings for our customers. The panelists share best practices, tooling, and pitfalls to avoid along the way.

    2:10 pm
    Securing Success: The Impact of Networking, Education, and Certifications in Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    Session description to come.

    2:10 pm
    How to Build Trustworthy and Secure AI Systems: Key Frameworks & Vulnerabilities You Need to Know
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    The advancements of artificial intelligence (AI) have taken both popular culture and almost every industry by storm, due to the technology’s far-reaching abilities to augment human skills and bring safety and efficiency to several areas of our everyday lives. But these systems also bring with them a wealth of challenges, from ethics to security. We must be just as concerned about an organizations’ use of AI in critical workflows as we should be about LLMs disclosing sensitive data. How we evaluate these systems security, resilience, and robustness will be driven by well-established bedrock principles in both audit and assessments.

    3:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 4:15 pm

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

     

    3:30 pm
    [Closing Keynote] The Shared Responsibility Model – Can We Make It Work?
    • session level icon
    speaker photo
    CEO, EMC ADVISORS; Former Chief Security & Risk Officer, Microsoft Cloud
    Registration Level:
    • session level iconOpen Sessions
    3:30 pm - 4:15 pm

    For years, we have touted the promise of shared responsibility and collective preparedness and, perhaps, even getting to the promised land of Predictive Risk. As we continue to leverage the power and productivity of the cloud, and demand even more compute and storage capacity than ever before with the pull from LLMs, Edna Conway shares the stark reality of why she believes we are at a critical inflection point. In this facilitated conversation, she shares thoughts on the potential of today’s critical inflection point which can turn on the power of true shared responsibility and ensure that AI data accuracy will not thwart us!

    3:45 pm
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future - Part 2
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    3:45 pm - 5:15 pm

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    3:45 pm
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 2
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    3:45 pm - 5:15 pm

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

  • Thursday, March 13, 2025
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future - Part 3
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    7:30 am
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 3
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

    8:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:15 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite Only)
    • session level icon
    Securing the C-Suite: Lessons and Strategies from a High-Profile Attack
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    This session is for SecureWorld Advisory Council members only.

    In the aftermath of the devastating and deplorable attack on a Healthcare Insurance executive, in this workshop we will explore the evolving landscape of executive protection. We’ll examine the lessons learned from the incident and discuss actionable insights for strengthening the security posture of C-suite executives. Participants will gain practical tools for improving executive safety in today’s complex threat environment.

    Key takeaways from this interactive session include:

    • Best practices for executive protection.
    • Strategies for integrating security with executive leadership.
    • Tools for identifying and mitigating emerging security threats.
    8:00 am
    ISSA New England Chapter Meeting
    • session level icon
    Open to all attendees
    speaker photo
    Secretary, Board of Directors, ISSA New England
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    The ISSA-NE Chapter hosts a breakfast roundtable discussion on various security topics, including AI and cyber exercises. David Dumas, Secretary and board member of the chapter, will facilitate the discussion. Please come to the meeting with your questions to be discussed. A continental breakfast will be served. ISSA members and anyone that would like to consider joining the chapter are welcome.

    8:00 am
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:15 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:15 am
    Owning Your Program by Reducing Cyber Risk
    • session level icon
    speaker photo
    Operating Partner | CISO, Welsh, Carson, Anderson & Stowe
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    There are hundreds of security vendors who can sell you their widget; will the tool insulate you from a data breach? Probably not! Get back to basics. Bill walks you through the non-negotiable items that you need in your program to ensure your cyber security program is going in the right direction.

    10:15 am
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    speaker photo
    Partner, YL Ventures
    speaker photo
    VP, IT & Cybersecurity, Inari
    speaker photo
    CISO, Devo
    speaker photo
    Partner, AVA Compliance Solutions
    Registration Level:
    • session level iconConference Pass
    10:15 am - 11:00 am

    This panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.

    10:15 am
    Bug Bounties: Tips from the Triager
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Hear directly how someone who has spent years reviewing and prioritizing bug bounty program submissions approaches the task. In this talk, discover how to craft reports that stand out, ensuring your findings are presented for maximum impact and value. Discover the most common pitfalls to avoid, tips on how to structure your reports for clarity and precision, and hear highlights of the key elements triagers focus on to determine the severity and validity of vulnerabilities.

     

    10:15 am
    Tabletop Exercises: The Fun Kind
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:15 am - 11:00 am

    Tabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!

    This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.

    11:00 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:10 am
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    The Intersection of GRC and Information Security: Safeguarding Systems, Data, and Compliance
    • session level icon
    speaker photo
    Director of Security, CISO, Digital Federal Credit Union
    speaker photo
    Security Compliance Team Lead, Commonwealth of Massachusetts, Executive Office of Health and Human Services
    speaker photo
    CISO, Rite Aid Corporation
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    Governance, Risk, and Compliance (GRC) is more than just a regulatory checkbox; it’s a critical framework for protecting information systems and data while ensuring third-party compliance. When effectively implemented, GRC empowers organizations to mitigate risks and align security strategies with business objectives. However, poorly executed GRC processes can lead to compliance failures, operational disruptions, and significant financial consequences. This session dives into:

    • Core Principles of GRC in Information Security: Understand how GRC frameworks support the protection of information systems and sensitive data while addressing third-party compliance requirements.
    • Practical Implementation Strategies: Explore actionable approaches to integrate GRC processes into your information security program without creating unnecessary complexity or friction.
    • The Financial Risks of Poor GRC: Learn how inadequate GRC practices can lead to regulatory fines, reputational damage, and wasted resources—and how strong GRC can protect your bottom line.
    • Balancing Compliance and Security: Discover how to meet compliance obligations without compromising the agility and effectiveness of your security posture.

    Whether you’re establishing a GRC program or seeking to optimize an existing framework, this session provides the insights and tools to align your governance, risk, and compliance efforts with your InfoSec priorities while safeguarding your organization’s financial health.

    11:10 am
    Building Trusted Partnerships to Enable Secure Products
    • session level icon
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:55 am

    In today’s interconnected digital ecosystem, the security of any product is only as strong as its weakest link. This panel session explores the critical role of trusted partnerships in developing and maintaining secure products throughout their lifecycle.

    Our distinguished panel delves into the challenges and opportunities of fostering collaborative relationships between vendors, suppliers, and customers to enhance product security. They examine how these partnerships can lead to more robust security measures, improved threat intelligence sharing, and faster response times to emerging vulnerabilities. Key topics include:

    • Establishing trust in the supply chain
    • Collaborative approaches to secure software development
    • The role of transparency in building and maintaining trust
    • Balancing intellectual property concerns with security needs
    • Leveraging partnerships for more effective incident response
    • Case studies of successful security-focused partnerships
    11:10 am
    Cyber Risk by the Numbers from a Cyber Insurance Perspective
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    You’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.

    11:10 am
    [Panel] The Quest for Cyber Resilience: Surviving the Unexpected
    • session level icon
    speaker photo
    Director, Technical Account Management, Tanium
    speaker photo
    Security Program Manager, Office of the Secretary, Commonwealth of Massachusetts
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:55 am

    The quest for resilience is critical in the face of rising attacks, from ransomware to natural disasters. This panel will discuss how organizations can prepare for the worst, recover quickly, and learn from the past to ensure they are stronger for the battles ahead—turning every trial into a triumph in their cybersecurity story.

    12:00 pm
    [Lunch Keynote] Behavioral Profiling: Know Thine Enemy
    • session level icon
    speaker photo
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    Understanding your adversary is paramount. This keynote session delves into the dark arts of behavioral profiling, providing cybersecurity professionals with the tools to anticipate, analyze, and mitigate attacks. Learn how to:

    • Profile Threat Actors: Identify the distinct behaviors, motivations, and tactics of different attacker groups, from script kiddies to sophisticated nation-state actors.
    • Recognize Attack Patterns: Decipher the telltale signs of malicious activity by analyzing user behavior, network traffic, and system logs.
    • Predict Future Attacks: Anticipate an attacker’s next move by understanding their goals, capabilities, and past behaviors.
    • Strengthen Your Defenses: Develop proactive security measures and incident response strategies based on behavioral insights.

     

    Cameron’s presentation is crucial for security analysts, incident responders, threat hunters, and anyone safeguarding digital assets.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Sponsored by Aembit
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    Sponsored by:

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:15 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:15 pm
    Changing the Cultural Approach Toward Secure Code Development
    • session level icon
    speaker photo
    Sr. Director, Cybersecurity, PCI Energy Solutions
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    The traditional way of repetitious secure code development training and pitching security by design and default is not working when we continually code scan and pen test and find code vulnerabilities due to a lack of adherence to coding standards and best practices.

    Changing the enterprise approach towards secure code development through effective motivation and alignment on rewarding secure code development practices within the annual evaluation and bonus structure.

    1:15 pm
    Tabletop Exercises in Your Pocket
    • session level icon
    speaker photo
    Sr. Program Manager, MassCyberCenter
    speaker photo
    Resiliency Program Manager, MassCyberCenter
    Registration Level:
    • session level iconConference Pass
    1:15 pm - 2:00 pm

    Participate in the play-through of the CyberSecureDeck: Defend the Network Card Game, an interactive tabletop exercise card game, and learn how to identify, protect, respond, and recover from cyberattacks while creating a more cyber-aware culture. During the game, participants will be asked to assume a role in an organization impacted by a simulated cyberattack and discuss cyber incident response actions. Attendees will also be given a copy of the deck so they can facilitate simple tabletop exercises within their own organizations.

    1:15 pm
    Addressing the Cybersecurity Skill Shortage Internally and Externally
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    This presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.

    1:15 pm
    [Panel] The Sorcerer’s Apprentice: Taming AI in Cybersecurity
    • session level icon
    speaker photo
    Head of Trust and Security, Conveyor
    speaker photo
    Partner, Constangy, Brooks, Smith, & Prophet, LLP
    Registration Level:
    • session level iconOpen Sessions
    1:15 pm - 2:00 pm

    AI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.

    2:00 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:10 pm
    Location / Room: Exhibitor Hall

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:10 pm
    The Cybersecurity Mindset: 12 Key Behaviors to Combat Modern Threats
    • session level icon
    speaker photo
    CISO, Executive Office of Economic Development, Commonwealth of Massachusetts
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    As the threat landscape continues to evolve, technical controls alone are not enough – adopting the right cybersecurity behaviors is critical to reducing risk. This engaging session will introduce 12 essential behaviors that cybersecurity professionals should integrate into their daily practice to enhance security culture and resilience. Modeled after proven fraud prevention strategies, these behaviors offer a human-centric approach to mitigating threats like phishing, social engineering, credential theft, and insider risk. Attendees will learn how to operationalize these habits within their organizations, empowering both security teams and end-users to be proactive, rather than reactive, in their cyber defenses. Whether you’re a CISO, security analyst, or IT leader, this session will equip you with actionable insights to strengthen your security posture.

    2:10 pm
    Integrating Transformative OT Cybersecurity Programs
    • session level icon
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:55 pm

    Session description to come.

    2:10 pm
    Social Engineering: Training the Human Firewall
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    Phishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.

    2:10 pm
    Navigating Third-Party Risk and Vendor Resilience
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:55 pm

    In today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.

    To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.

    3:00 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:30 pm
    Location / Room: Exhibitor Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:45 pm
    [PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future - Part 4
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    3:45 pm - 5:15 pm

    Artificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.

    Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.

    This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:

    Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.

    Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.

    Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.

    Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.

    Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.

    3:45 pm
    [PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 4
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    3:45 pm - 5:15 pm

    Have you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?

    In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.

    You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:

    • What are the components of the framework?
    • Why is the framework is valuable?
    • What type of organizations can use the framework?

    Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.

    You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.

    Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.

    We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.

Exhibitors
  • 11:11 Systems
    Booth: 570

    11:11 Systems is a managed infrastructure solutions provider that empowers customers to modernize, protect, and manage mission-critical applications and data, leveraging 11:11’s resilient cloud platform.

  • AccessIT Group
    Booth: TBD

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • Aembit
    Booth: 360

    Aembit is the Identity and Access Management Platform that lets DevOps and Security teams manage, enforce, and audit access between federated workloads. Aembit provides seamless and secure access from your workloads to the services they depend on, like APIs, databases, and cloud resources, while simplifying application development and delivery

  • AppOmni
    Booth: 300

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • Automox
    Booth: TBD

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • Bitdefender
    Booth: 350

    Powered by its depth of security expertise and rapid pace of research and development, Bitdefender’s long-standing mission is to deliver transformative security technologies to the world’s users and organizations. We are innovators, creating breakthrough technology that radically improves our customer’s experience with security.

    From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. We strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.

  • Compyl
    Booth: 535

    Eliminate the need for multiple security tools, gain enterprise-level insights, and grow with a scalable GRC ecosystem. Compyl monitors and assigns workflows in a single location to ensure regulatory requirements and IT frameworks are continuously met by establishing a proper information security foundation across the entire organization.

  • Constangy, Brooks, Smith & Prophete, LLP
    Booth:

    Constangy, Brooks, Smith & Prophete has more than 225 attorneys across 21 states and the District of Columbia, offering services including the defense of single and multi-plaintiff employment discrimination, harassment and retaliation claims; complex wage and hour litigation; workplace safety; affirmative action compliance; workers’ compensation; ERISA and employee benefits; immigration; labor relations; cybersecurity & data privacy.

    We are one of the largest labor and employment law practices in the U.S. Constangy holds a national Tier 1 ranking from the U.S. News & World Report/Best Lawyers Best Law Firms survey, and has been called a “go to” law firm by Corporate Counsel and Fortune magazine. Many of our attorneys have been recognized by leading authorities such as Chambers USA®, The Best Lawyers in America® and Martindale-Hubbell.

  • Contrast Security
    Booth: TBD

    Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.

  • Conveyor Inc.
    Booth: 280

    Conveyor is the leading generative AI-powered platform that automates and scales the most tedious part of the sales process: customer security reviews. Trusted by the world’s top SaaS companies, Conveyor helps vendors build trust with customers while reducing the time spent on the mind-numbing task of sharing security information and answering security questionnaires by over 90%. Through the combination of its automated security questionnaire completion software and its trust portal, which allows documents and security information to be shared easily and securely, Conveyor ultimately helps vendors close sales faster. Conveyor’s lean team has deep and extensive collective experience in security and compliance.

  • Delinea
    Booth: 135

    Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

  • Envision Technology Advisors
    Booth: 278

    Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.

  • ExtraHop
    Booth: TBD

    ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com

  • Fortinet
    Booth: TBD

    Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.

  • HPE Aruba Networking
    Booth: 650

    At Aruba, a Hewlett Packard Enterprise company, we believe the most dynamic customer experiences happen at the Edge—an office, a hospital, a school, or at home. It’s anyplace work gets done and data is generated by users, devices, and things across your network. Our mission is to help customers capitalize on these opportunities by providing secure edge-to-cloud networking solutions. We use AI-based machine learning to deliver simpler, faster, and more automated networks that analyze data to help businesses thrive.

  • HUMAN Security
    Booth: TBD

    HUMAN is a cybersecurity company that safeguards 1,200+ brands from digital attacks including bots, fraud and account abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trilliondigital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN.

  • InfraGard Boston
    Booth: 295

    InfraGard is a United States government (FBI) and private sector alliance. InfraGard Boston was developed by the Boston FBI office in 1998 to promote protection of critical information systems. InfraGard provides formal and informal channels for the exchange of information about infrastructure threats and vulnerabilities. The purpose of the synergistic exchange is to allow members to better protect themselves and their corporate interests while enhancing the ability of the United States government to provide national security.

  • ISACA New England Chapter
    Booth: 105

    The New England Chapter of ISACA® was founded in 1976. From the modest beginnings of its first meeting—which was held at Valle’s Steak House on Route 9 in Newton, Massachusetts—the chapter has grown to over 2000 members across four states (MA, NH, ME, VT).

    The primary objective of the New England Chapter  is to provide quality Information Systems audit and security-related education to support its members and their professional certifications.

  • ISC2 Eastern Massachusetts
    Booth: 220

    Advancing Information Security One Community at a Time
    As anyone seriously involved in the information security profession can attest, peer networking is an invaluable resource. ISC2 Eastern Massachusetts Chapter provide members with the opportunity to build a local network of peers to share knowledge, exchange resources, collaborate on projects, and create new ways to earn CPE credits!

  • ISC2 Maine Chapter
    Booth: 220

    The ISC2 Maine Chapter is a professional association authorized by the ISC2 the World’s Leading Cybersecurity Professional Organization created by ISC2 members and information security professionals living and working in Maine.

    The ISC2 Maine Chapter is dedicated to providing education and regular meetings to help information security professionals in Maine. Our chapter benefits from a diverse membership that works in various organizations across important sectors such as healthcare, financial services, national defense, government, service providers, and many more.

  • ISC2 Rhode Island
    Booth: 159

    The ISC2 Rhode Island Chapter is a professional association authorized by the ISC2 the World’s Leading Cybersecurity Professional Organization created by ISC2 members and information security professionals living and working in Rhode Island.

    Our mission is to help further the profession and understanding of information security by providing professional growth to ISC2 members in Rhode Island in the form of educational presentations, live networking opportunities, and mentorship from our community of information security professionals and enthusiasts.

  • ISSA New England
    Booth: 440

    The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications, and peer interaction opportunities that enhance the knowledge, skills, and professional growth of its members’ information security professionals. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources.

    Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.

    Visit the National Headquarter’s website at www.issa.org.

  • K Logix
    Booth: 640

    K logix is the leading information security company. We provide security consulting, technology solutions, and integration services to enterprise companies. Our experienced team and our established process help enterprise customers make confident security decisions that impact their business goals.

  • KnowBe4
    Booth: 100

    We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.

    KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.

    The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.

    Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.

  • LightBeam.ai
    Booth: 125

    LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.

  • MassCyberCenter
    Booth: TBD

    The MassCyberCenter, launched in September 2017, strives to create a diverse, vibrant, and competitive Massachusetts cybersecurity ecosystem that enhances resiliency for public and private entities, provides workforce development opportunities, and elevates public cybersecurity awareness.

    In 2022, the Massachusetts Legislature codified the establishment of the Center and confirmed its mission of convening the Massachusetts cybersecurity ecosystem to improve cybersecurity resiliency, workforce development, and public awareness within the Commonwealth by developing cutting edge programs, organizing engaging events, and leading collaborative working groups.

    Cybersecurity encompasses the people, process, and technology that provide confidentiality, integrity, and availability of data and critical control systems that keep our Commonwealth running. The Center focuses its activities on balancing the core principles of cybersecurity: People, Process, and Technology.

  • National Cybersecurity Alliance
    Booth: TBD

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • New England Cyber Fraud Task Force (NECFTF)
    Booth: 295

    The NECFTF is composed of officials from state and local law enforcement throughout Massachusetts, New Hampshire, Rhode Island, Vermont and Maine and is charged with preventing, detecting and mitigating complex cyber-crime threatening payment systems and critical infrastructure. The five task force officers represent the Concord Police Department, the Grafton County Sheriff’s Office, the Manchester Police Department and the Nashua Police Department.

  • Nexum
    Booth: 635

    Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, Ohio, and Wisconsin, as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.

  • Orca Security
    Booth: 655

    We’re on a mission to make it fast, easy, and cost effective for organizations to address the critical security issues in their AWS, Azure, and GCP estates so that they can operate in the cloud with confidence.

  • Pentera
    Booth: 290

    Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale.

    Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited.

  • Rapid7
    Booth: 512

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • SecurityScorecard
    Booth: TBD

    SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.

  • Securonix
    Booth: 212

    Securonix is redefining threat detection and response for today’s hybrid cloud, data-driven enterprise. Securonix Next-Gen SIEM and XDR are powered by the most advanced analytics and built on a scalable, flexible cloud native architecture. Securonix leverages behavioral analytics technology that pioneered the UEBA category to reduce noise, prioritize high fidelity alerts, and enable fast and precise response to insider and cyber threats.

  • Seemplicity
    Booth: 260

    Seemplicity offers a risk reduction and productivity platform that streamlines the way security teams manage risk reduction. By orchestrating, automating, and consolidating all remediation activities into a single workspace, Seemplicity is revolutionizing the way security teams drive and scale risk reduction efforts across organizations.Seemplicity streamlines and collaboratively transforms the remediation process for developers, DevOps, and IT across the organization, assisting them in achieving complete operational resilience and establishing a truly scalable security program.

  • Silverfort
    Booth: 315

    Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.

  • Splunk
    Booth: 110

    Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.

  • Tanium
    Booth: 515

    Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).

    The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.

    For more information, visit: https://www.tanium.com.

  • Tevora
    Booth: TBD

    Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.

  • Thales
    Booth: TBD

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • ThreatLocker
    Booth: 105

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Tines
    Booth: 130

    Founded in 2018 in Dublin by experienced security engineers, Tines makes enterprise automation simple.

    Security and operations teams are too often stuck doing manual, repetitive tasks, and we want to change that. Tines is an automation platform designed to allow anyone to automate any manual task, regardless of complexity. No apps, plugins, or custom code required.

    With 1,000+ template options for common security actions, Tines is power and simplicity through direct integration with your existing tools.

  • Trustmi
    Booth: 630

    Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7. Our AI-driven platform instantly detects suspicious activity and human errors by continuously analyzing millions of data points, including vendor actions, emails, files, and payment details. Trustmi helps you accelerate digital transformation by reducing manual verification efforts and enhancing the efficiency and security of your payment processes, ensuring a smarter, faster approach to fraud prevention.

  • Veriti
    Booth: 365

    Veriti is a fast-growing security infrastructure innovator that helps organizations maximize their security posture while ensuring business uptime.

    Integrated with the entire security stack, Veriti provides a consolidated management layer that continually and proactively monitors exposure to threats and provides actionable remediation paths for security gaps and high-risk vulnerabilities across the organization’s infrastructure and attack surface.

  • VIPRE Security Group, Inc.
    Booth: 270

    VIPRE Security Group is a leading provider of internet security solutions that protect businesses and home users from costly, malicious cyber threats. For more than 25 years, VIPRE has provided one of the world’s largest threat intelligence clouds, delivering exceptional protection against today’s most aggressive online threats. Our award-winning portfolio includes next-generation antivirus endpoint cloud and EDR solutions, advanced email security products, threat intelligence for real-time malware analysis, and security awareness training for compliance and risk management.

  • Whistic
    Booth: 612

    Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education.

  • WiCyS Massachusetts Affiliate
    Booth: 195

    The Massachusetts WiCyS Affiliate offers mentoring, learning, networking and career development to professionals at all stages of their cybersecurity careers, Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community of all genders. Our affiliate provides an online community for mentorship, networking, and collaboration as well as local meetups, community awareness programs, and support for other organizations with a common mission to bridge the Cybersecurity workforce gap while addressing diversity and inclusion of women and minorities.

  • Zluri
    Booth: 285

    Next-Gen Identity Governance & Administration platform for IT & Security teams to discover identities & applications, streamline access management, and automate access reviews in one single place

  • Zscaler
    Booth: 295

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Brian McGowan, CISM, Moderator
    VP, Global Security & Privacy, SharkNinja

    Brian currently leads the cybersecurity and privacy program as Vice President, Global Security & Privacy at SharkNinja, a relentless innovator and global leader in the housewares industry. Previously, he served as head of IT security & compliance at Hasbro, where for seven years he led the maturity of a global cybersecurity program designed to meet everchanging cyber risk of a company that evolved from a toy manufacturer to a global entertainment company serving the film, unscripted TV, and online gaming industries. Prior to Hasbro, he served as Director of IT Compliance for Upromise, the Boston-based pioneer of loyalty and 529 college savings programs, where he led development of the company's PCI and SOX compliance programs.

    Brian established himself as a leader in cybersecurity, privacy, and compliance program development. His career path differs from many IT professionals; he started his professional career in technology sales with Cabletron Systems in the mid-90s where he was first exposed to information technology and shifted to a career in IT operations in 2001. He was drawn to the structure of process and controls, which led to a role in IT security & compliance in 2005.

    Brian has a passion for developing teams with a focus on individual team member success and career growth. He attributes relationship and team-building skills developed early in his career as a sales professional as keys to his program development and leadership success.

    Education:
    BS, Management Science, Bridgewater State University
    Executive Leadership Professional Coach Program, AIIR Professional Consulting
    Executive Leadership Certificate, Business Engagement & the Information Security Professional, Tuck School of Business
    Executive Leadership Certificate, Harvard Leadership Management Program

  • speaker photo
    Len Evenchik
    Professor, Boston College, Carroll School of Management

    Professor Len Evenchik has more than 25 years of senior management and engineering experience in industry, government, and academia. He teaches courses on the strategic use of Information Technology (IT) and Data Analytics, and a course on Cybersecurity Strategy and Management. He has also served as the faculty supervisor for experiential learning courses for MBA students.

    Before coming to Boston College, he was the Assistant Dean and founding director of the online education program at Harvard's Division of Continuing Education. Mr. Evenchik managed all aspects of the program from its inception in 1997, when one online course with four students was offered, to an enrollment of over 10,000. He has also taught graduate level computer science courses on Internet protocols and information security at the Harvard Extension School for over 25 years, including the first course at Harvard to use video streaming and multimedia to deliver classroom lectures to online students around the world.

    Mr. Evenchik began his professional career at BBN in Cambridge, where he developed some of the first networking protocols used in the Internet, and then managed the implementation of large commercial networks. He was Director of Communications for the State of Massachusetts where he managed the organization responsible for the strategic planning, implementation, and operation of statewide networks supporting over 15,000 users. His industry experience also includes senior management positions in sales, program management and engineering at both large firms and at a number of venture capital backed startups, one of which had a successful IPO.

    Prof. Evenchik earned three degrees from MIT in the fields of both Engineering and Management. He received a B.S. and an M.S. in Electrical Engineering and Computer Science, and he was awarded a patent based on some of his work while a graduate student. He also earned a B.S from the Sloan School of Management where he worked with Prof. Fischer Black on the first online implementation of the Black-Scholes options model.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Denis Goulet
    CIO & Commissioner, Department of Information Technology, State of New Hamsphire
  • speaker photo
    Gene Meltser
    CISO, State of Connecticut

    Gene Meltser is the Chief Information Security Officer for the State of Connecticut. Gene has over 20 years in security industry, as technical leader, consultant and penetration tester. Prior to joining the State of CT, Gene was the VP of Security Advisory Services at New York City based NCC Group, where he was responsible for leading all aspects of technical security consulting for NCC Group’s East Coast consulting practice.
    Prior to NCC, Gene was a Consulting Practice director at Neohapsis, a pure play security consultancy based in Chicago, IL, which was acquired by Cisco in 2015.
    Prior to Neohapsis, Gene has led and delivered strategic and technical consulting projects and for @stake, a pure play security consultancy based on Boston, MA.

  • speaker photo
    Anthony O'Neill
    Commonwealth CISO & Chief Risk Officer, Massachusetts Executive Office of Technology Services and Security
  • speaker photo
    Ken Weeks
    CISO, State of New Hamsphire

    Ken Weeks is the Chief Information Security Officer for the State of New Hampshire. He spent most of his adult life as a Naval Officer, Special Duty, Cryptology and Information Warfare, and retired as a CAPT (O6). Although most of his time was spent in the Pacific Theater, he also enjoyed several all-inclusive trips to Somalia, Iraq, and Afghanistan. After the Navy, he worked as an Executive Leader of Cyber Operations at the National Security Agency (NSA). Ken spent a couple years in the private sector as a Consultant with Booz Allen Hamilton and then moved to New Hampshire and back into public service. Since he always works in rooms with no windows and under artificial lights, he spends the rest of his time as an avid four seasons outdoor sportsman with his spouse, teenagers and two Irish Wolfhounds.

  • speaker photo
    Lisa Plaggemier, Moderator
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Scott Margolis
    CISO, Massachusetts Bay Transportation Authority (MBTA)

    Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business continuity, and operational efficiency. Reputation for leading new initiatives focused on transforming operations, establishing partner/industry relationships, increasing revenue, and reducing cost and risk exposure. Proactive leader with intense focus on customers and beneficial outcomes.

  • speaker photo
    Panel Discussion
  • speaker photo
    James McLean
    Head of Product, AppOmni
  • speaker photo
    Esmond Kane
    CISO, Advarra

    Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.

  • speaker photo
    Keavy Murphy
    Vice President, Security, Net Health

    Keavy Murphy is a Boston-based security professional currently serving as the Vice President of Security at Net Health. Passionate about cybersecurity, especially for new and emerging companies, she prioritizes using soft skills to manage compliance and risk management effectively in parallel with business objectives. Previously, she served in information security roles at Starburst Data, Cambridge Mobile Telematics, Alegeus and State Street. She enjoys writing about and researching the benefits of effective communication within the security space. Her work has been published in Dark Reading and Info Security Magazine and presented at seminars including the Chief Data and Analytics Officers Conference and FutureCon. She is an active volunteer with Boston Cares, has served in the ISACA Engage Mentor program, and holds both CIPP and CIPM certifications.

  • speaker photo
    Dmitriy Sokolovskiy
    Sr. Vice President, Information Security, Semrush

    Dmitriy is currently a Senior Vice President, Information Security at SEMrush. From 1999 to 2007 Dmitriy had first-hand experience with servers, networks and datacenters, and NOCs and SOCs as he worked and consulted for defense contractors, public and private financial and medical companies, and non-profits. Between 2007 and 2018, Dmitriy spent 11 years at CyberArk software, helping them go public as he was building and managing a cyber-security professional services team, personally participating in incident response and remediation for some of the largest breaches in US history, and then serving as a Cloud Security Architect for SaaS products utilizing CSA CCM and CIS CSC. In 2018, and until summer of 2023, Dmitriy helped Avid Technology, a pioneer and a leader in the movie and music industry since 1987, to establish its information security and product security functions.

    Dmitriy holds Boardroom Qualified Technical Expert (QTE) certification from the Digital Directors Network (DDN) and serves on Advisory Boards for multiple information security start-ups, such as Oort (acquired by Cisco), The Cybernest, Exium, SaaSLicense (acquired by IBM), and advises venture capital, and private equity firms. He is a member of the GIAC Advisory Board, holds the GISF, GCED and CISSP certifications, and served as a SANS Mentor for all three.

  • speaker photo
    Thomas Pore
    Director, Solutions Engineering, Pentera

    Thomas Pore is the Director of Product Marketing at Pentera. He is a network security expert with a 20-year background utilizing NetFlow and packets for network detection & response (NDR), encrypted traffic analysis, ethical hacking, and incident response. His expertise is rooted in diverse experience with product marketing, product management, R&D, solution engineering, and incident response training. Thomas has led incident response training worldwide and has successfully uncovered the underpinnings of intricate infiltrations and advanced persistent threats. He has developed unparalleled insights through his hands-on experience in crisis response and live ransomware situations, becoming an advocate of better-protecting organizations through security control validation.

  • speaker photo
    Panel Discussion
  • speaker photo
    Roger A. Grimes, Moderator
    Data-Driven Defense Evangelist, KnowBe4

    Roger A. Grimes is a Data-Driven Defense Evangelist at KnowBe4. He is a 35-year plus computer security professional, author of 14 books and over 1,400 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. He is the author of the Ransomware Protection Playbook (Wiley) .

    Grimes was previously a weekly security columnist for InfoWorld and CSO magazines from 2005–2019. He regularly presents at national computer security conferences, and has been interviewed by national magazines and radio shows, including Newsweek magazine and NPR’s “All Things Considered.” Roger is known for his often contrarian, fact-filled viewpoints.

  • speaker photo
    Brian McGowan, CISM
    VP, Global Security & Privacy, SharkNinja

    Brian currently leads the cybersecurity and privacy program as Vice President, Global Security & Privacy at SharkNinja, a relentless innovator and global leader in the housewares industry. Previously, he served as head of IT security & compliance at Hasbro, where for seven years he led the maturity of a global cybersecurity program designed to meet everchanging cyber risk of a company that evolved from a toy manufacturer to a global entertainment company serving the film, unscripted TV, and online gaming industries. Prior to Hasbro, he served as Director of IT Compliance for Upromise, the Boston-based pioneer of loyalty and 529 college savings programs, where he led development of the company's PCI and SOX compliance programs.

    Brian established himself as a leader in cybersecurity, privacy, and compliance program development. His career path differs from many IT professionals; he started his professional career in technology sales with Cabletron Systems in the mid-90s where he was first exposed to information technology and shifted to a career in IT operations in 2001. He was drawn to the structure of process and controls, which led to a role in IT security & compliance in 2005.

    Brian has a passion for developing teams with a focus on individual team member success and career growth. He attributes relationship and team-building skills developed early in his career as a sales professional as keys to his program development and leadership success.

    Education:
    BS, Management Science, Bridgewater State University
    Executive Leadership Professional Coach Program, AIIR Professional Consulting
    Executive Leadership Certificate, Business Engagement & the Information Security Professional, Tuck School of Business
    Executive Leadership Certificate, Harvard Leadership Management Program

  • speaker photo
    Konnor Andersen
    Vice President, Sales, Zluri

    Konnor is the Vice President of Worldwide Sales & Partnerships at Zluri, an identity security platform helping IT and security teams manage and secure SaaS applications. With nearly a decade in tech sales and leadership—from early-stage startups to $10B+ public companies—he brings extensive experience in scaling teams and driving growth. Konnor is passionate about building high-performing teams and shares insights on leadership and team building in today’s dynamic workplace.

  • speaker photo
    Christine Nagy, Moderator
    CISO, Advent International
  • speaker photo
    Gene Kingsley
    Special VP, Board of Directors, InfraGard National Members Alliance; Chairman, American Security and Resilience Foundation

    As an experienced information security strategist and collaborative executive leader, Gene Kingsley builds and leads scalable, highly effective cybersecurity programs that enable organizations to protect their intellectual property and maintain critical operations while maximizing profitability. Gene is passionate about designing secure, compliant infrastructures that proactively mitigate potential risk, preparing organizations across diverse industries for incident response, disaster recovery, and sustained business continuity.

    Gene’s robust industry experience gives him a comprehensive view of the broader security landscape, informing his innovative and collaborative approach. He began his career in IT help desk and operations roles and continuously progressed into information security leadership positions across the higher education, healthcare, and financial services industries.

    One of Gene’s greatest accomplishments was developing and launching a security-as-a-service program for the University of Massachusetts in 2015, known as the Massachusetts Advanced Secure Technologies (MAST) program. He was recognized by the governor of Massachusetts in 2017 for this effort. To this day, MAST provides crucial security support to 501(c)3 nonprofits and institutions of higher education as well as local municipalities and government organizations at the request of the Massachusetts governor.

    During his tenure with Reliant Medical Group, Gene managed the cybersecurity and data protection practice across 23 urgent care clinics and hospital facilities, ensuring the uninterrupted functionality of the critical operational infrastructure and healthcare platforms required for ongoing patient care. In this role, Gene managed the oversight and mitigation of potential HIPAA concerns and ensured continuous alignment with the requirements of a highly regulated environment.

    In his most recent role with Farm Credit Financial Partners, Gene supported six separate farm credit associations and agricultural banks across the US. He designed and proposed a consolidated information security strategy that was accepted and even championed by the leaders of all six partners on the first draft, demonstrating his ability to navigate the competing priorities of multiple stakeholders while influencing the adoption of new processes that optimize the organizational security posture.

    A common thread throughout each of Gene’s experiences has been his willingness to educate and drive awareness around information security and cloud computing practices. He has created and led tabletop incident response exercises, and since 2010 he has been an advisor, keynote speaker, panelist, and workshop facilitator for The Seguro Group. He develops and presents his own content and facilitates certificate-based workshops that are sought after by information security practitioners of all levels at Seguro’s SecureWorld and Secure Plus conferences.

    Gene holds a Master of Science in Communications and Information Management from Bay Path University in Longmeadow, Massachusetts, and an MBA from the University of Massachusetts Isenberg School of Management in Amherst. He has two Global Information Assurance Certifications (GIAC)—Certified Information Security Professional and Certified Forensic Examiner—as well as an ITIL 4th Edition Foundation Certificate in IT Management. Gene is also certified in Risk and Information Systems Control (CRISC) and is a Certified Information Security Manager (CISM). He currently resides in the Springfield, Massachusetts area.

  • speaker photo
    Happy Hour
  • speaker photo
    Edna Conway
    CEO, EMC ADVISORS; Former Chief Security & Risk Officer, Microsoft Cloud

    Edna Conway is expert in identifying future trends and digital paths for business success. She is known for consistently ensuring that security and resiliency are “built in.”

    Not one to sit still after recently “repurposing” from her operating executive roles, Edna is currently CEO of EMC ADVISORS, advising governments, CEOs, enterprises and capital investment organizations. She has served on more than a dozen Boards of Directors, is currently on four, serves on the NYU Tandon School of Engineering Cyber Fellows Advisory Council, as faculty for the Carnegie Mellon University CISO Program and Institute for Applied Network Security, is a Sr. Non-resident Fellow at Carnegie Endowment for International Peace and a member of APCO Worldwide’s International Advisory Council, and… in her “spare time,” she supports the U.S. and NATO Defense and Intelligence Communities and our U.S. National Risk Management Center’s work on Supply Chain and is a Growth Partner at Growth Equity company, Long Ridge Equity partners.

    She previously served as Microsoft’s VP, Chief Security & Risk Officer for Cloud Infrastructure, and Cisco’s Chief Security Officer, Global Value Chain. She was a partner in an international private legal practice and served as Assistant Attorney General for the State of New Hampshire. She holds an AB from Columbia University, a law degree from the University of Virginia, and additional credentials from MIT, Stanford, Carnegie Mellon, and New York University.

    One of the very few cybersecurity and risk executives with this honor, Edna was inducted into the Fortune Most Powerful Women’s Community years ago, and was just inducted into the Global Cybersecurity Hall of Fame in December 2024.

    Edna's list of other awards and recognition are far too long to share completely, but here are just a few:
    • She was the 2023 Institute for Critical Infrastructure Pinnacle Award winner
    • Named a Supply & Demand Chain Executive Pros to Know multiple times
    • She is one of Mission Critical’s Top 25 Women in Technology
    • An Information Systems Security Association Hall of Fame Inductee
    • Was Named #5 in The Top 50 Women Leaders in SaaS
    • Is a Fed 100 Award Recipient

    But if you ask her what her favorite recognition is, she will admit it is the Machine to Machine & IOT Trailblazer award she received longer ago than she is willing to share, and long before AI/ML was cool.

  • speaker photo
    Esmond Kane, Moderator
    CISO, Advarra

    Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Esmond Kane, Moderator
    CISO, Advarra

    Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.

  • speaker photo
    David Dumas, Host
    Secretary, Board of Directors, ISSA New England

    David Dumas, CISSP, CISM, ISSA Distinguished Fellow. David is a Senior Principal in Security Risk Management for Verizon's Wireline Security Operations group. He has 32 years in the security field, working at Digital Equipment and Verizon. He has been on the ISSA New England Chapter Board since 1998.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Bill Bowman
    Operating Partner | CISO, Welsh, Carson, Anderson & Stowe

    Bill Bowman built the information security programs as the initial cybersecurity leader at Bright Horizons, Houghton Mifflin Harcourt, Eze Software, ZoomInfo, and Emburse. With over two decades of experience creating cybersecurity programs that meet rigorous certifications such as PCI, ISO 27001, ISO 27701, SOC 1, and SOC 2, he has consistently satisfied both client demands and regulatory requirements.

    Bowman is passionate about data privacy, having established the Office of the Data Protection Officer at two organizations. His leadership has also contributed to the success of four companies that have exited private equity. Over the past 14 years, he has cultivated a strong network of security leaders, following his role as the founding President of the ISC2 Eastern Massachusetts chapter.

  • speaker photo
    Andy Ellis
    Partner, YL Ventures

    Andy Ellis is a seasoned technology and business executive with deep expertise in cybersecurity, managing risk, and leading an inclusive culture. He is the author of 1% Leadership, Partner at YL Ventures, and is an advisor to cyber security startups. He is the founder and CEO of Duha, a boutique advisory firm focused on providing strategic consulting in the areas of Leadership, Management, Cybersecurity, Technology Risk, and Enterprise Risk Management.

    Widely respected across the cybersecurity industry for his pragmatic approach to aligning security and business needs, Andy regularly speaks and writes on cybersecurity, leadership, diversity & inclusion, and decision-making. Ellis previously served as the Chief Security Officer of Akamai Technologies, where he was responsible for the company’s cybersecurity strategy, including leading its initial forays into the cybersecurity market. In his twenty-year tenure at Akamai, Andy led the information security organization from a single individual to a 90+ person team, over 40% of whom were women.

    Andy has received a wide variety of accolades, including the CSO Compass Award, Air Force Commendation Medal, Spirit of Disneyland Award, Wine Spectator Award of Excellence (for The Arlington Inn), the SANS DMA Podcast of the Year (for Cloud Security Reinvented), and was the winner of the Sherman Oaks Galleria Spelling Bee. He was inducted into the CSO Hall of Fame in 2021.

    After receiving a degree in computer science from MIT, Andy served as an officer in the United States Air Force with the 609th Information Warfare Squadron and the Electronic Systems Center.

  • speaker photo
    Ben Howard
    VP, IT & Cybersecurity, Inari

    Ben originally asked ChatGPT to write his bio, but felt it was self-aggrandizing, pompous, and unbearably long. After many efforts to tell ChatGPT to tone it down a bit, he gave up and wrote it himself. Ben is a Cybersecurity and IT leader with over 25 years of experience. He specializes in rapidly maturing cybersecurity programs from scratch, aka getting bored with mature programs and starting over somewhere new. The result is a wide variety of experiences across industries in both public and private sectors. Ben has a passion for teaching that extends beyond standard security awareness training. In the "before times", Ben was a SCUBA instructor and taught Microsoft technical certifications. He is a board member of a local charity supporting elementary school aged children, of which he has three.

  • speaker photo
    Kayla Williams
    CISO, Devo

    Kayla is the CISO at Devo Technology, a cloud-native security data analytics platform. She is an analytical and results-driven professional with experience in management of cybersecurity incidents, compliance management, corporate risks, information security, project and program management, and organizational controls surrounding many different aspects of business. Kayla also is accomplished in the development of key methods for organizations to strengthen productivity, enhance operational performance, and improve financial and operational controls.

    Prior to this role, Kayla was the director of GRC at LogMeIn, a $1b global SaaS company, and the senior risk manager for Computershare, US, a global financial services company, where she was responsible for supporting the development, implementation, and monitoring of operational, financial, compliance, and IT risk. Additionally, she worked directly with executive management to identify, assess, and establish mitigation strategies for any risk that arose from inadequate or failed processes, people, systems, or external events, while maintaining a balance between risk mitigation and operational efficiency. This enabled executive management to make informed decisions about the risk posture of the organization and dedicate resources to key areas to minimize critical and high risk to business operations.

    Kayla currently resides in Boston, Massachusetts, USA, and Alfreton, Derbyshire, UK.

  • speaker photo
    Val Dobrushkin, Moderator
    Partner, AVA Compliance Solutions

    Val Dobrushkin is an experienced cybersecurity and governance professional, whose career has spanned working at startups, Fortune 500 companies, and the U.S. government. His specialty is crafting Governance, Risk and Compliance (GRC) programs for startups, through which he has facilitated IPOs and multimillion dollar acquisitions. Val is also a founding partner of AVA Compliance Solutions, a consulting company offering bespoke GRC program design and corporate training.

    Val is passionate about the nexus of technology, empathy, connection, and improving the human experience. He continues to mentor the next generation of creative thinkers in cybersecurity by facilitating one on one meetings, groups, and presenting at conferences. A lifelong learner, Val aims to continue exploring the world, writing novels, running Dungeons and Dragons campaigns, and playing soccer.

  • speaker photo
    Benjamin Corman
    Director of Security, CISO, Digital Federal Credit Union

    Ben has had a lifelong love of all things technical and has been an IT and Security professional for over 15 years. For the last 12 years he has been in the credit union industry and has been involved in an array of different projects and solutions. From core platform, networking, and system operations, to working on custom developed applications and with startups and Fintechs. He has been a presenter at CUNA Technology Council and CUIntersect. Most recently, Ben has been involved in security evolution, as it extends beyond the traditional boundaries, and into the wider world.

  • speaker photo
    James Cusson
    Security Compliance Team Lead, Commonwealth of Massachusetts, Executive Office of Health and Human Services
  • speaker photo
    Ravi Thatavarthy
    CISO, Rite Aid Corporation

    Ravi currently serves as CISO at Rite Aid. With 30k+ employees and multi million customers and a noble purpose of helping you achieve whole health for life, Ravi is helping with transforming their Information Security Program. Ravi served as the VP & CISO of BJ's Wholesale Club where his responsibilities included information security, policy, compliance, and privacy chain-wide for all clubs, gas stations, and the company’s online presence - BJs.com and BJ's mobile. At BJ's, Ravi played a critical role in helping with the company’s digital transformation journey, cloud transformation, and enhanced In-club experiences, including buy-online-pickup-in-the-club, curbside pickup, and express pay, to name a few. Prior to BJ's, Ravi served as Chief Information Security Officer at iRobot, heading both IT and Product Security. He brings with him more than 20 years of experience in information security and possesses a strong background in both technology leadership and building security programs from the ground up.

  • speaker photo
    Benson Kamau
    Director, Technical Account Management, Tanium

    Benson has been in the tech space for over 15 years. His background is in system engineering, where he helps install, configure, and maintain on premise and cloud infrastructure. He has held positions at Veracode, Edelman Financial engineers, and presently at Tanium.

  • speaker photo
    Mike Ste Marie, Moderator
    Security Program Manager, Office of the Secretary, Commonwealth of Massachusetts

    Mike has more than 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a Masters in Information Assurance from Norwich University and has been a long time member of the SecureWorld Boston Advisory Council.

  • speaker photo
    Cameron H. Malin
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi

    Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.

    During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.

    He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
    Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).

  • speaker photo
    Peter Samoray
    Sr. Director, Cybersecurity, PCI Energy Solutions

    Peter Samoray serves as a Senior Director of Cybersecurity at PCI Energy Solutions overseeing all aspects of strategic and operational security services. Peter comes from a very diverse security background with over 18 years of cybersecurity and technology experience across multiple industry sectors serving in various areas including operations, development, architecture, incident response, red/blue teams, and governance, risk & compliance roles. Peter has also served as a Data Protection Officer (DPO) at Relic Law PLLC for the last four years advising on cybersecurity and data privacy regulations to multiple clients.

    Peter holds a Master’s Degree in Computer Information Systems from the University of Detroit Mercy, a Bachelor of Arts from Wayne State University, and a Certificate in Change Leadership from Cornell University. Peter has certifications for CISSP, CISM, CRISC, CISA, CIPP/US, CIPP/EU, and PMP.

  • speaker photo
    Max Fathy
    Sr. Program Manager, MassCyberCenter

    Max Fathy is responsible for supporting the MassCyberCenter’s workforce development efforts, including the Commonwealth Security Operations Center and Cyber Range Initiatives, the Cybersecurity Mentorship Program, and the Cybersecurity Training and Education Working Group, and building stronger relationships with the private sector cybersecurity community. Prior to joining the MassCyberCenter, Max worked as a Manager of Government Relations and Public Policy for ML Strategies, where he advised private sector companies across a range of industries on state and local public policy in Massachusetts. Max holds a Master of Arts in Law and Diplomacy with a focus on International Security and Technology Policy from the Fletcher School of Law and Diplomacy at Tufts University. During his studies at Fletcher, he served as a Rosenthal Fellow in the Office of the Under Secretary of Defense for Policy in the United States Department of Defense. He also received his B.A. in International Relations from Tufts.

  • speaker photo
    Meg Speranza
    Resiliency Program Manager, MassCyberCenter

    Meg Speranza is responsible for improving the collaboration, transparency, and effectiveness of the Massachusetts cybersecurity ecosystem in order to foster ‘cyber resiliency’ across the Commonwealth of Massachusetts’ key institutions and systems, including municipalities, businesses, critical infrastructure, and non-profit organizations. Prior to joining the MassCyberCenter, Meg had a successful 25-year business career working for several global high-tech companies, owning and operating a small retail business, and overseeing educational fundraising before pursuing a career in cybersecurity. Meg holds a Master’s degree in Cybersecurity Policy and Governance from Boston College and a Bachelor’s of Science in Business Management from Babson College.

  • speaker photo
    Panel Discussion
  • speaker photo
    Joe Veroneau
    Head of Trust and Security, Conveyor

    Joe is a risk management professional with experience across many security, risk and compliance domains. Past roles include advising on GRC software implementations at highly regulated customers and supporting data protection efforts at Aptible, a HITRUST Certified Platform-as-a-Service. Joe currently leads the Trust & Security function at Conveyor, an AI agent company automating the customer security review process and he regularly participates in and presents at regional and national ISACA events.

  • speaker photo
    Ryan Steidl
    Partner, Constangy, Brooks, Smith, & Prophet, LLP

    Ryan is a member of the Constangy Cyber Team in Seattle, specializing in compliance advisory services for data privacy and cybersecurity. He serves his clients in assessing, implementing, and enhancing their information governance programs under state, federal, and international laws.

    Prior to Constangy, Ryan served eight years at Grant Thornton as a founding member of their Cyber Risk practice. He has extensive experience advising large Fortune 500 multinationals to small start-ups on operationalizing data privacy to meet complex regulatory requirements and advancements in emerging technologies.

    Ryan teaches courses on global privacy law, data science and ethics at Seattle University. He holds a Juris Doctor and MBA from the University of Maryland and is a Certified Information Privacy Professional (CIPP/E).

  • speaker photo
    Mark Annati
    CISO, Executive Office of Economic Development, Commonwealth of Massachusetts

    Mark Annati is an experienced IT and cybersecurity leader, currently CISO for the Executive Office of Economic Development, Commonwealth of Massachusetts. A board member of InfraGard Boston, he previously served as CISO for advansappz.com and Extreme Reach. With over 20 years in IT security and two successful startups, Mark has led security operations, risk management, enterprise IT, and cloud initiatives. A former U.S. Navy submariner, he values teamwork, strategic planning, and continuous learning. Holding CISSP and SSCP certifications, he is passionate about aligning security with business goals and advancing security awareness.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.