- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Wednesday, March 12, 20257:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 4:15 pmLocation / Room: Registration Desk / LobbyCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 am[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future - Part 1Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
7:30 am - 9:00 amArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
7:30 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 1vCISO, Cyber Risk Opportunities LLCRegistration Level:- SecureWorld Plus
7:30 am - 9:00 amHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Boardroom Bootcamp: Mastering the CISO's MessageVP, Global Security & Privacy, SharkNinjaRegistration Level:- VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
Presenting cybersecurity strategies and risks to the board of directors is one of the most high-stakes responsibilities for CISOs. Yet, translating technical jargon into actionable business insights can be a daunting challenge. This closed-door roundtable discussion brings together seasoned CISOs to share their experiences, strategies, and tips for effectively communicating with board members.
From aligning cybersecurity metrics with business goals to handling tough questions about ROI and risk tolerance, this session explores practical approaches to building trust and influencing decision-makers at the highest levels. Leave with actionable advice on how to craft compelling narratives, leverage visuals and data effectively, and create meaningful dialogues with your boards.
8:00 amISACA New England Chapter Meeting (Open to all attendees)Managing the Complexity of Cybersecurity and Privacy in the Real WorldProfessor, Boston College, Carroll School of ManagementRegistration Level:- Open Sessions
8:00 am - 8:45 amManaging cybersecurity in the real world today is all about managing complexity and communications. Managing communications, from an organizational perspective, is exceedingly difficult given the diversity and increasing number of partners, vendors, and industry and government players. The complexity, and the problems that come from it, are driven by the rapidly changing technology, the diversity and scale of the threats, and the wide-ranging and shifting regulatory environment. Given these challenges, which will only grow more difficult with the increasing use of AI, managing cybersecurity and privacy today can only be managed by using a structured approach based on a consistent set of models, tools and frameworks. A simple example of this is the CIA triad, while the CIS Controls, COBIT and NIST CSF provide more elaborate frameworks.
This presentation discusses how to analyze, choose and then implement a small number of frameworks that best meet your organization’s technical, regulatory and management structure. This workshop-style session a lot of discussion since any framework must be tailored to the organization to be successful. This approach is based on the experiences gleamed from teaching graduate level computer science courses on protocol and network design, and MBA courses on cybersecurity strategy and management.
8:00 amAre You in a Dysfunctional Relationship with the HR Department?Executive Director, National Cybersecurity AllianceRegistration Level:- Open Sessions
8:00 am - 8:45 amWhen HR and security teams understand their respective roles, value each other, and have an open, productive partnership, life is good. They can help each other be more effective and complement each other’s functions. Unfortunately, that symbiotic state can be hard to achieve. For security teams, HR folks can be hard to understand. Sometimes they seem like a great advocate for security, and at other times they can seem more like a blocker of our efforts to better secure the organization.
For HR professionals, dealing with the security team can be a challenge. For example, the security team might send out an emotionally-triggering simulated phish to everyone in the organization, causing numerous employee complaints that HR has to manage. So what can you do if you don’t have the best relationship with the HR team?
This talk, based on years of experience navigating the relationship between HR and security teams, will cover the issues that cause the biggest disconnects between HR and security. We’ll look at the issues from both sides and cover proposed solutions for each. Improving the relationships for both departments can lead to happier HR and security professionals who are more effective in their roles, and a company that’s better protected and prepared against cyber threats.
8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Cybercrime: Protecting Vulnerable Communities in New EnglandCIO & Commissioner, Department of Information Technology, State of New HamsphireCISO, State of ConnecticutCommonwealth CISO & Chief Risk Officer, Massachusetts Executive Office of Technology Services and SecurityCISO, State of New HamsphireExecutive Director, National Cybersecurity AllianceRegistration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterAs cybercrime evolves, vulnerable communities across New England face increasing risks, from phishing scams targeting seniors to ransomware attacks on small municipalities. This panel brings together CISOs and a CIO from New England states to discuss the unique challenges and strategies for safeguarding these communities. Our panelists share insights on regional collaboration, public-private partnerships, and proactive measures to strengthen cybersecurity resilience. Come ready to gain a deeper understanding of how state governments are working to protect their most at-risk populations and critical infrastructures.
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amWhat Are We Looking For? Navigating Cybersecurity PrioritiesCISO, Massachusetts Bay Transportation Authority (MBTA)Registration Level:- Conference Pass
10:15 am - 11:00 amThis session provides a unique perspective on how the CISO of the MBTA navigates cybersecurity challenges in critical infrastructure. Scott Margolis will delve into managing an ever-evolving threat landscape with constrained resources while prioritizing safety, operational resilience, and the secure, effective use of digital assets. Attendees will learn practical strategies for balancing risks and focusing efforts on actions that have the greatest impact on protecting vital operations and ensuring continuity.
10:15 am[Panel] Beyond the Single Point of FailureLessons from Recent Vendor Incidents and Strategies for ResilienceRegistration Level:- Conference Pass
10:15 am - 11:00 amRecent incidents involving major cybersecurity vendors like CrowdStrike and Microsoft have highlighted the critical issue of single-point failures in our digital defense ecosystems. This panel session delves into the aftermath of these events and explores the broader implications for organizational cybersecurity strategies. Our expert panel discusses:
- The dangers of over-reliance on single vendors: Exploring the risks associated with putting all your security eggs in one basket.
- Developing a multi-vendor strategy: Balancing the benefits of integrated solutions with the need for redundancy and resilience.
- Incident response planning: Preparing for vendor-related outages or failures as part of your overall cybersecurity strategy.
- Future outlook: How the industry might evolve to address these challenges.
Gain valuable insights into creating more resilient security architectures that can withstand vendor-specific incidents.
10:15 amThe Evolution of SaaS Security: From Breaches to ResilienceHead of Product, AppOmniRegistration Level:- Open Sessions
10:15 am - 11:00 amAs SaaS adoption accelerates, so do the risks—31% of organizations have already faced a SaaS-related data breach. This session explores emerging SaaS security threats, common misconfigurations, and evolving attacker tactics. By leveraging AppOmni’s insights, we’ll cover proactive threat detection and risk mitigation strategies to help you safeguard critical data and maintain business resilience in today’s dynamic threat landscape.
10:15 amHarnessing Data Analytics for Robust Fraud Detection and PreventionRegistration Level:- Open Sessions
10:15 am - 11:00 amSession description to come.
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amRedShifting Left: Rethinking DevSecOps in the Age of AI Software DevelopmentCISO, AdvarraRegistration Level:- Conference Pass
11:10 am - 11:55 amAs AI continues to reshape the software development landscape, traditional DevSecOps practices must evolve to meet new challenges. This presentation will explore the integration of AI technologies into DevSecOps pipelines, highlighting how security, automation, and collaboration can be redefined for the next generation of AI-driven software. Attendees will learn how to balance innovation with security, navigate emerging risks, and optimize workflows for AI-centric development environments. By understanding the unique requirements of AI software, organizations can better protect their systems while accelerating delivery.
Key takeaways from this session include:
- Strategies for balancing the age-old tension with innovation and security
- The role of automation and AI in enhancing DevSecOps processes
- Adapting DevSecOps to secure AI-driven development workflows
- How to mitigate new risks in AI-powered software system development
11:10 amBridging the Gap: Communicating Security Risk to Non-Technical StakeholdersVice President, Security, Net HealthSr. Vice President, Information Security, SemrushRegistration Level:- Conference Pass
11:10 am - 11:55 amAs cybersecurity professionals, we know that technical risks can have profound business implications. But translating these risks into language that resonates with non-technical stakeholders – like executives, board members, or cross-functional leaders – remains a critical challenge. This session explores how to bridge the gap between technical jargon and business priorities to drive meaningful action. Key takeaways include:
• Speaking Their Language: Learn how to frame cybersecurity risks in terms of business impact, such as financial, operational, and reputational consequences, rather than technical vulnerabilities.
• Visualizing Risk: Discover tools and techniques for presenting complex risk assessments through storytelling, metrics, and visuals that engage and inform non-technical audiences.
• Building Trust and Buy-In: Understand how to position cybersecurity as a business enabler, not a cost center, to gain alignment and support from decision-makers.
• Adapting to Stakeholder Perspectives: Master the art of tailoring your communication style to diverse audiences, from risk-averse executives to budget-conscious financial officers.Whether you’re pitching a budget increase for security initiatives or explaining the implications of a recent threat, this session equips you with strategies to ensure your message lands effectively and inspires informed decision-making.
11:10 amMicro Segmentation: What You Need to KnowRegistration Level:- Open Sessions
11:10 am - 11:55 amSession description to come.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceDirector, Solutions Engineering, PenteraRegistration Level:- Open Sessions
11:10 am - 11:55 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] Learning How to Story Tell to Move Cybersecurity ForwardRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterSession description to come.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)A CISO's Guide to What Works in the Real World to Defeat RansomwareData-Driven Defense Evangelist, KnowBe4Registration Level:- VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
Ransomware attacks are causing significant financial and operational damage to organizations around the world. In this roundtable, we’ll look at tactics that have proven to defeat ransomware – and which have missed the mark.
This moderated interactive discussion tackles how to stop, detect, and mitigate ransomware. As leaders in the trenches, come ready to share and learn which steps you can take to transform security from a mere compliance exercise into a cornerstone of your company’s resilience and long-term success. Don’t miss this opportunity to have a peer-to-peer conversation on how to safeguard your organization from today’s most pervasive cyber threats.
Sponsored by:
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmPrinciple-Based Leadership: Recruiting and Retaining Top TalentVP, Global Security & Privacy, SharkNinjaRegistration Level:- Conference Pass
1:15 pm - 2:00 pmTechnology alone cannot safeguard your organization – your people are your most important security tool. This session dives into the essence of principle-based leadership and its transformative role in recruiting, developing, and retaining top cybersecurity talent.
Brian explores:
- Why People Are Key: Cybersecurity tools and systems are only as effective as the individuals managing them. Learn how to prioritize your human resources as the linchpin of a resilient security strategy.
- Leadership Essentials: Discover the leadership skills and practices security leaders need to inspire and cultivate high-performing teams. From fostering continuous learning opportunities to providing meaningful feedback, we’ll discuss actionable strategies for employee development.
- Clear Communication for Team Success: Great leadership requires clarity and alignment. This session will unpack how to communicate priorities effectively, align team members with your security goals, and create an environment where every individual understands their contribution to organizational success.
Join the session for practical insights into fostering a culture where top talent thrives, enabling your security team to become a competitive differentiator.
1:15 pmGet to Know, and Get Along with, Your General Counsel and CFORegistration Level:- Conference Pass
1:15 pm - 2:00 pmSession description to come.
1:15 pmBuilding a Strong Defense with PCI ComplianceRegistration Level:- Open Sessions
1:15 pm - 2:00 pmAs the cybersecurity landscape evolves, the associated PCI requirements supporting those security considerations are also changing. Is your organization well positioned to adapt to the updated guidance issued with version 4.0.1 and the upcoming implementation deadlines for the March 31, 2025, requirements? This presentation explores the essential quick wins for payment card security and PCI compliance related to the new version, 4.0.1, and how to best guard your cardholder data without committing the whole IT team defensive line to compliance-related tasks.
Key topics include:
- Rule Changes: Updates to PCI DSS in version 4.0.1
- Game Footage: Common High-Risk Misses
- Away Games: Future Dated (2025) Requirements
1:15 pm[Panel] Guardians of the Cyber Realm: Building Castles in the CloudVice President, Sales, ZluriCISO, Advent InternationalRegistration Level:- Open Sessions
1:15 pm - 2:00 pmAs organizations migrate to the cloud, securing these virtual kingdoms requires a blend of innovation and vigilance. This panel will explore the challenges of cloud security, from defending against breaches to managing access, and how organizations can build cloud “castles” that are both robust and adaptable in the face of evolving threats.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmDigital Desperados: A Citizen’s Guide to Cybercrime in the Crypto AgeSpecial VP, Board of Directors, InfraGard National Members Alliance; Chairman, American Security and Resilience FoundationRegistration Level:- Conference Pass
2:10 pm - 2:55 pmThis session unveils the latest trends in cyber threats and equips attendees with practical strategies to protect themselves and their organizations in an increasingly connected world. The session explores:
- The alarming 257% increase in cryptocurrency-related phishing attempts over the past year
- How cybercriminals are adapting to the volatile crypto market, with North Korean state-sponsored actors stealing $1.34 billion in cryptocurrency this year alone
- The shift toward stablecoins as the preferred currency for illicit transactions
- The rise of AI-powered malware and deepfake fraud in the crypto space
- Practical tips to safeguard your digital assets and crypto wallets
Whether you’re a crypto enthusiast or a concerned citizen, you’ll gain valuable insights into the evolving landscape of cybersecurity in the age of digital currencies. Don’t miss this opportunity to strengthen your personal and business cyber defenses and become a proactive guardian of you and your organization’s online presence in the face of increasingly sophisticated digital desperados.
2:10 pmManaging AI Platform Risk: How Security and Engineering Partner to Deliver Trusted ModelsRegistration Level:- Conference Pass
2:10 pm - 2:55 pmThis panel discusses why trust is so important to Salesforce and how we approach securing our Generative AI offerings for our customers. The panelists share best practices, tooling, and pitfalls to avoid along the way.
2:10 pmSecuring Success: The Impact of Networking, Education, and Certifications in CybersecurityRegistration Level:- Open Sessions
2:10 pm - 2:55 pmSession description to come.
2:10 pmHow to Build Trustworthy and Secure AI Systems: Key Frameworks & Vulnerabilities You Need to KnowRegistration Level:- Open Sessions
2:10 pm - 2:55 pmThe advancements of artificial intelligence (AI) have taken both popular culture and almost every industry by storm, due to the technology’s far-reaching abilities to augment human skills and bring safety and efficiency to several areas of our everyday lives. But these systems also bring with them a wealth of challenges, from ethics to security. We must be just as concerned about an organizations’ use of AI in critical workflows as we should be about LLMs disclosing sensitive data. How we evaluate these systems security, resilience, and robustness will be driven by well-established bedrock principles in both audit and assessments.
3:00 pmNetworking BreakRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmHappy HourRegistration Level:- Open Sessions
3:00 pm - 4:15 pmJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
3:30 pm[Closing Keynote] The Shared Responsibility Model – Can We Make It Work?CEO, EMC ADVISORS; Former Chief Security & Risk Officer, Microsoft CloudCISO, AdvarraRegistration Level:- Open Sessions
3:30 pm - 4:15 pmFor years, we have touted the promise of shared responsibility and collective preparedness and, perhaps, even getting to the promised land of Predictive Risk. As we continue to leverage the power and productivity of the cloud, and demand even more compute and storage capacity than ever before with the pull from LLMs, Edna Conway shares the stark reality of why she believes we are at a critical inflection point. In this facilitated conversation, she shares thoughts on the potential of today’s critical inflection point which can turn on the power of true shared responsibility and ensure that AI data accuracy will not thwart us!
3:45 pm[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future - Part 2Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
3:45 pm - 5:15 pmArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
3:45 pm[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 2vCISO, Cyber Risk Opportunities LLCRegistration Level:- SecureWorld Plus
3:45 pm - 5:15 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Thursday, March 13, 20257:00 amRegistration openRegistration Level:
- Open Sessions
7:00 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 am[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future - Part 3Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
7:30 am - 9:00 amArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
7:30 am[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 3vCISO, Cyber Risk Opportunities LLCRegistration Level:- SecureWorld Plus
7:30 am - 9:00 amHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
8:00 amExhibitor Hall openRegistration Level:- Open Sessions
8:00 am - 4:15 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite Only)Securing the C-Suite: Lessons and Strategies from a High-Profile AttackCISO, AdvarraRegistration Level:- VIP / Exclusive
8:00 am - 8:45 amThis session is for SecureWorld Advisory Council members only.
In the aftermath of the devastating and deplorable attack on a Healthcare Insurance executive, in this workshop we will explore the evolving landscape of executive protection. We’ll examine the lessons learned from the incident and discuss actionable insights for strengthening the security posture of C-suite executives. Participants will gain practical tools for improving executive safety in today’s complex threat environment.
Key takeaways from this interactive session include:
- Best practices for executive protection.
- Strategies for integrating security with executive leadership.
- Tools for identifying and mitigating emerging security threats.
8:00 amISSA New England Chapter MeetingOpen to all attendeesSecretary, Board of Directors, ISSA New EnglandRegistration Level:- Open Sessions
8:00 am - 8:45 amThe ISSA-NE Chapter hosts a breakfast roundtable discussion on various security topics, including AI and cyber exercises. David Dumas, Secretary and board member of the chapter, will facilitate the discussion. Please come to the meeting with your questions to be discussed. A continental breakfast will be served. ISSA members and anyone that would like to consider joining the chapter are welcome.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:- Open Sessions
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:- Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] You Are Not a CISO, You Are a 'CO IS'Cybersecurity Expert; Author of “Cyber Crisis”Registration Level:- Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
9:45 amNetworking BreakRegistration Level:- Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
10:15 amOwning Your Program by Reducing Cyber RiskOperating Partner | CISO, Welsh, Carson, Anderson & StoweRegistration Level:- Conference Pass
10:15 am - 11:00 amThere are hundreds of security vendors who can sell you their widget; will the tool insulate you from a data breach? Probably not! Get back to basics. Bill walks you through the non-negotiable items that you need in your program to ensure your cyber security program is going in the right direction.
10:15 am[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsPartner, YL VenturesVP, IT & Cybersecurity, InariCISO, DevoPartner, AVA Compliance SolutionsRegistration Level:- Conference Pass
10:15 am - 11:00 amThis panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.
10:15 amBug Bounties: Tips from the TriagerRegistration Level:- Open Sessions
10:15 am - 11:00 amHear directly how someone who has spent years reviewing and prioritizing bug bounty program submissions approaches the task. In this talk, discover how to craft reports that stand out, ensuring your findings are presented for maximum impact and value. Discover the most common pitfalls to avoid, tips on how to structure your reports for clarity and precision, and hear highlights of the key elements triagers focus on to determine the severity and validity of vulnerabilities.
10:15 amTabletop Exercises: The Fun KindRegistration Level:- Open Sessions
10:15 am - 11:00 amTabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!
This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.
11:00 amNetworking BreakRegistration Level:- Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
11:10 amThe Intersection of GRC and Information Security: Safeguarding Systems, Data, and ComplianceDirector of Security, CISO, Digital Federal Credit UnionSecurity Compliance Team Lead, Commonwealth of Massachusetts, Executive Office of Health and Human ServicesCISO, Rite Aid CorporationRegistration Level:- Conference Pass
11:10 am - 11:55 amGovernance, Risk, and Compliance (GRC) is more than just a regulatory checkbox; it’s a critical framework for protecting information systems and data while ensuring third-party compliance. When effectively implemented, GRC empowers organizations to mitigate risks and align security strategies with business objectives. However, poorly executed GRC processes can lead to compliance failures, operational disruptions, and significant financial consequences. This session dives into:
- Core Principles of GRC in Information Security: Understand how GRC frameworks support the protection of information systems and sensitive data while addressing third-party compliance requirements.
- Practical Implementation Strategies: Explore actionable approaches to integrate GRC processes into your information security program without creating unnecessary complexity or friction.
- The Financial Risks of Poor GRC: Learn how inadequate GRC practices can lead to regulatory fines, reputational damage, and wasted resources—and how strong GRC can protect your bottom line.
- Balancing Compliance and Security: Discover how to meet compliance obligations without compromising the agility and effectiveness of your security posture.
Whether you’re establishing a GRC program or seeking to optimize an existing framework, this session provides the insights and tools to align your governance, risk, and compliance efforts with your InfoSec priorities while safeguarding your organization’s financial health.
11:10 amBuilding Trusted Partnerships to Enable Secure ProductsRegistration Level:- Conference Pass
11:10 am - 11:55 amIn today’s interconnected digital ecosystem, the security of any product is only as strong as its weakest link. This panel session explores the critical role of trusted partnerships in developing and maintaining secure products throughout their lifecycle.
Our distinguished panel delves into the challenges and opportunities of fostering collaborative relationships between vendors, suppliers, and customers to enhance product security. They examine how these partnerships can lead to more robust security measures, improved threat intelligence sharing, and faster response times to emerging vulnerabilities. Key topics include:
- Establishing trust in the supply chain
- Collaborative approaches to secure software development
- The role of transparency in building and maintaining trust
- Balancing intellectual property concerns with security needs
- Leveraging partnerships for more effective incident response
- Case studies of successful security-focused partnerships
11:10 amCyber Risk by the Numbers from a Cyber Insurance PerspectiveRegistration Level:- Open Sessions
11:10 am - 11:55 amYou’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.
11:10 am[Panel] The Quest for Cyber Resilience: Surviving the UnexpectedDirector, Technical Account Management, TaniumSecurity Program Manager, Office of the Secretary, Commonwealth of MassachusettsRegistration Level:- Open Sessions
11:10 am - 11:55 amThe quest for resilience is critical in the face of rising attacks, from ransomware to natural disasters. This panel will discuss how organizations can prepare for the worst, recover quickly, and learn from the past to ensure they are stronger for the battles ahead—turning every trial into a triumph in their cybersecurity story.
12:00 pm[Lunch Keynote] Behavioral Profiling: Know Thine EnemyCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:- Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterUnderstanding your adversary is paramount. This keynote session delves into the dark arts of behavioral profiling, providing cybersecurity professionals with the tools to anticipate, analyze, and mitigate attacks. Learn how to:
- Profile Threat Actors: Identify the distinct behaviors, motivations, and tactics of different attacker groups, from script kiddies to sophisticated nation-state actors.
- Recognize Attack Patterns: Decipher the telltale signs of malicious activity by analyzing user behavior, network traffic, and system logs.
- Predict Future Attacks: Anticipate an attacker’s next move by understanding their goals, capabilities, and past behaviors.
- Strengthen Your Defenses: Develop proactive security measures and incident response strategies based on behavioral insights.
Cameron’s presentation is crucial for security analysts, incident responders, threat hunters, and anyone safeguarding digital assets.
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite only)Sponsored by Aembit12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:15 pmChanging the Cultural Approach Toward Secure Code DevelopmentSr. Director, Cybersecurity, PCI Energy SolutionsRegistration Level:- Conference Pass
1:15 pm - 2:00 pmThe traditional way of repetitious secure code development training and pitching security by design and default is not working when we continually code scan and pen test and find code vulnerabilities due to a lack of adherence to coding standards and best practices.
Changing the enterprise approach towards secure code development through effective motivation and alignment on rewarding secure code development practices within the annual evaluation and bonus structure.
1:15 pmTabletop Exercises in Your PocketSr. Program Manager, MassCyberCenterResiliency Program Manager, MassCyberCenterRegistration Level:- Conference Pass
1:15 pm - 2:00 pmParticipate in the play-through of the CyberSecureDeck: Defend the Network Card Game, an interactive tabletop exercise card game, and learn how to identify, protect, respond, and recover from cyberattacks while creating a more cyber-aware culture. During the game, participants will be asked to assume a role in an organization impacted by a simulated cyberattack and discuss cyber incident response actions. Attendees will also be given a copy of the deck so they can facilitate simple tabletop exercises within their own organizations.
1:15 pmAddressing the Cybersecurity Skill Shortage Internally and ExternallyRegistration Level:- Open Sessions
1:15 pm - 2:00 pmThis presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.
1:15 pm[Panel] The Sorcerer’s Apprentice: Taming AI in CybersecurityHead of Trust and Security, ConveyorPartner, Constangy, Brooks, Smith, & Prophet, LLPRegistration Level:- Open Sessions
1:15 pm - 2:00 pmAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
2:00 pmNetworking BreakRegistration Level:- Open Sessions
2:00 pm - 2:10 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:10 pmThe Cybersecurity Mindset: 12 Key Behaviors to Combat Modern ThreatsCISO, Executive Office of Economic Development, Commonwealth of MassachusettsRegistration Level:- Conference Pass
2:10 pm - 2:55 pmAs the threat landscape continues to evolve, technical controls alone are not enough – adopting the right cybersecurity behaviors is critical to reducing risk. This engaging session will introduce 12 essential behaviors that cybersecurity professionals should integrate into their daily practice to enhance security culture and resilience. Modeled after proven fraud prevention strategies, these behaviors offer a human-centric approach to mitigating threats like phishing, social engineering, credential theft, and insider risk. Attendees will learn how to operationalize these habits within their organizations, empowering both security teams and end-users to be proactive, rather than reactive, in their cyber defenses. Whether you’re a CISO, security analyst, or IT leader, this session will equip you with actionable insights to strengthen your security posture.
2:10 pmIntegrating Transformative OT Cybersecurity ProgramsRegistration Level:- Conference Pass
2:10 pm - 2:55 pmSession description to come.
2:10 pmSocial Engineering: Training the Human FirewallRegistration Level:- Open Sessions
2:10 pm - 2:55 pmPhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.
2:10 pmNavigating Third-Party Risk and Vendor ResilienceRegistration Level:- Open Sessions
2:10 pm - 2:55 pmIn today’s dynamic cyber risk landscape, risk managers must stay informed and adapt their strategies accordingly. Recent global cyber events have had a profound impact on critical functions across multiple sectors, underscoring the gravity of cyber events. Risk managers also face complexities from trends like reliance on third parties and evolving data protection laws.
To successfully navigate these challenges, risk managers are tasked with learning from significant cyber events, implementing best practices for managing third-party cyber risk, and staying updated on privacy regulations. This session assists risk managers in effectively mitigating cyber risks and safeguarding their organizations by discussing strategies for managing third-party cyber risk and providing updates on privacy regulations.
3:00 pmNetworking Break and Dash for PrizesRegistration Level:- Open Sessions
3:00 pm - 3:30 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pm[PLUS Course] AI Unleashed: Cybersecurity Strategies for an Autonomous Future - Part 4Sr. Cybersecurity Consultant, Wilson CyberRegistration Level:- SecureWorld Plus
3:45 pm - 5:15 pmArtificial Intelligence (AI) technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI-based applications (a classic example being a self-driving car) can make detailed recommendations to users and experts and act independently, replacing the need for human intelligence or intervention.
Recognizing the importance of technical standards in shaping development and use of AI, the U.S. President’s October 2023 Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (EO 14110) calls for “a coordinated effort… to drive the development and implementation of AI-related consensus standards, cooperation and coordination, and information sharing” internationally.
This PLUS Course focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity. Instructor Larry Wilson breaks down the course into four digestible lessons:
Lesson 1: What Is Artificial Intelligence: Includes an overview of Artificial Intelligence, how AI is used today (case studies), the current / future state of international AI standards.
Lesson 2: AI Security Threats: How threat actors are using AI to automate stages of the attack lifecycle, including reconnaissance, evasion, privilege escalation, lateral movement, and exploitation.
Lesson 3: AI Security Standards: (1) Secure Design – risks and threat modelling; (2) Secure Development – supply chain security, documentation, asset and technical debt management; (3) Secure Deployment – protecting infrastructure from compromise, threat or loss, incident management, and responsible release; and (4) Secure Operation and Maintenance – logging and monitoring, update management and information sharing.
Lesson 4: AI Risk Management Playbook: (1) Govern – policies, processes, procedures and practices across the organization related to the mapping, measuring and managing of AI risks are in place, transparent, and implemented effectively; (2) Map – context is measured and understood; (3) Measure – appropriate methods and metrics are identified and applied; (4) Manage – AI risks based on assessments and other analytical output from the Map and Measure functions are prioritized, responded to, and managed; (5) Roadmap – key activities for advancing the NIST Artificial Intelligence Risk Management Framework.
Upon completion of the class, attendees will have an up-to-date understanding of AI and its impact on cybersecurity. They will learn what actions organizations should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
3:45 pm[PLUS Course] Implementing the NIST Cybersecurity Framework, Including 2.0 - Part 4vCISO, Cyber Risk Opportunities LLCRegistration Level:- SecureWorld Plus
3:45 pm - 5:15 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) Version 2.0 to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- 11:11 SystemsBooth: 570
11:11 Systems is a managed infrastructure solutions provider that empowers customers to modernize, protect, and manage mission-critical applications and data, leveraging 11:11’s resilient cloud platform.
- AccessIT GroupBooth: TBD
AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.
AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.
- AembitBooth: 360
Aembit is the Identity and Access Management Platform that lets DevOps and Security teams manage, enforce, and audit access between federated workloads. Aembit provides seamless and secure access from your workloads to the services they depend on, like APIs, databases, and cloud resources, while simplifying application development and delivery
- AppOmniBooth: 300
AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.
- AutomoxBooth: TBD
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- BitdefenderBooth: 350
Powered by its depth of security expertise and rapid pace of research and development, Bitdefender’s long-standing mission is to deliver transformative security technologies to the world’s users and organizations. We are innovators, creating breakthrough technology that radically improves our customer’s experience with security.
From IoT to Data Centers, from endpoints to hybrid infrastructures – Bitdefender plays a transformational role in how security is best consumed, deployed, and managed. We strive to deliver products and services that radically alter the customer’s experience with security, in terms of efficacy, performance, ease of use and interoperability.
- CompylBooth: 535
Eliminate the need for multiple security tools, gain enterprise-level insights, and grow with a scalable GRC ecosystem. Compyl monitors and assigns workflows in a single location to ensure regulatory requirements and IT frameworks are continuously met by establishing a proper information security foundation across the entire organization.
- Constangy, Brooks, Smith & Prophete, LLPBooth:
Constangy, Brooks, Smith & Prophete has more than 225 attorneys across 21 states and the District of Columbia, offering services including the defense of single and multi-plaintiff employment discrimination, harassment and retaliation claims; complex wage and hour litigation; workplace safety; affirmative action compliance; workers’ compensation; ERISA and employee benefits; immigration; labor relations; cybersecurity & data privacy.
We are one of the largest labor and employment law practices in the U.S. Constangy holds a national Tier 1 ranking from the U.S. News & World Report/Best Lawyers Best Law Firms survey, and has been called a “go to” law firm by Corporate Counsel and Fortune magazine. Many of our attorneys have been recognized by leading authorities such as Chambers USA®, The Best Lawyers in America® and Martindale-Hubbell.
- Contrast SecurityBooth: TBD
Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks, heralding the new era of self-protecting software. Contrast’s patented deep security instrumentation is the breakthrough technology that enables highly accurate assessment and always-on protection of an entire application portfolio, without disruptive scanning or expensive security experts. Only Contrast has sensors that work actively inside applications to uncover vulnerabilities, prevent data breaches, and secure the entire enterprise from development, to operations, to production.
- Conveyor Inc.Booth: 280
Conveyor is the leading generative AI-powered platform that automates and scales the most tedious part of the sales process: customer security reviews. Trusted by the world’s top SaaS companies, Conveyor helps vendors build trust with customers while reducing the time spent on the mind-numbing task of sharing security information and answering security questionnaires by over 90%. Through the combination of its automated security questionnaire completion software and its trust portal, which allows documents and security information to be shared easily and securely, Conveyor ultimately helps vendors close sales faster. Conveyor’s lean team has deep and extensive collective experience in security and compliance.
- DelineaBooth: 135
Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.
- Envision Technology AdvisorsBooth: 278
Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.
- ExtraHopBooth: TBD
ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com
- FortinetBooth: TBD
Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network—today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud, or mobile environments. Fortinet ranks number one in the most security appliances shipped worldwide and more than 500,000 customers trust Fortinet to protect their businesses.
- HPE Aruba NetworkingBooth: 650
At Aruba, a Hewlett Packard Enterprise company, we believe the most dynamic customer experiences happen at the Edge—an office, a hospital, a school, or at home. It’s anyplace work gets done and data is generated by users, devices, and things across your network. Our mission is to help customers capitalize on these opportunities by providing secure edge-to-cloud networking solutions. We use AI-based machine learning to deliver simpler, faster, and more automated networks that analyze data to help businesses thrive.
- HUMAN SecurityBooth: TBD
HUMAN is a cybersecurity company that safeguards 1,200+ brands from digital attacks including bots, fraud and account abuse. We leverage modern defense to disrupt the economics of cybercrime by increasing the cost to cybercriminals while simultaneously reducing the cost of collective defense. Today we verify the humanity of more than 20 trilliondigital interactions per week across advertising, marketing, e-commerce, government, education and enterprise security, putting us in a position to win against cybercriminals. Protect your digital business with HUMAN.
- InfraGard BostonBooth: 295
InfraGard is a United States government (FBI) and private sector alliance. InfraGard Boston was developed by the Boston FBI office in 1998 to promote protection of critical information systems. InfraGard provides formal and informal channels for the exchange of information about infrastructure threats and vulnerabilities. The purpose of the synergistic exchange is to allow members to better protect themselves and their corporate interests while enhancing the ability of the United States government to provide national security.
- ISACA New England ChapterBooth: 105
The New England Chapter of ISACA® was founded in 1976. From the modest beginnings of its first meeting—which was held at Valle’s Steak House on Route 9 in Newton, Massachusetts—the chapter has grown to over 2000 members across four states (MA, NH, ME, VT).
The primary objective of the New England Chapter is to provide quality Information Systems audit and security-related education to support its members and their professional certifications.
- ISC2 Eastern MassachusettsBooth: 220
Advancing Information Security One Community at a Time
As anyone seriously involved in the information security profession can attest, peer networking is an invaluable resource. ISC2 Eastern Massachusetts Chapter provide members with the opportunity to build a local network of peers to share knowledge, exchange resources, collaborate on projects, and create new ways to earn CPE credits! - ISC2 Maine ChapterBooth: 220
The ISC2 Maine Chapter is a professional association authorized by the ISC2 the World’s Leading Cybersecurity Professional Organization created by ISC2 members and information security professionals living and working in Maine.
The ISC2 Maine Chapter is dedicated to providing education and regular meetings to help information security professionals in Maine. Our chapter benefits from a diverse membership that works in various organizations across important sectors such as healthcare, financial services, national defense, government, service providers, and many more.
- ISC2 Rhode IslandBooth: 159
The ISC2 Rhode Island Chapter is a professional association authorized by the ISC2 the World’s Leading Cybersecurity Professional Organization created by ISC2 members and information security professionals living and working in Rhode Island.
Our mission is to help further the profession and understanding of information security by providing professional growth to ISC2 members in Rhode Island in the form of educational presentations, live networking opportunities, and mentorship from our community of information security professionals and enthusiasts.
- ISSA New EnglandBooth: 440
The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications, and peer interaction opportunities that enhance the knowledge, skills, and professional growth of its members’ information security professionals. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources.
Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.
Visit the National Headquarter’s website at www.issa.org.
- K LogixBooth: 640
K logix is the leading information security company. We provide security consulting, technology solutions, and integration services to enterprise companies. Our experienced team and our established process help enterprise customers make confident security decisions that impact their business goals.
- KnowBe4Booth: 100
We are a leader in the Gartner Magic Quadrant and the fastest-growing vendor in this space.
KnowBe4 is the world’s largest security awareness training and simulated phishing platform that helps you manage the ongoing problem of social engineering.
The KnowBe4 platform is user-friendly and intuitive. It was built to scale for busy IT pros that have 16 other fires to put out. Our goal was to design the most powerful, yet easy-to-use platform available.
Customers of all sizes can get the KnowBe4 platform deployed into production twice as fast as our competitors. Our Customer Success team gets you going in no time, without the need for consulting hours.
- LightBeam.aiBooth: 125
LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.
- MassCyberCenterBooth: TBD
The MassCyberCenter, launched in September 2017, strives to create a diverse, vibrant, and competitive Massachusetts cybersecurity ecosystem that enhances resiliency for public and private entities, provides workforce development opportunities, and elevates public cybersecurity awareness.
In 2022, the Massachusetts Legislature codified the establishment of the Center and confirmed its mission of convening the Massachusetts cybersecurity ecosystem to improve cybersecurity resiliency, workforce development, and public awareness within the Commonwealth by developing cutting edge programs, organizing engaging events, and leading collaborative working groups.
Cybersecurity encompasses the people, process, and technology that provide confidentiality, integrity, and availability of data and critical control systems that keep our Commonwealth running. The Center focuses its activities on balancing the core principles of cybersecurity: People, Process, and Technology.
- National Cybersecurity AllianceBooth: TBD
Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.
- New England Cyber Fraud Task Force (NECFTF)Booth: 295
The NECFTF is composed of officials from state and local law enforcement throughout Massachusetts, New Hampshire, Rhode Island, Vermont and Maine and is charged with preventing, detecting and mitigating complex cyber-crime threatening payment systems and critical infrastructure. The five task force officers represent the Concord Police Department, the Grafton County Sheriff’s Office, the Manchester Police Department and the Nashua Police Department.
- NexumBooth: 635
Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, Ohio, and Wisconsin, as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.
- Orca SecurityBooth: 655
We’re on a mission to make it fast, easy, and cost effective for organizations to address the critical security issues in their AWS, Azure, and GCP estates so that they can operate in the cloud with confidence.
- PenteraBooth: 290
Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale.
Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited.
- Rapid7Booth: 512
Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.
- SecurityScorecardBooth: TBD
SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.
- SecuronixBooth: 212
Securonix is redefining threat detection and response for today’s hybrid cloud, data-driven enterprise. Securonix Next-Gen SIEM and XDR are powered by the most advanced analytics and built on a scalable, flexible cloud native architecture. Securonix leverages behavioral analytics technology that pioneered the UEBA category to reduce noise, prioritize high fidelity alerts, and enable fast and precise response to insider and cyber threats.
- SeemplicityBooth: 260
Seemplicity offers a risk reduction and productivity platform that streamlines the way security teams manage risk reduction. By orchestrating, automating, and consolidating all remediation activities into a single workspace, Seemplicity is revolutionizing the way security teams drive and scale risk reduction efforts across organizations.Seemplicity streamlines and collaboratively transforms the remediation process for developers, DevOps, and IT across the organization, assisting them in achieving complete operational resilience and establishing a truly scalable security program.
- SilverfortBooth: 315
Silverfort protects enterprises from data breaches, cyber attacks and insider threats, by preventing credential compromise and misuse across the entire corporate network and cloud infrastructure. Silverfort leverages patent-pending technology to seamlessly harden the basic authentication and access mechanisms used by all client devices and services, instantly equipping them with the latest authentication and access protection technology without any change or integration.
- SplunkBooth: 110
Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.
- TaniumBooth: 515
Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).
The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.
For more information, visit: https://www.tanium.com.
- TevoraBooth: TBD
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.com/.
- ThalesBooth: TBD
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- ThreatLockerBooth: 105
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- TinesBooth: 130
Founded in 2018 in Dublin by experienced security engineers, Tines makes enterprise automation simple.
Security and operations teams are too often stuck doing manual, repetitive tasks, and we want to change that. Tines is an automation platform designed to allow anyone to automate any manual task, regardless of complexity. No apps, plugins, or custom code required.
With 1,000+ template options for common security actions, Tines is power and simplicity through direct integration with your existing tools.
- TrustmiBooth: 630
Trustmi is a leading fintech cybersecurity solution designed to prevent financial losses from fraud and errors, 24/7. Our AI-driven platform instantly detects suspicious activity and human errors by continuously analyzing millions of data points, including vendor actions, emails, files, and payment details. Trustmi helps you accelerate digital transformation by reducing manual verification efforts and enhancing the efficiency and security of your payment processes, ensuring a smarter, faster approach to fraud prevention.
- VeritiBooth: 365
Veriti is a fast-growing security infrastructure innovator that helps organizations maximize their security posture while ensuring business uptime.
Integrated with the entire security stack, Veriti provides a consolidated management layer that continually and proactively monitors exposure to threats and provides actionable remediation paths for security gaps and high-risk vulnerabilities across the organization’s infrastructure and attack surface.
- VIPRE Security Group, Inc.Booth: 270
VIPRE Security Group is a leading provider of internet security solutions that protect businesses and home users from costly, malicious cyber threats. For more than 25 years, VIPRE has provided one of the world’s largest threat intelligence clouds, delivering exceptional protection against today’s most aggressive online threats. Our award-winning portfolio includes next-generation antivirus endpoint cloud and EDR solutions, advanced email security products, threat intelligence for real-time malware analysis, and security awareness training for compliance and risk management.
- WhisticBooth: 612
Whistic is a leading provider of proactive vendor security and an innovator in changing the way that companies publish and evaluate security posture to build trust. Whistic is the single source of trust for both buyers and sellers, helping companies speed up the pace of business. The Whistic Trust Catalog® now contains nearly 15,000 company profiles that can be assessed on-demand, and notable customers include Airbnb, Okta, Betterment, Vonage, Qualtrics, and other world-leading brands within healthcare, manufacturing, energy, and education.
- WiCyS Massachusetts AffiliateBooth: 195
The Massachusetts WiCyS Affiliate offers mentoring, learning, networking and career development to professionals at all stages of their cybersecurity careers, Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community of all genders. Our affiliate provides an online community for mentorship, networking, and collaboration as well as local meetups, community awareness programs, and support for other organizations with a common mission to bridge the Cybersecurity workforce gap while addressing diversity and inclusion of women and minorities.
- ZluriBooth: 285
Next-Gen Identity Governance & Administration platform for IT & Security teams to discover identities & applications, streamline access management, and automate access reviews in one single place
- ZscalerBooth: 295
Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Brian McGowan, CISM, ModeratorVP, Global Security & Privacy, SharkNinja
Brian currently leads the cybersecurity and privacy program as Vice President, Global Security & Privacy at SharkNinja, a relentless innovator and global leader in the housewares industry. Previously, he served as head of IT security & compliance at Hasbro, where for seven years he led the maturity of a global cybersecurity program designed to meet everchanging cyber risk of a company that evolved from a toy manufacturer to a global entertainment company serving the film, unscripted TV, and online gaming industries. Prior to Hasbro, he served as Director of IT Compliance for Upromise, the Boston-based pioneer of loyalty and 529 college savings programs, where he led development of the company's PCI and SOX compliance programs.
Brian established himself as a leader in cybersecurity, privacy, and compliance program development. His career path differs from many IT professionals; he started his professional career in technology sales with Cabletron Systems in the mid-90s where he was first exposed to information technology and shifted to a career in IT operations in 2001. He was drawn to the structure of process and controls, which led to a role in IT security & compliance in 2005.
Brian has a passion for developing teams with a focus on individual team member success and career growth. He attributes relationship and team-building skills developed early in his career as a sales professional as keys to his program development and leadership success.
Education:
BS, Management Science, Bridgewater State University
Executive Leadership Professional Coach Program, AIIR Professional Consulting
Executive Leadership Certificate, Business Engagement & the Information Security Professional, Tuck School of Business
Executive Leadership Certificate, Harvard Leadership Management Program - Len EvenchikProfessor, Boston College, Carroll School of Management
Professor Len Evenchik has more than 25 years of senior management and engineering experience in industry, government, and academia. He teaches courses on the strategic use of Information Technology (IT) and Data Analytics, and a course on Cybersecurity Strategy and Management. He has also served as the faculty supervisor for experiential learning courses for MBA students.
Before coming to Boston College, he was the Assistant Dean and founding director of the online education program at Harvard's Division of Continuing Education. Mr. Evenchik managed all aspects of the program from its inception in 1997, when one online course with four students was offered, to an enrollment of over 10,000. He has also taught graduate level computer science courses on Internet protocols and information security at the Harvard Extension School for over 25 years, including the first course at Harvard to use video streaming and multimedia to deliver classroom lectures to online students around the world.
Mr. Evenchik began his professional career at BBN in Cambridge, where he developed some of the first networking protocols used in the Internet, and then managed the implementation of large commercial networks. He was Director of Communications for the State of Massachusetts where he managed the organization responsible for the strategic planning, implementation, and operation of statewide networks supporting over 15,000 users. His industry experience also includes senior management positions in sales, program management and engineering at both large firms and at a number of venture capital backed startups, one of which had a successful IPO.
Prof. Evenchik earned three degrees from MIT in the fields of both Engineering and Management. He received a B.S. and an M.S. in Electrical Engineering and Computer Science, and he was awarded a patent based on some of his work while a graduate student. He also earned a B.S from the Sloan School of Management where he worked with Prof. Fischer Black on the first online implementation of the Black-Scholes options model.
- Lisa PlaggemierExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
- Denis GouletCIO & Commissioner, Department of Information Technology, State of New Hamsphire
- Gene MeltserCISO, State of Connecticut
Gene Meltser is the Chief Information Security Officer for the State of Connecticut. Gene has over 20 years in security industry, as technical leader, consultant and penetration tester. Prior to joining the State of CT, Gene was the VP of Security Advisory Services at New York City based NCC Group, where he was responsible for leading all aspects of technical security consulting for NCC Group’s East Coast consulting practice.
Prior to NCC, Gene was a Consulting Practice director at Neohapsis, a pure play security consultancy based in Chicago, IL, which was acquired by Cisco in 2015.
Prior to Neohapsis, Gene has led and delivered strategic and technical consulting projects and for @stake, a pure play security consultancy based on Boston, MA. - Anthony O'NeillCommonwealth CISO & Chief Risk Officer, Massachusetts Executive Office of Technology Services and Security
- Ken WeeksCISO, State of New Hamsphire
Ken Weeks is the Chief Information Security Officer for the State of New Hampshire. He spent most of his adult life as a Naval Officer, Special Duty, Cryptology and Information Warfare, and retired as a CAPT (O6). Although most of his time was spent in the Pacific Theater, he also enjoyed several all-inclusive trips to Somalia, Iraq, and Afghanistan. After the Navy, he worked as an Executive Leader of Cyber Operations at the National Security Agency (NSA). Ken spent a couple years in the private sector as a Consultant with Booz Allen Hamilton and then moved to New Hampshire and back into public service. Since he always works in rooms with no windows and under artificial lights, he spends the rest of his time as an avid four seasons outdoor sportsman with his spouse, teenagers and two Irish Wolfhounds.
- Lisa Plaggemier, ModeratorExecutive Director, National Cybersecurity Alliance
Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.
- Scott MargolisCISO, Massachusetts Bay Transportation Authority (MBTA)
Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business continuity, and operational efficiency. Reputation for leading new initiatives focused on transforming operations, establishing partner/industry relationships, increasing revenue, and reducing cost and risk exposure. Proactive leader with intense focus on customers and beneficial outcomes.
- Panel Discussion
- James McLeanHead of Product, AppOmni
- Esmond KaneCISO, Advarra
Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.
- Keavy MurphyVice President, Security, Net Health
Keavy Murphy is a Boston-based security professional currently serving as the Vice President of Security at Net Health. Passionate about cybersecurity, especially for new and emerging companies, she prioritizes using soft skills to manage compliance and risk management effectively in parallel with business objectives. Previously, she served in information security roles at Starburst Data, Cambridge Mobile Telematics, Alegeus and State Street. She enjoys writing about and researching the benefits of effective communication within the security space. Her work has been published in Dark Reading and Info Security Magazine and presented at seminars including the Chief Data and Analytics Officers Conference and FutureCon. She is an active volunteer with Boston Cares, has served in the ISACA Engage Mentor program, and holds both CIPP and CIPM certifications.
- Dmitriy SokolovskiySr. Vice President, Information Security, Semrush
Dmitriy is currently a Senior Vice President, Information Security at SEMrush. From 1999 to 2007 Dmitriy had first-hand experience with servers, networks and datacenters, and NOCs and SOCs as he worked and consulted for defense contractors, public and private financial and medical companies, and non-profits. Between 2007 and 2018, Dmitriy spent 11 years at CyberArk software, helping them go public as he was building and managing a cyber-security professional services team, personally participating in incident response and remediation for some of the largest breaches in US history, and then serving as a Cloud Security Architect for SaaS products utilizing CSA CCM and CIS CSC. In 2018, and until summer of 2023, Dmitriy helped Avid Technology, a pioneer and a leader in the movie and music industry since 1987, to establish its information security and product security functions.
Dmitriy holds Boardroom Qualified Technical Expert (QTE) certification from the Digital Directors Network (DDN) and serves on Advisory Boards for multiple information security start-ups, such as Oort (acquired by Cisco), The Cybernest, Exium, SaaSLicense (acquired by IBM), and advises venture capital, and private equity firms. He is a member of the GIAC Advisory Board, holds the GISF, GCED and CISSP certifications, and served as a SANS Mentor for all three.
- Thomas PoreDirector, Solutions Engineering, Pentera
Thomas Pore is the Director of Product Marketing at Pentera. He is a network security expert with a 20-year background utilizing NetFlow and packets for network detection & response (NDR), encrypted traffic analysis, ethical hacking, and incident response. His expertise is rooted in diverse experience with product marketing, product management, R&D, solution engineering, and incident response training. Thomas has led incident response training worldwide and has successfully uncovered the underpinnings of intricate infiltrations and advanced persistent threats. He has developed unparalleled insights through his hands-on experience in crisis response and live ransomware situations, becoming an advocate of better-protecting organizations through security control validation.
- Panel Discussion
- Roger A. Grimes, ModeratorData-Driven Defense Evangelist, KnowBe4
Roger A. Grimes is a Data-Driven Defense Evangelist at KnowBe4. He is a 35-year plus computer security professional, author of 14 books and over 1,400 national magazine articles. He frequently consults with the world’s largest and smallest companies, and militaries, and he has seen what does and doesn’t work. He is the author of the Ransomware Protection Playbook (Wiley) .
Grimes was previously a weekly security columnist for InfoWorld and CSO magazines from 2005–2019. He regularly presents at national computer security conferences, and has been interviewed by national magazines and radio shows, including Newsweek magazine and NPR’s “All Things Considered.” Roger is known for his often contrarian, fact-filled viewpoints.
- Brian McGowan, CISMVP, Global Security & Privacy, SharkNinja
Brian currently leads the cybersecurity and privacy program as Vice President, Global Security & Privacy at SharkNinja, a relentless innovator and global leader in the housewares industry. Previously, he served as head of IT security & compliance at Hasbro, where for seven years he led the maturity of a global cybersecurity program designed to meet everchanging cyber risk of a company that evolved from a toy manufacturer to a global entertainment company serving the film, unscripted TV, and online gaming industries. Prior to Hasbro, he served as Director of IT Compliance for Upromise, the Boston-based pioneer of loyalty and 529 college savings programs, where he led development of the company's PCI and SOX compliance programs.
Brian established himself as a leader in cybersecurity, privacy, and compliance program development. His career path differs from many IT professionals; he started his professional career in technology sales with Cabletron Systems in the mid-90s where he was first exposed to information technology and shifted to a career in IT operations in 2001. He was drawn to the structure of process and controls, which led to a role in IT security & compliance in 2005.
Brian has a passion for developing teams with a focus on individual team member success and career growth. He attributes relationship and team-building skills developed early in his career as a sales professional as keys to his program development and leadership success.
Education:
BS, Management Science, Bridgewater State University
Executive Leadership Professional Coach Program, AIIR Professional Consulting
Executive Leadership Certificate, Business Engagement & the Information Security Professional, Tuck School of Business
Executive Leadership Certificate, Harvard Leadership Management Program - Konnor AndersenVice President, Sales, Zluri
Konnor is the Vice President of Worldwide Sales & Partnerships at Zluri, an identity security platform helping IT and security teams manage and secure SaaS applications. With nearly a decade in tech sales and leadership—from early-stage startups to $10B+ public companies—he brings extensive experience in scaling teams and driving growth. Konnor is passionate about building high-performing teams and shares insights on leadership and team building in today’s dynamic workplace.
- Christine Nagy, ModeratorCISO, Advent International
- Gene KingsleySpecial VP, Board of Directors, InfraGard National Members Alliance; Chairman, American Security and Resilience Foundation
As an experienced information security strategist and collaborative executive leader, Gene Kingsley builds and leads scalable, highly effective cybersecurity programs that enable organizations to protect their intellectual property and maintain critical operations while maximizing profitability. Gene is passionate about designing secure, compliant infrastructures that proactively mitigate potential risk, preparing organizations across diverse industries for incident response, disaster recovery, and sustained business continuity.
Gene’s robust industry experience gives him a comprehensive view of the broader security landscape, informing his innovative and collaborative approach. He began his career in IT help desk and operations roles and continuously progressed into information security leadership positions across the higher education, healthcare, and financial services industries.
One of Gene’s greatest accomplishments was developing and launching a security-as-a-service program for the University of Massachusetts in 2015, known as the Massachusetts Advanced Secure Technologies (MAST) program. He was recognized by the governor of Massachusetts in 2017 for this effort. To this day, MAST provides crucial security support to 501(c)3 nonprofits and institutions of higher education as well as local municipalities and government organizations at the request of the Massachusetts governor.
During his tenure with Reliant Medical Group, Gene managed the cybersecurity and data protection practice across 23 urgent care clinics and hospital facilities, ensuring the uninterrupted functionality of the critical operational infrastructure and healthcare platforms required for ongoing patient care. In this role, Gene managed the oversight and mitigation of potential HIPAA concerns and ensured continuous alignment with the requirements of a highly regulated environment.
In his most recent role with Farm Credit Financial Partners, Gene supported six separate farm credit associations and agricultural banks across the US. He designed and proposed a consolidated information security strategy that was accepted and even championed by the leaders of all six partners on the first draft, demonstrating his ability to navigate the competing priorities of multiple stakeholders while influencing the adoption of new processes that optimize the organizational security posture.
A common thread throughout each of Gene’s experiences has been his willingness to educate and drive awareness around information security and cloud computing practices. He has created and led tabletop incident response exercises, and since 2010 he has been an advisor, keynote speaker, panelist, and workshop facilitator for The Seguro Group. He develops and presents his own content and facilitates certificate-based workshops that are sought after by information security practitioners of all levels at Seguro’s SecureWorld and Secure Plus conferences.
Gene holds a Master of Science in Communications and Information Management from Bay Path University in Longmeadow, Massachusetts, and an MBA from the University of Massachusetts Isenberg School of Management in Amherst. He has two Global Information Assurance Certifications (GIAC)—Certified Information Security Professional and Certified Forensic Examiner—as well as an ITIL 4th Edition Foundation Certificate in IT Management. Gene is also certified in Risk and Information Systems Control (CRISC) and is a Certified Information Security Manager (CISM). He currently resides in the Springfield, Massachusetts area.
- Happy Hour
- Edna ConwayCEO, EMC ADVISORS; Former Chief Security & Risk Officer, Microsoft Cloud
Edna Conway is expert in identifying future trends and digital paths for business success. She is known for consistently ensuring that security and resiliency are “built in.”
Not one to sit still after recently “repurposing” from her operating executive roles, Edna is currently CEO of EMC ADVISORS, advising governments, CEOs, enterprises and capital investment organizations. She has served on more than a dozen Boards of Directors, is currently on four, serves on the NYU Tandon School of Engineering Cyber Fellows Advisory Council, as faculty for the Carnegie Mellon University CISO Program and Institute for Applied Network Security, is a Sr. Non-resident Fellow at Carnegie Endowment for International Peace and a member of APCO Worldwide’s International Advisory Council, and… in her “spare time,” she supports the U.S. and NATO Defense and Intelligence Communities and our U.S. National Risk Management Center’s work on Supply Chain and is a Growth Partner at Growth Equity company, Long Ridge Equity partners.
She previously served as Microsoft’s VP, Chief Security & Risk Officer for Cloud Infrastructure, and Cisco’s Chief Security Officer, Global Value Chain. She was a partner in an international private legal practice and served as Assistant Attorney General for the State of New Hampshire. She holds an AB from Columbia University, a law degree from the University of Virginia, and additional credentials from MIT, Stanford, Carnegie Mellon, and New York University.
One of the very few cybersecurity and risk executives with this honor, Edna was inducted into the Fortune Most Powerful Women’s Community years ago, and was just inducted into the Global Cybersecurity Hall of Fame in December 2024.
Edna's list of other awards and recognition are far too long to share completely, but here are just a few:
• She was the 2023 Institute for Critical Infrastructure Pinnacle Award winner
• Named a Supply & Demand Chain Executive Pros to Know multiple times
• She is one of Mission Critical’s Top 25 Women in Technology
• An Information Systems Security Association Hall of Fame Inductee
• Was Named #5 in The Top 50 Women Leaders in SaaS
• Is a Fed 100 Award RecipientBut if you ask her what her favorite recognition is, she will admit it is the Machine to Machine & IOT Trailblazer award she received longer ago than she is willing to share, and long before AI/ML was cool.
- Esmond Kane, ModeratorCISO, Advarra
Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Esmond Kane, ModeratorCISO, Advarra
Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.
- David Dumas, HostSecretary, Board of Directors, ISSA New England
David Dumas, CISSP, CISM, ISSA Distinguished Fellow. David is a Senior Principal in Security Risk Management for Verizon's Wireline Security Operations group. He has 32 years in the security field, working at Digital Equipment and Verizon. He has been on the ISSA New England Chapter Board since 1998.
- Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”
Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
- Bill BowmanOperating Partner | CISO, Welsh, Carson, Anderson & Stowe
Bill Bowman built the information security programs as the initial cybersecurity leader at Bright Horizons, Houghton Mifflin Harcourt, Eze Software, ZoomInfo, and Emburse. With over two decades of experience creating cybersecurity programs that meet rigorous certifications such as PCI, ISO 27001, ISO 27701, SOC 1, and SOC 2, he has consistently satisfied both client demands and regulatory requirements.
Bowman is passionate about data privacy, having established the Office of the Data Protection Officer at two organizations. His leadership has also contributed to the success of four companies that have exited private equity. Over the past 14 years, he has cultivated a strong network of security leaders, following his role as the founding President of the ISC2 Eastern Massachusetts chapter.
- Andy EllisPartner, YL Ventures
Andy Ellis is a seasoned technology and business executive with deep expertise in cybersecurity, managing risk, and leading an inclusive culture. He is the author of 1% Leadership, Partner at YL Ventures, and is an advisor to cyber security startups. He is the founder and CEO of Duha, a boutique advisory firm focused on providing strategic consulting in the areas of Leadership, Management, Cybersecurity, Technology Risk, and Enterprise Risk Management.
Widely respected across the cybersecurity industry for his pragmatic approach to aligning security and business needs, Andy regularly speaks and writes on cybersecurity, leadership, diversity & inclusion, and decision-making. Ellis previously served as the Chief Security Officer of Akamai Technologies, where he was responsible for the company’s cybersecurity strategy, including leading its initial forays into the cybersecurity market. In his twenty-year tenure at Akamai, Andy led the information security organization from a single individual to a 90+ person team, over 40% of whom were women.
Andy has received a wide variety of accolades, including the CSO Compass Award, Air Force Commendation Medal, Spirit of Disneyland Award, Wine Spectator Award of Excellence (for The Arlington Inn), the SANS DMA Podcast of the Year (for Cloud Security Reinvented), and was the winner of the Sherman Oaks Galleria Spelling Bee. He was inducted into the CSO Hall of Fame in 2021.
After receiving a degree in computer science from MIT, Andy served as an officer in the United States Air Force with the 609th Information Warfare Squadron and the Electronic Systems Center.
- Ben HowardVP, IT & Cybersecurity, Inari
Ben originally asked ChatGPT to write his bio, but felt it was self-aggrandizing, pompous, and unbearably long. After many efforts to tell ChatGPT to tone it down a bit, he gave up and wrote it himself. Ben is a Cybersecurity and IT leader with over 25 years of experience. He specializes in rapidly maturing cybersecurity programs from scratch, aka getting bored with mature programs and starting over somewhere new. The result is a wide variety of experiences across industries in both public and private sectors. Ben has a passion for teaching that extends beyond standard security awareness training. In the "before times", Ben was a SCUBA instructor and taught Microsoft technical certifications. He is a board member of a local charity supporting elementary school aged children, of which he has three.
- Kayla WilliamsCISO, Devo
Kayla is the CISO at Devo Technology, a cloud-native security data analytics platform. She is an analytical and results-driven professional with experience in management of cybersecurity incidents, compliance management, corporate risks, information security, project and program management, and organizational controls surrounding many different aspects of business. Kayla also is accomplished in the development of key methods for organizations to strengthen productivity, enhance operational performance, and improve financial and operational controls.
Prior to this role, Kayla was the director of GRC at LogMeIn, a $1b global SaaS company, and the senior risk manager for Computershare, US, a global financial services company, where she was responsible for supporting the development, implementation, and monitoring of operational, financial, compliance, and IT risk. Additionally, she worked directly with executive management to identify, assess, and establish mitigation strategies for any risk that arose from inadequate or failed processes, people, systems, or external events, while maintaining a balance between risk mitigation and operational efficiency. This enabled executive management to make informed decisions about the risk posture of the organization and dedicate resources to key areas to minimize critical and high risk to business operations.
Kayla currently resides in Boston, Massachusetts, USA, and Alfreton, Derbyshire, UK.
- Val Dobrushkin, ModeratorPartner, AVA Compliance Solutions
Val Dobrushkin is an experienced cybersecurity and governance professional, whose career has spanned working at startups, Fortune 500 companies, and the U.S. government. His specialty is crafting Governance, Risk and Compliance (GRC) programs for startups, through which he has facilitated IPOs and multimillion dollar acquisitions. Val is also a founding partner of AVA Compliance Solutions, a consulting company offering bespoke GRC program design and corporate training.
Val is passionate about the nexus of technology, empathy, connection, and improving the human experience. He continues to mentor the next generation of creative thinkers in cybersecurity by facilitating one on one meetings, groups, and presenting at conferences. A lifelong learner, Val aims to continue exploring the world, writing novels, running Dungeons and Dragons campaigns, and playing soccer.
- Benjamin CormanDirector of Security, CISO, Digital Federal Credit Union
Ben has had a lifelong love of all things technical and has been an IT and Security professional for over 15 years. For the last 12 years he has been in the credit union industry and has been involved in an array of different projects and solutions. From core platform, networking, and system operations, to working on custom developed applications and with startups and Fintechs. He has been a presenter at CUNA Technology Council and CUIntersect. Most recently, Ben has been involved in security evolution, as it extends beyond the traditional boundaries, and into the wider world.
- James CussonSecurity Compliance Team Lead, Commonwealth of Massachusetts, Executive Office of Health and Human Services
- Ravi ThatavarthyCISO, Rite Aid Corporation
Ravi currently serves as CISO at Rite Aid. With 30k+ employees and multi million customers and a noble purpose of helping you achieve whole health for life, Ravi is helping with transforming their Information Security Program. Ravi served as the VP & CISO of BJ's Wholesale Club where his responsibilities included information security, policy, compliance, and privacy chain-wide for all clubs, gas stations, and the company’s online presence - BJs.com and BJ's mobile. At BJ's, Ravi played a critical role in helping with the company’s digital transformation journey, cloud transformation, and enhanced In-club experiences, including buy-online-pickup-in-the-club, curbside pickup, and express pay, to name a few. Prior to BJ's, Ravi served as Chief Information Security Officer at iRobot, heading both IT and Product Security. He brings with him more than 20 years of experience in information security and possesses a strong background in both technology leadership and building security programs from the ground up.
- Benson KamauDirector, Technical Account Management, Tanium
Benson has been in the tech space for over 15 years. His background is in system engineering, where he helps install, configure, and maintain on premise and cloud infrastructure. He has held positions at Veracode, Edelman Financial engineers, and presently at Tanium.
- Mike Ste Marie, ModeratorSecurity Program Manager, Office of the Secretary, Commonwealth of Massachusetts
Mike has more than 17 years of experience in the Information Security field, working in multiple industries around the Boston area. He has helped build and improve information security programs, deploy and manage awareness training to over 1,000 staff members, as well audit networks against the CIS Controls. He holds the CISSP certification, has a Masters in Information Assurance from Norwich University and has been a long time member of the SecureWorld Boston Advisory Council.
- Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.). - Peter SamoraySr. Director, Cybersecurity, PCI Energy Solutions
Peter Samoray serves as a Senior Director of Cybersecurity at PCI Energy Solutions overseeing all aspects of strategic and operational security services. Peter comes from a very diverse security background with over 18 years of cybersecurity and technology experience across multiple industry sectors serving in various areas including operations, development, architecture, incident response, red/blue teams, and governance, risk & compliance roles. Peter has also served as a Data Protection Officer (DPO) at Relic Law PLLC for the last four years advising on cybersecurity and data privacy regulations to multiple clients.
Peter holds a Master’s Degree in Computer Information Systems from the University of Detroit Mercy, a Bachelor of Arts from Wayne State University, and a Certificate in Change Leadership from Cornell University. Peter has certifications for CISSP, CISM, CRISC, CISA, CIPP/US, CIPP/EU, and PMP.
- Max FathySr. Program Manager, MassCyberCenter
Max Fathy is responsible for supporting the MassCyberCenter’s workforce development efforts, including the Commonwealth Security Operations Center and Cyber Range Initiatives, the Cybersecurity Mentorship Program, and the Cybersecurity Training and Education Working Group, and building stronger relationships with the private sector cybersecurity community. Prior to joining the MassCyberCenter, Max worked as a Manager of Government Relations and Public Policy for ML Strategies, where he advised private sector companies across a range of industries on state and local public policy in Massachusetts. Max holds a Master of Arts in Law and Diplomacy with a focus on International Security and Technology Policy from the Fletcher School of Law and Diplomacy at Tufts University. During his studies at Fletcher, he served as a Rosenthal Fellow in the Office of the Under Secretary of Defense for Policy in the United States Department of Defense. He also received his B.A. in International Relations from Tufts.
- Meg SperanzaResiliency Program Manager, MassCyberCenter
Meg Speranza is responsible for improving the collaboration, transparency, and effectiveness of the Massachusetts cybersecurity ecosystem in order to foster ‘cyber resiliency’ across the Commonwealth of Massachusetts’ key institutions and systems, including municipalities, businesses, critical infrastructure, and non-profit organizations. Prior to joining the MassCyberCenter, Meg had a successful 25-year business career working for several global high-tech companies, owning and operating a small retail business, and overseeing educational fundraising before pursuing a career in cybersecurity. Meg holds a Master’s degree in Cybersecurity Policy and Governance from Boston College and a Bachelor’s of Science in Business Management from Babson College.
- Panel Discussion
- Joe VeroneauHead of Trust and Security, Conveyor
Joe is a risk management professional with experience across many security, risk and compliance domains. Past roles include advising on GRC software implementations at highly regulated customers and supporting data protection efforts at Aptible, a HITRUST Certified Platform-as-a-Service. Joe currently leads the Trust & Security function at Conveyor, an AI agent company automating the customer security review process and he regularly participates in and presents at regional and national ISACA events.
- Ryan SteidlPartner, Constangy, Brooks, Smith, & Prophet, LLP
Ryan is a member of the Constangy Cyber Team in Seattle, specializing in compliance advisory services for data privacy and cybersecurity. He serves his clients in assessing, implementing, and enhancing their information governance programs under state, federal, and international laws.
Prior to Constangy, Ryan served eight years at Grant Thornton as a founding member of their Cyber Risk practice. He has extensive experience advising large Fortune 500 multinationals to small start-ups on operationalizing data privacy to meet complex regulatory requirements and advancements in emerging technologies.
Ryan teaches courses on global privacy law, data science and ethics at Seattle University. He holds a Juris Doctor and MBA from the University of Maryland and is a Certified Information Privacy Professional (CIPP/E).
- Mark AnnatiCISO, Executive Office of Economic Development, Commonwealth of Massachusetts
Mark Annati is an experienced IT and cybersecurity leader, currently CISO for the Executive Office of Economic Development, Commonwealth of Massachusetts. A board member of InfraGard Boston, he previously served as CISO for advansappz.com and Extreme Reach. With over 20 years in IT security and two successful startups, Mark has led security operations, risk management, enterprise IT, and cloud initiatives. A former U.S. Navy submariner, he values teamwork, strategic planning, and continuous learning. Holding CISSP and SSCP certifications, he is passionate about aligning security with business goals and advancing security awareness.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.