Click here to view registration types and pricing (PDF)
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, April 8, 2026
    7:30 am
    [PLUS Course] Protecting AI Systems from Malicious Cyber Attacks - Part 1
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    Upon completion of this course, attendees will have an up-to-date understanding of how AI works, AI implementation options, AI threats and vulnerabilities, AI security controls standards, best practices for building an AI security program, and assessing risks assessing AI security risks. The course covers technical security controls applied to AI systems and underlying infrastructure before, during, and after a cyberattack. Finally, administrative security capabilities, including AI governance, risk management, compliance, and audit considerations will be discussed.

    Today’s companies develop, deploy, access AI applications and workloads through many computing environments including public cloud, private cloud, multi-cloud, hybrid cloud, and on-premises. These AI implementations and operations involve the risk of one or more cyberattacks that target the AI systems directly (model tampering, agent manipulation, data poisoning, GPU runtime exploits, etc.) or target the underlying infrastructure (public cloud, private cloud, on-premises, etc.) where the AI systems reside. The various development and deployment solutions make securing high-risk AI systems a challenge. A comprehensive AI cybersecurity program should account the various of development / deployment / operations scenarios.

    The objective of this class is to help organizations design, develop, build, and manage high-risk AI systems and the underlying cloud, multi-cloud, hybrid cloud, on-premises environments that support AI systems throughout design, development, deployment, and operations. The course deliverables are grouped into six modules which cover key topics related to building a highly effective AI Security Program.

    Module 1: What is Artificial Intelligence (AI) and how does AI work?

    Includes an overview of Artificial Intelligence (AI) including how AI works (applications and workloads), AI architecture, components, and processes (models, algorithms, workflows). Module 1 includes topics such as AI Models (Generative AI, Large Language Models (LLMs), foundation models), and Multi-Agent Systems (MAS). A review of AI Use Cases across multiple industry sectors is included.

    Module 2: AI Cloud Adoption Frameworks (CAFs)

    An AI Cloud Adoption Framework (CAF) provides a structured approach to adopting AI solutions effectively and responsibly. It is designed to guide organizations through the process of implementing AI workloads ensuring scalability, security, and operational excellence. Topics include developing, deploying, and securing AI solutions in Microsoft Azure Cloud, Amazon Web Services (AWS), Google Cloud Platform (GCP) and Oracle Cloud Infrastructure (OCI). Deployment models include IaaS (bring your AI), PaaS (build your AI), and SaaS (buy your AI).

    Module 3: AI threats and Vulnerabilities

    AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.  Topics include an overview of the FS-ISAC Adversarial AI Framework, MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems), and OWASP Agentic AI Threats. Module 3 also includes a discussion of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. Topics include the OWASP Top 10 for LLM Applications (2025) and the OWASP Top 10 for Agentic Applications (2026).

    Module 4: AI security controls

    Includes an overview of NIST SP 800-218A Secure Software Development Framework (SSDF) for AI, the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, and the Cloud Security Alliance AI Controls Matrix (AICM). NIST SP 800-218A provides secure software development practices specifically for generative AI and dual-use foundation models. The Google Secure AI Framework (SAIF) provides guidance for securing AI systems, including the SAIF Risk Self-Assessment to help build and deploy AI systems securely. The OWASP AI Security and Privacy Guide provides clear and actionable insights on designing, creating, testing, and procuring secure and privacy-preserving AI systems. The AI Controls Matrix (AICM) is a comprehensive framework developed by the Cloud Security Alliance (CSA) to help organizations align their AI practices with international standards and regulations. 

    Module 5: Building an AI Security Program

    This module focuses on building a comprehensive AI security program to protect AI systems (in development and in production) as well as a security program for the underlying multi-cloud / hybrid-cloud solution. NIST SP 800-18 Rev. 2 Developing Security, Privacy, and Cybersecurity Supply Chain Risk Management Plans for Systems outlines the essential components of a System Security Pan (SSP), which documents security requirements for a system and describes the controls in place or planned to meet those requirements.  NIST SP 1800-35 Implementing a Zero Trust Architecture, which includes a discussion on enabling secure authorized access to enterprise resources distributed across on-premises and multiple cloud environments.  Module 5 also includes is a summary of NIST practices for Assessing Risks and Impacts of AI (ARIA) which supports three evaluation levels: model testing, red-teaming, and field testing.

    Module 6: AI governance, AI risk management, AI compliance, AI audit  

    This module Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    7:30 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 1
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk / Lobby

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:30 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Balancing and Managing Priorities
    speaker photo
    CISO, Massachusetts Bay Transportation Authority (MBTA)
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Session details to come.

    8:00 am
    ISACA New England Chapter Meeting (open to all attendees)
    • session level icon
    Managing Blockchain Security and Privacy: Learning from Our Past Mistakes
    speaker photo
    Professor, Carroll School of Management, Boston College
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am
    Focus Areas: Blockchain & Web3 Security; Decentralized Identity & Risk; Emerging Tech Governance
    We all know that managing cybersecurity is incredibly difficult, and given the cybersecurity failures of recent times, we see that we are still struggling to get it right.  That said, the foundational elements that make blockchain and DLT possible, such as decentralization and robust consensus algorithms, will make securing these systems even more difficult. And time is not on our side given how quickly these systems are being applied to our financial and other systems.
    This session presents a manageable approach to blockchain security and privacy that leverages what we have learned the hard way in managing cybersecurity. We examine, for example, how established practices for risk assessment and identity management must evolve to meet the truly decentralized nature of the blockchain ecosystem.
    Given that there is no perfect answer to any of this, this session is much more of a workshop with a lot of discussion, rather than the classic slide-driven conference session. This format aims to spark the kind of critical analysis and collaborative problem‑solving these emerging technologies demand, and it is based on the presenter’s experience gleaned from teaching graduate-level computer science courses and MBA courses on both blockchain systems and cybersecurity management.
    8:00 am
    Then and Now: Teaching Seniors How to Stay Safe Online
    • session level icon
    Focus Areas: Security Awareness & Education; Strategic Communication & Storytelling; Human-Centric Security & Advocacy
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    This interactive workshop equips security experts with tools to engage seniors with clear, empathetic communication about online safety. Using free custom-created resources, attendees will learn to teach without fear or jargon, and leverage analogies and storytelling. Come ready to gain skills that also translate to business settings, and any situation requiring communication with non-technical audiences.

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Security Catharsis: What InfoSec Professionals Are REALLY Thinking
    • session level icon
    Focus Areas: Cybersecurity Realism & Anti-Hype; Foundational Security Hygiene; Human Risk & Security Culture
    speaker photo
    Director, IT Security, CISO, AAA Northeast
    speaker photo
    BISO, MassMutual
    speaker photo
    Head of Product Security, Product Security Officer, Cubic Transportation Systems
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater

    The security industry has reinvented itself annually to sell us new fears. Quantum threats. AI-powered everything. The next generation of awareness training. Each year, a new wave of FUD designed to convince us we need to spend more to be “future-proof.”

    But here’s what we’ve been saying at happy hours and inside conversations for years: most of it is BS.

    Security Catharsis is the conversation we’ve been too afraid to have on stage. No vendor pitches. No corporate talking points. Just honest dialogue about where the industry has lost its way—and what we’re going to do about it. We’ll tackle a few topics:

    • Hype vs. real threat: Quantum-proof encryption, Gen-AI Chatbot Proxies, even printer security. What became of our ability to threat model?
    • Security awareness training: From compliance checkbox to victim blaming
    • Foundations vs. quick fixes: Why we keep buying band-aids for festering wounds

    Join us for an unfiltered panel discussion where security professionals say what they actually think. We’ll validate what you’ve been thinking but weren’t sure you could say out loud. We’ll challenge the FUD. And we’ll talk about what it actually takes to get back to fundamentals.

    This isn’t therapy. This is a call to action. If you’ve been having these conversations in private for years, it’s time we had them in public.

    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    AI in Cybersecurity: Game-Changer or Growing Threat?
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:10 am
    Location / Room: Networking Hall

    Artificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.

    10:10 am
    Data Security: The Missing Context
    • session level icon
    Focus Areas: Cybersecurity Readiness & ROI; Strategic Data Governance; Context-Aware AI Defense
    speaker photo
    Manager of Pre-Sales Engineering, Concentric AI
    Registration Level:
    • session level iconOpen Sessions
    10:10 am - 10:45 am

    Data security has been around for decades, and yet, it still feels like an unsolvable puzzle. Legacy technologies are typically resource-intensive, find just a small portion of companies’ sensitive data, and produce a ton of false positives. The impact to operations is often so significant that businesses never move their DLP out of monitoring mode.

    Attend this session to learn:

    • Why traditional approaches to data security have failed
    • How AI and context are revolutionizing data security
    • Where to maximize the value of your existing security investments
    • What you can do to secure your Gen AI rollouts

    With the right strategy and technology, you can transform your data from a liability to a well-managed asset.

    10:10 am
    The AI Advantage: Why Your Legacy Security Is a Liability
    • session level icon
    Focus Areas: Unified AI Security & Lifecycle Management; Legacy Transformation & AI Readiness; AI-Driven Competitive Advantage (ROI)
    speaker photo
    VP & CISO in Residence, Zscaler
    Registration Level:
    • session level iconOpen Sessions
    10:10 am - 10:45 am
    Organizations that embrace AI gain a distinct competitive advantage. However, legacy security architectures were not built for the unique demands of AI, and fragmented point products often fail to scale effectively. This session covers why a unified AI security platform provides a holistic solution, enabling organizations to protect every phase of the enterprise AI lifecycle seamlessly and at scale.
    10:10 am
    Shadow AI and the CISO's Blind Spot: Everyone's an Engineer Now!
    • session level icon
    Focus Areas: Shadow AI Governance & Discovery; AI Data Protection & DLP; AI-Native Security Engineering
    speaker photo
    VP, CISO, Boost Insurance
    Registration Level:
    • session level iconOpen Sessions
    10:10 am - 10:45 am

    The AI revolution didn’t knock on the CISO’s door—it walked right past it. ChatGPT, Copilot, Claude, Gemini, and a thousand niche AI tools have turned every employee in your organization into a self-proclaimed engineer. Marketing is building automated workflows. Sales is feeding CRM data into LLMs for forecasting. Finance is using AI to parse contracts. And none of them filed a ticket with security.

    Welcome to the era of Shadow AI , where the barrier to “engineering” a solution dropped to zero and your threat surface exploded overnight.

    For cybersecurity engineering teams, this is an existential shift. The traditional model—where security reviews happened before deployment, where IT controlled the toolchain, where data flows were visible and governed—is broken. Everyone’s an engineer now, and they’re building in the dark.

    This session tackles the hard problems CISOs are losing sleep over. How do you maintain SOC 2, CCPA, and regulatory compliance when sensitive data is leaving your environment through a chat window? How do you inventory AI services you didn’t procure and can’t see? What happens when AI-generated code ships to production without AppSec review? And how do you staff and structure your cybersecurity engineering team for a world where the threat isn’t just external adversaries—it’s your own workforce innovating without guardrails?

    We’ll get past the hand-wringing and into what actually works: building AI usage telemetry and discovery pipelines, implementing risk-tiered governance that moves at the speed of adoption, embedding security into AI workflows instead of gating them, and redefining the cybersecurity engineer’s role from gatekeeper to enabler. We’ll share real-world patterns for API-layer enforcement, DLP strategies that account for LLM interactions, and frameworks for giving the CISO the visibility they need without becoming the reason your company falls behind.

    Everyone’s an engineer now. The question is whether your security team is engineered to handle it.

    10:45 am
    Networking Break & Cyber Connect
    • session level icon
    The Human Element in Cybersecurity
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:10 am
    Location / Room: Networking Hall

    Despite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.

    11:10 am
    Breaking into the Boardroom
    • session level icon
    Focus Areas: Board Communication & Governance; Cyber Risk Strategy & Quantification; Leadership & Strategic Alignment
    speaker photo
    Operating Partner | CISO, Welsh, Carson, Anderson & Stowe
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am
    Are you leading your audit committee meetings with vulnerability statistics and budget requests? It’s essential to understand the real concerns of the board and provide them with the information they need. In this session, learn how to transition from being a security leader to becoming a trusted cyber risk leader.
    11:10 am
    From 'No' to 'How': The CISO's Upgrade in 2026
    • session level icon
    Interest tags: CISO Strategy; AI Security Governance; Security Metrics
    speaker photo
    CISO / Head of Infrastructure, Income Research + Management
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    In 2026, CISOs sit at the intersection of cyber risk, AI, regulation, and growth. The days of the “department of no” are over; security leaders are expected to be business operators who enable transformation—instead of blocking it.

    This session explores how the role is evolving, what boards and regulators now expect, and how to shift your security team from reactive firefighting to proactive business enablement. You’ll leave with a practical playbook you can apply immediately: new ways to communicate with the business, embed security into AI and digital initiatives, and measure success in terms that actually matter to executives.

    11:10 am
    Your Help Desk Just Reset a Password for an AI Agent
    • session level icon
    Focus Areas: AI-Enhanced Social Engineering; Identity-Based Initial Access; Human-in-the-Loop Risk (OOB Verification)
    speaker photo
    CEO & Co-Founder, GhostEye
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am
    Your outsourced help desk agents have access to customer data, admin consoles, and account controls. But what happens when the person calling in for help isn’t a person at all? We used OSINT to profile real employees, generated hyper-personalized pretexts, and deployed AI voice agents against live external help desks to see what we could get them to hand over. This talk walks through exactly how we did it, what worked, what didn’t, and how to lock it down before a real attacker calls.
    11:10 am
    Third-Party Risk: Managing Exposure Across Expanding Vendor Ecosystems
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    Session details to come.

    11:10 am
    [Panel] Navigating the Evolving Digital Battlefield
    • session level icon
    Focus Areas: Identity-First Security; Attack Surface Management; Supply Chain & Fourth-Party Risk
    speaker photo
    Sr. Solutions Engineer, Sumo Logic
    speaker photo
    Sr. Product Marketing Manager, Threat Intel, Infoblox
    speaker photo
    Founder & CEO, Seceon
    speaker photo
    Founder & CEO, P0 Security
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    As organizational footprints expand across cloud, SaaS, OT/IoT, and dispersed workforces, defenders face a more complex and interconnected digital battlefield. This panel brings together experts to explore how today’s threat actors combine automation, social engineering, identity breaches, and software supply-chain attacks into highly coordinated assaults.

    Panelists will examine the expanding importance of identity in the modern SOC, the emergence of AI-driven threats such as automated reconnaissance and deepfake-assisted breaches, and how fourth-party dependencies are changing risk visibility. The discussion also connects these trends to organizational resilience—showing how teams can improve detection, response, and business continuity across an evolving attack surface. This comprehensive session provides practical insights for any security leader seeking clarity amid converging threats.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] Ask Us Anything! A Live Conversation with Security Leaders
    • session level icon
    Focus Areas: Leadership, Decision Making, Communication
    speaker photo
    CISO & SVP of IT, SHL
    speaker photo
    CISO, Tufts University
    speaker photo
    CISO, Cambridge Health Alliance
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    Location / Room: Keynote Theater

    In an industry defined by constant change, some challenges have proven remarkably persistent. New technologies emerge, threat actors adapt, and the latest “revolution” captures headlines—but many of the core issues security leaders face today are the same ones they’ve been navigating for years.

    This interactive closing keynote brings together a panel of experienced security leaders for a candid, audience-driven conversation about what hasn’t changed in cybersecurity. From managing risk and influencing the business to building trust, leading teams, and responding to inevitable incidents, the discussion will focus on the enduring lessons that remain relevant—regardless of the tools, platforms, or trends of the moment.

    Attendees are encouraged to shape the conversation by asking live questions, sharing reflections, and sharing real-world scenarios. Whether the topic is AI, cloud, ransomware, or the next unknown disruption, this session offers perspective grounded in experience—and a reminder that while technology evolves, the fundamentals of security leadership remain surprisingly constant.

    Join us for an honest conversation, shared learning, and a thoughtful end to the day before we continue the discussion at happy hour.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite only)
    • session level icon
    Cyber Strategies for a Modern, AI World
    speaker photo
    Director of Cyber Resilience, Field Solution Architects, Everpure
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm
    Location / Room: 206

    Join fellow industry security leaders to exchange insights, strategies, and best practices on the critical topics of AI security in the context of threat intelligence, regulatory compliance, and emerging security technologies.

    Come ready to discuss:

    • Evolving Cyber Threats & Actors – Understanding the current state of cyber attacks and the shifting threat landscape.
    • Proactive & Reactive Strategies – Addressing threats associated with model manipulation and poisoning as well as agentic manipulation.
    • Key Security Priorities – Identifying critical risk factors and effective mitigation strategies.
    • Cyber Resilience in Strategy – Designing an AI framework to deliver cyber resilience for AI workloads.

    This is an opportunity to exchange insights, strategies, and best practices with industry peers in an intimate and exclusive setting.

    Generously supported by:

    12:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Proactive by Design: Anticipating Threats Before They Strike
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:10 pm
    Location / Room: Networking Hall

    The days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.

    1:10 pm
    Workforce Identity in the Age of Remote Deception
    • session level icon
    Focus Areas: Identity & Access Governance; Insider Risk & Workforce Integrity; Cross-Functional Security Leadership
    speaker photo
    CISO, TMF Health Quality Institute
    speaker photo
    Deputy CISO, TMF Health Quality Institute
    Registration Level:
    • session level iconConference Pass
    1:10 pm - 1:45 pm
    In today’s remote-first world, ensuring that the people doing the work are actually who they claim to be has become a critical challenge. From North Korean agents posing as freelance developers to employees collecting full-time paychecks from three different companies, the risks are as real as they are hard to detect.
    This session will offer practical strategies for managing this complex problem. The solution requires close collaboration between executives, human resources, security, compliance, and supervisors. How do you create a program that balances the competing priorities of security and teamwork? How do you regularly validate workers while not giving the impression that “big brother is watching you”?
    Leave with new insights, sharper instincts, and a fresh perspective on modern workforce protection.
    1:10 pm
    Technology Rationalization in the Age of AI: A Strategic Approach to Cyber Resilience 
    • session level icon
    Focus Areas: Rationalization & Financial Performance; Complexity Risk & The "AI Friction Tax"; Engineered Resilience for Autonomous Systems
    speaker photo
    VP, Professional Services, AccessIT Group
    Registration Level:
    • session level iconOpen Sessions
    1:10 pm - 1:45 pm
    Technology rationalization has been a standing objective for many security leaders, yet it has consistently been deprioritized in favor of more immediate initiatives. Historically, the cost of deferral was tolerable. That is no longer the case.

    Modern security environments are increasingly fragmented – characterized by excessive vendor sprawl, overlapping capabilities, redundant tooling, and limited end-to-end visibility. This complexity not only inflates cost but also undermines operational effectiveness and governance. As AI becomes embedded across security operations, software development lifecycles, business workflows, and autonomous systems, the risks associated with an unrationalized environment accelerate significantly.

    This session outlines why rationalization must move from operational backlog to strategic agenda. Participants will examine a structured approach to evaluating their current technology stack, identifying underperforming or duplicative investments, aligning capabilities to measurable business risk, and establishing a foundation that can be governed effectively in an AI-enabled enterprise.

    Designed for CISOs, security leaders, and technology executives, this session provides both the strategic framing and practical considerations required to drive meaningful rationalization at the enterprise level.
    1:10 pm
    [Panel] The Double-Edged Sword of AI in Cyber Defense
    • session level icon
    Focus Areas: AI-Powered SecOps; Adversarial AI & Synthetic Media; AI Governance & Assurance
    speaker photo
    Sales Engineer, SecureFlag
    speaker photo
    Evangelist, Sr. Solutions Architect, Security Operations, Fortinet
    speaker photo
    Field CISO, Abnormal AI
    Registration Level:
    • session level iconOpen Sessions
    1:10 pm - 1:45 pm

    AI is revolutionizing cybersecurity at all levels, speeding up detection and enabling automated attacks on an unprecedented scale. This session examines AI’s dual role as both a powerful defensive tool and a new threat vector for attackers. Panelists will discuss how AI copilots enhance analyst workflows, triage, and anomaly detection, while also addressing emerging risks such as LLM data leakage, prompt injection, model poisoning, and hallucinations within high-trust SOC processes.

    The discussion will cover AI governance and assurance frameworks, evolving regulatory expectations, and the impact of synthetic content—including deepfakes, audio spoofing, and hyper-personalized phishing—on social engineering defenses. Attendees will leave with a solid understanding of AI’s potential, the safety measures needed for responsible deployment, and practical steps for preparing teams and pipelines for an AI-driven threat environment.

    1:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Workforce Identity in the Age of Remote Deception: Why Some Candidates Break Every Gate
    speaker photo
    IT Support Specialist, Boston University
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:10 pm
    Location / Room: Networking Hall
    Remote hiring has expanded the attack surface of workforce identity. While most candidates operate within real reputational and social constraints, deceptive actors such as fake freelancers and long-term infiltrators do not. This networking break bonus session introduces a practical distinction between “bounded” and “unbounded” deception to explain why traditional interview practices unintentionally favor high-risk actors. Attendees will learn how this asymmetry leads to systematic hiring failures, why insider risk controls often arrive too late, and how security and hiring teams can introduce lightweight checks that surface risk earlier without accusations, discrimination, or complex tooling.
    2:10 pm
    Security ROI in 2026: How CISOs Build Predictable Budgets in an Unpredictable Threat Landscape
    • session level icon
    Focus Areas: Security Yield & Risk-Based Budgeting; Integrated Service Models vs. Tool Sprawl; Board-Level Financial Communication
    speaker photo
    CISO, Blue Mantis
    speaker photo
    Sr. Practice Director, Managed Services and Modern Workspace, Blue Mantis
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm
    CISOs today face rising threats, shrinking talent pools, and tool sprawl that make security programs difficult to scale and even harder to budget.

    In this session, Blue Mantis security leaders present a practical ROI framework that compares the true cost of building in house capabilities such as 24×7 monitoring, compliance operations, and platform management against modern, integrated service models.

    We’ll explore common gaps, why MDR alone is no longer enough, and how leaders can move toward predictable, outcome-driven security investments. Attendees will walk away with actionable guidance to simplify their environment, strengthen their security posture, and confidently justify budget requirements at the executive and board level.
    2:10 pm
    Reduce the Blast Radius with Microsegmentation
    • session level icon
    Focus Areas: Microsegmentation & Lateral Movement Defense; Zero Trust Architecture (ZTA); Hybrid Cloud Security; Workload Isolation
    speaker photo
    Technical Director of Security, EchoStor
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Many organizations struggle with security in complex IT environments, from legacy data centers to the cloud deployments. A key challenge is defending against malicious lateral movement (east/west traffic). This session discusses how segmentation and microsegmentation offer a proven strategy to mitigate these risks.

    The session explores how these approaches enhance security across all IT infrastructure layers by creating granular, isolated security zones around workloads and applications. You’ll gain insights into how this significantly reduces the “blast radius” of a breach, limits attacker movement, and strengthens your overall cybersecurity posture.

    2:10 pm
    InfraGard Boston Chapter Meeting (open to all attendees):
    • session level icon
    Coloring Outside the Lines: Operationalizing AI Governance
    speaker photo
    Managing Director, Novus Laurus
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm
    AI isn’t politely arriving on a rollout plan. It’s already embedded in vendors, workflows, and decisions that slipped past policy. That reality forces a shift. Governance has to mean more than binders, policies, and charter documents. What does governance look like when you cannot yet see the shape, scale or future use of AI, inside or outside your organization, and yet it is already shaping decisions today? How do you operationalize governance so AI can support growth rather than suppress innovation? And how do you design governance to be durable when it may never be complete?
    This session brings a grounded perspective from the realities of making AI governance work in practice.
    2:10 pm
    [Panel] Cloud Security & Multi-Cloud Defense: Securing the Modern Enterprise
    • session level icon
    Focus Areas: Multi-Cloud & SaaS Governance; Workload & Data Protection; Zero Trust & Edge Security
    speaker photo
    Lead, GRC Solutions Expert, Vanta
    speaker photo
    Director, Information Assurance, Acadian Asset Management
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Modern enterprises rely on a complex mix of cloud providers, SaaS platforms, APIs, and distributed identities—offering agility but also creating new control gaps. This panel gathers leaders in CSPM, workload protection, cloud identity, API security, and SaaS governance to explore the challenges of securing multi-cloud environments at scale.

    Panelists will discuss AI-driven misconfigurations, rapid SaaS sprawl, and the persistent risk of API-related breaches, as well as how zero trust principles are applied to cloud entitlements and data flows. The conversation also covers DSPM-led visibility, cross-cloud identity governance, and the convergence of network and cloud security through SASE/SSE. Whether you’re cloud-mature or still early in the journey, this session provides strategies for protecting cloud workloads, identities, and data in environments where every misconfiguration can become a breach.

    2:45 pm
    Networking Break & Cyber Connect
    • session level icon
    Cybersecurity Culture: Why Your Biggest Vulnerability Is Still Your People
    speaker photo
    CISM, CRISC, GISP, ITILv4
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:15 pm
    Location / Room: Networking Hall

    Organizations spend billions annually on firewalls, endpoint protection, SIEM platforms, and zero-trust architecture—yet the most sophisticated breach often begins with a single employee clicking the wrong link. The uncomfortable truth is that technology alone will never be enough.

    In this interactive discussion, Gene Kingsley draws on his experience building cybersecurity communities and bridging the gap between technical teams and the humans they protect. Together, we’ll explore why culture—not tools—is the ultimate security layer, and what enterprise security leaders can do Monday morning to start closing the human gap.

    Come ready to share, challenge, and leave with something actionable.

    3:15 pm
    [Closing Keynote] Insider Flashpoints: How Organizational Change Sparks Insider Leaks, and How to Stop Them
    • session level icon
    speaker photo
    CEO & Co-Founder, EchoMark
    Registration Level:
    • session level iconOpen Sessions
    3:15 pm - 4:00 pm
    Location / Room: Keynote Theater

    Session details to come.

    4:00 pm
    Happy Hour
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 5:30 pm
    Location / Room: Networking Hall

    Join your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.

     

    4:00 pm
    [PLUS Course] Protecting AI Systems from Malicious Cyber Attacks - Part 2
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    4:00 pm - 5:30 pm

    Upon completion of this course, attendees will have an up-to-date understanding of how AI works, AI implementation options, AI threats and vulnerabilities, AI security controls standards, best practices for building an AI security program, and assessing risks assessing AI security risks. The course covers technical security controls applied to AI systems and underlying infrastructure before, during, and after a cyberattack. Finally, administrative security capabilities, including AI governance, risk management, compliance, and audit considerations will be discussed.

    Today’s companies develop, deploy, access AI applications and workloads through many computing environments including public cloud, private cloud, multi-cloud, hybrid cloud, and on-premises. These AI implementations and operations involve the risk of one or more cyberattacks that target the AI systems directly (model tampering, agent manipulation, data poisoning, GPU runtime exploits, etc.) or target the underlying infrastructure (public cloud, private cloud, on-premises, etc.) where the AI systems reside. The various development and deployment solutions make securing high-risk AI systems a challenge. A comprehensive AI cybersecurity program should account the various of development / deployment / operations scenarios.

    The objective of this class is to help organizations design, develop, build, and manage high-risk AI systems and the underlying cloud, multi-cloud, hybrid cloud, on-premises environments that support AI systems throughout design, development, deployment, and operations. The course deliverables are grouped into six modules which cover key topics related to building a highly effective AI Security Program.

    Module 1: What is Artificial Intelligence (AI) and how does AI work?

    Includes an overview of Artificial Intelligence (AI) including how AI works (applications and workloads), AI architecture, components, and processes (models, algorithms, workflows). Module 1 includes topics such as AI Models (Generative AI, Large Language Models (LLMs), foundation models), and Multi-Agent Systems (MAS). A review of AI Use Cases across multiple industry sectors is included.

    Module 2: AI Cloud Adoption Frameworks (CAFs)

    An AI Cloud Adoption Framework (CAF) provides a structured approach to adopting AI solutions effectively and responsibly. It is designed to guide organizations through the process of implementing AI workloads ensuring scalability, security, and operational excellence. Topics include developing, deploying, and securing AI solutions in Microsoft Azure Cloud, Amazon Web Services (AWS), Google Cloud Platform (GCP) and Oracle Cloud Infrastructure (OCI). Deployment models include IaaS (bring your AI), PaaS (build your AI), and SaaS (buy your AI).

    Module 3: AI threats and Vulnerabilities

    AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.  Topics include an overview of the FS-ISAC Adversarial AI Framework, MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems), and OWASP Agentic AI Threats. Module 3 also includes a discussion of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. Topics include the OWASP Top 10 for LLM Applications (2025) and the OWASP Top 10 for Agentic Applications (2026).

    Module 4: AI security controls

    Includes an overview of NIST SP 800-218A Secure Software Development Framework (SSDF) for AI, the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, and the Cloud Security Alliance AI Controls Matrix (AICM). NIST SP 800-218A provides secure software development practices specifically for generative AI and dual-use foundation models. The Google Secure AI Framework (SAIF) provides guidance for securing AI systems, including the SAIF Risk Self-Assessment to help build and deploy AI systems securely. The OWASP AI Security and Privacy Guide provides clear and actionable insights on designing, creating, testing, and procuring secure and privacy-preserving AI systems. The AI Controls Matrix (AICM) is a comprehensive framework developed by the Cloud Security Alliance (CSA) to help organizations align their AI practices with international standards and regulations. 

    Module 5: Building an AI Security Program

    This module focuses on building a comprehensive AI security program to protect AI systems (in development and in production) as well as a security program for the underlying multi-cloud / hybrid-cloud solution. NIST SP 800-18 Rev. 2 Developing Security, Privacy, and Cybersecurity Supply Chain Risk Management Plans for Systems outlines the essential components of a System Security Pan (SSP), which documents security requirements for a system and describes the controls in place or planned to meet those requirements.  NIST SP 1800-35 Implementing a Zero Trust Architecture, which includes a discussion on enabling secure authorized access to enterprise resources distributed across on-premises and multiple cloud environments.  Module 5 also includes is a summary of NIST practices for Assessing Risks and Impacts of AI (ARIA) which supports three evaluation levels: model testing, red-teaming, and field testing.

    Module 6: AI governance, AI risk management, AI compliance, AI audit  

    This module Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    4:00 pm
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 2
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    4:00 pm - 5:30 pm

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

  • Thursday, April 9, 2026
    7:00 am
    Registration open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    7:00 am - 4:15 pm
    Location / Room: Registration Desk

    Come to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.

    7:30 am
    [PLUS Course] Protecting AI Systems from Malicious Cyber Attacks - Part 3
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:30 am

    Upon completion of this course, attendees will have an up-to-date understanding of how AI works, AI implementation options, AI threats and vulnerabilities, AI security controls standards, best practices for building an AI security program, and assessing risks assessing AI security risks. The course covers technical security controls applied to AI systems and underlying infrastructure before, during, and after a cyberattack. Finally, administrative security capabilities, including AI governance, risk management, compliance, and audit considerations will be discussed.

    Today’s companies develop, deploy, access AI applications and workloads through many computing environments including public cloud, private cloud, multi-cloud, hybrid cloud, and on-premises. These AI implementations and operations involve the risk of one or more cyberattacks that target the AI systems directly (model tampering, agent manipulation, data poisoning, GPU runtime exploits, etc.) or target the underlying infrastructure (public cloud, private cloud, on-premises, etc.) where the AI systems reside. The various development and deployment solutions make securing high-risk AI systems a challenge. A comprehensive AI cybersecurity program should account the various of development / deployment / operations scenarios.

    The objective of this class is to help organizations design, develop, build, and manage high-risk AI systems and the underlying cloud, multi-cloud, hybrid cloud, on-premises environments that support AI systems throughout design, development, deployment, and operations. The course deliverables are grouped into six modules which cover key topics related to building a highly effective AI Security Program.

    Module 1: What is Artificial Intelligence (AI) and how does AI work?

    Includes an overview of Artificial Intelligence (AI) including how AI works (applications and workloads), AI architecture, components, and processes (models, algorithms, workflows). Module 1 includes topics such as AI Models (Generative AI, Large Language Models (LLMs), foundation models), and Multi-Agent Systems (MAS). A review of AI Use Cases across multiple industry sectors is included.

    Module 2: AI Cloud Adoption Frameworks (CAFs)

    An AI Cloud Adoption Framework (CAF) provides a structured approach to adopting AI solutions effectively and responsibly. It is designed to guide organizations through the process of implementing AI workloads ensuring scalability, security, and operational excellence. Topics include developing, deploying, and securing AI solutions in Microsoft Azure Cloud, Amazon Web Services (AWS), Google Cloud Platform (GCP) and Oracle Cloud Infrastructure (OCI). Deployment models include IaaS (bring your AI), PaaS (build your AI), and SaaS (buy your AI).

    Module 3: AI threats and Vulnerabilities

    AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.  Topics include an overview of the FS-ISAC Adversarial AI Framework, MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems), and OWASP Agentic AI Threats. Module 3 also includes a discussion of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. Topics include the OWASP Top 10 for LLM Applications (2025) and the OWASP Top 10 for Agentic Applications (2026).

    Module 4: AI security controls

    Includes an overview of NIST SP 800-218A Secure Software Development Framework (SSDF) for AI, the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, and the Cloud Security Alliance AI Controls Matrix (AICM). NIST SP 800-218A provides secure software development practices specifically for generative AI and dual-use foundation models. The Google Secure AI Framework (SAIF) provides guidance for securing AI systems, including the SAIF Risk Self-Assessment to help build and deploy AI systems securely. The OWASP AI Security and Privacy Guide provides clear and actionable insights on designing, creating, testing, and procuring secure and privacy-preserving AI systems. The AI Controls Matrix (AICM) is a comprehensive framework developed by the Cloud Security Alliance (CSA) to help organizations align their AI practices with international standards and regulations. 

    Module 5: Building an AI Security Program

    This module focuses on building a comprehensive AI security program to protect AI systems (in development and in production) as well as a security program for the underlying multi-cloud / hybrid-cloud solution. NIST SP 800-18 Rev. 2 Developing Security, Privacy, and Cybersecurity Supply Chain Risk Management Plans for Systems outlines the essential components of a System Security Pan (SSP), which documents security requirements for a system and describes the controls in place or planned to meet those requirements.  NIST SP 1800-35 Implementing a Zero Trust Architecture, which includes a discussion on enabling secure authorized access to enterprise resources distributed across on-premises and multiple cloud environments.  Module 5 also includes is a summary of NIST practices for Assessing Risks and Impacts of AI (ARIA) which supports three evaluation levels: model testing, red-teaming, and field testing.

    Module 6: AI governance, AI risk management, AI compliance, AI audit  

    This module Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    7:30 am
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 3
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    7:30 am - 9:00 am

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

    8:00 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 4:45 pm
    Location / Room: Networking Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    8:00 am
    Advisory Council Roundtable Breakfast (VIP / Invite only)
    • session level icon
    Registration Level:
    • session level iconVIP / Exclusive
    8:00 am - 8:45 am

    Moderated discussion for SecureWorld Advisory Council members. By invite only.

    8:00 am
    ISSA New England Chapter Meeting (open to all attendees)
    • session level icon
    Insider Threats: The Call Is Coming from Inside the House
    speaker photo
    Author, "Blank Canvas: How I Reinvented My Life After Prison"
    Registration Level:
    • session level iconOpen Sessions
    8:00 am - 8:45 am

    Most insider threats don’t begin with malicious intent. They begin with a human being under pressure. Fear. Scarcity. Insecurity. These emotional drivers create tiny rationalizations that bypass even the strongest controls: “They owe me.” “I’ll fix it before anyone notices.” “This isn’t a big deal.”

    By the time a security system detects something unusual, the damage is already in motion, because insider threats are fundamentally human threats. And humans are always smarter than the system when they’re driven by need and fueled by rationalization.

    In this gripping, first-person session, Craig Stanland, who committed and served time for an $800K fraud, exposes how rationalization quietly rewires judgment, overrides policy, and turns trusted employees into your most significant vulnerability. This session goes beyond frameworks and compliance.

    Focus Areas: Insider Threats; Risk Quantification; User and Entity Behavior Analytics

    8:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:45 am - 9:00 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    9:00 am
    [Opening Keynote] Security at the Speed of Innovation
    • session level icon
    Focus Areas: DevSecOps & Velocity-First Security; Hybrid Security Leadership; Securing AI & Agentic Ecosystems
    speaker photo
    CISO, Pep Boys
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    Location / Room: Keynote Theater
    What if your security program did its job, was compliant, and made engineering faster, not slower?
    This talk sheds light on security leadership’s evolving role and the rise of the hybrid CISO, velocity-first security models structured around risk-based controls instead of toll gates, automation everywhere, human exceptions by design, and a shift-left / shield-right strategy that iteratively increases delivery velocity while lowering blast radius each delivery cycle. Then we go straight at the hard part: securing agentic and generative AI ecosystems from north-south and east-west so every line of business can innovate with confidence. If you’re tired of security being the department of “no,” this session is your blueprint to become the engine of “go.”
    9:45 am
    Networking Break & Cyber Connect
    • session level icon
    Continue the Conversation with Opening Keynote Speaker Silas Adams
    speaker photo
    CISO, Pep Boys
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:10 am
    Location / Room: Networking Hall

    Silas Adams just told you why everyone is tired of security being the department of “no,” offering a blueprint for cybersecurity professionals at all levels to become the engines of “go.” Come join this bonus session in the Networking Hall immediately after his opening keynote and continue the conversation.

    10:10 am
    Building Back Up a Seasoned Security Architecture Team in the OT World
    • session level icon
    Focus Areas: OT Security Leadership & Talent Management; Critical Infrastructure Architecture; Strategic IT-OT Business Alignment
    speaker photo
    Manager, Security Architecture & Strategy, Eversource Energy
    Registration Level:
    • session level iconConference Pass
    10:10 am - 10:45 am

    What happens when you inherit a large security architecture team of mixed disciplines in power and energy? You get to work. Understand what everyone is doing, understand how unique each offering architect is, find out what makes them tick, find out their interests. Then, as Mike Rowe said…safety third…then refine. Learn how to focus on your people, focus on IT; then align to the business to get it all done.

    10:10 am
    How Are You, Really? The Hidden Power of Identity in the Enterprise
    • session level icon
    Focus Areas: IAM as a Business Enabler; Strategic IAM Governance & Leadership; Human-Centric Security & Operational Resilience
    speaker photo
    VP, Global Head IT & Security, EDETEK Inc.
    Registration Level:
    • session level iconConference Pass
    10:10 am - 10:45 am

    This presentation delves into why identity is more than just login credentials—it’s the linchpin of organizational security, collaboration, and strategic growth. This session peels back the layers of traditional access management, revealing how a robust IAM framework not only fortifies defenses against breaches but also empowers teams to innovate and scale. By understanding the full spectrum of identity’s influence, attendees will discover practical strategies to leverage IAM as a driving force for resilience and competitive advantage in a rapidly evolving digital world.

    10:10 am
    Is Your Enterprise Ready for AI?
    • session level icon
    Focus Areas: Shadow AI & Data Exfiltration Risk; AI Readiness & Financial Performance (ROA); Browser-Based Identity & Policy Enforcement
    speaker photo
    VP, Field CTO, Island
    Registration Level:
    • session level iconOpen Sessions
    10:10 am - 10:45 am

    Everyone is using GenAI apps, and most are accessed via the browser. Are you able to see it, understand it, and adopt it safely? This session addresses the number one concern among corporate leaders: realizing the benefits of GenAI adoption while retaining the data controls, policy enforcement, and compliance that enterprises need.

    This session covers:

    • The risks associated with Shadow AI and lack of visibility
    • How data leaks into unapproved AI apps, including employees uploading/copying/pasting sensitive data into unmanaged AI tools
    • How you can gain visibility in AI activity and design policies that safely enables AI usage
    • Other tips for managing employee use of AI within corporate boundaries
    10:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:10 am
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:10 am
    Merge with Caution: Navigating the Security Gravity of Large-Scale Tenant Consolidation
    • session level icon
    Focus Areas: Cloud Governance & Architecture; M&A Cybersecurity Strategy; Identity & Access Management (IAM)
    speaker photo
    CISO | SVP, Infrastructure and Operations, KnitWell Group
    Registration Level:
    • session level iconConference Pass
    11:10 am - 11:45 am

    In an era of rapid-fire mergers and acquisitions (M&A) and organic “cloud sprawl,” enterprises frequently find themselves managing a chaotic archipelago of disparate cloud tenants. While consolidation promises operational efficiency and cost savings, the act of merging these environments is a high-stakes surgical procedure. One wrong move in sequencing or identity mapping can create “security gravity”—where the complexity of the move itself creates new, unforeseen vulnerabilities.

    This session provides a strategic blueprint for CISOs, architects, and risk managers tasked with folding multiple cloud environments into a unified structure. We will move beyond the basic migration checklist to explore the deep-tissue risks of tenant consolidation, including identity collisions, “inherited” misconfigurations, and the concentration risk of a centralized blast radius. Attendees will leave with a framework for phased sequencing that prioritizes security stability over mere speed.

    11:10 am
    2026 State of Cybersecurity and the Reality of Modern Cyber Threats
    • session level icon
    Focus Areas: Low-Friction Social Engineering; Scalable Extortion & Ransomware Trends; AI as a Force Multiplier
    speaker photo
    Field CTO, Arctic Wolf
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am
    The past year revealed a startling trend: cybercriminals are keeping it simple and succeeding. Phishing, vishing, and AI-driven attacks are fueling a surge in breaches, while ransomware tactics are shifting dramatically. What does this mean for 2026?
    Join this session as we review recent threat research to uncover: the industries most targeted by ransomware, the social engineering tactic dominating 85% of IR cases, and how AI weaponization is likely to impact global events. With new data sourced from hundreds of real IR engagements; this session delivers a clear-eyed look at how today’s attacks unfold in modern environments, and which foundational controls are proving most effective at stopping them.
    11:10 am
    ISC2 Eastern Massachusetts Chapter Meeting (open to all attendees)
    • session level icon
    Pyongyang’s Programmers: Solving Developer Shortage with Kim's Keyboard Commandos
    speaker photo
    CISO & VP, Information Security & Risk Management, Bright Horizons
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    North Korea (DPRK) has weaponized remote work and has been infiltrating IT workers into U.S. and European companies. They are generating revenue for the rogue state, stealing intellectual property and cryptocurrency, and compromising infrastructure for future ransomware extortion. Join this session for key TTPs of this insider threat and mitigation strategies.

    Focus Areas: Global Workforce Risk; State-Sponsored Financial Crime; Fraudulent Identity & Recruitment Vetting

    11:10 am
    [Panel] The Human Layer: Insider Risk, Social Engineering, and Behavioral Analytics
    • session level icon
    Focus Areas: Insider Risk & Behavioral Analytics; Social Engineering & AI Deception; Identity Security & Access Governance
    speaker photo
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group
    speaker photo
    Sales Engineering Director, Delinea
    speaker photo
    Sr. Solutions Engineer, Splunk, a Cisco company
    speaker photo
    Sr. Principal Sales Engineer, Ping Identity
    speaker photo
    VP, Technology and Cybersecurity Audit & Advisory Services, Manulife
    Registration Level:
    • session level iconOpen Sessions
    11:10 am - 11:45 am

    The human element remains the most targeted and least predictable part of every security program—now intensified by AI-powered social engineering. This panel examines how attackers weaponize synthetic voice and video deepfakes, personalized phishing, MFA fatigue, session hijacking, and multi-channel lures across email, mobile, chat, and collaboration apps.

    Experts in insider risk, UEBA, identity security, and DLP will discuss how behavioral analytics detect subtle anomalies while maintaining privacy guardrails for employees. Panelists will also address how privileged access governance is evolving in cloud-heavy environments. Attendees will leave with practical guidance for reducing user friction, improving detection, countering AI-driven lures, and building a resilient workforce that remains the strongest defense against evolving attacker tactics.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Networking Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    [Lunch Keynote] The Intersection of Cyber Incident Response, Regulatory Compliance, and Enforcement in a Rapidly Evolving Threat Environment
    • session level icon
    Focus Areas: Regulatory Compliance & Enforcement; Incident Response Strategy; Cyber Liability & Legal Risk
    speaker photo
    Cybersecurity Leader and Executive Director of FormerGov; Former Cybercrime Prosecutor and National Coordinator for Cybercrime Prosecutors Across U.S.
    speaker photo
    Assistant Attorney General; Chief, Privacy and Responsible Technology Division, Massachusetts Office of the Attorney General
    speaker photo
    Partner & Chair - International Trade, National Security, Cybersecurity & AI, Hinckley Allen; Former National Security Chief, U.S. Attorney’s Office for the District of Massachusetts
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Our panel of experts discusses bridging the critical gap between corporate legal strategy, operational security, and law enforcement intervention. Panelists have expertise in cybersecurity compliance issues and the increasing liability risks associated with failing to comply with U.S. data security requirements, including under the False Claims Act, as well as cyber incident response, cyber threats, and increasing enforcement actions by state AGOs.

    12:00 pm
    Advisory Council Roundtable Lunch (VIP / Invite Only)
    • session level icon
    Sponsored by Rubrik
    Registration Level:
    • session level iconVIP / Exclusive
    12:00 pm - 12:45 pm

    Moderated discussion for SecureWorld Advisory Council members. By invite only. Topic and moderator to be announced.

    Generously sponsored by:

    12:45 pm
    Networking Break & Cyber Connect:
    • session level icon
    Balancing and Managing Priorities as a Cybersecurity Professional
    speaker photo
    CISO, Massachusetts Bay Transportation Authority (MBTA)
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:10 pm
    Location / Room: Networking Hall

    Session details to come.

    1:10 pm
    Behind the Prompt: A CISO's Practical AI Journey
    • session level icon
    Focus Areas: Practical AI Implementation; Security Operations Automation; Leadership Perspectives
    speaker photo
    CISO, Executive Office of Economic Development, Commonwealth of Massachusetts
    Registration Level:
    • session level iconConference Pass
    1:10 pm - 1:45 pm

    AI isn’t just a buzzword — it’s become a practical tool in everyday life. In this session, cybersecurity leader Mark Annati shares how he uses AI both professionally and personally, from automating policy work and streamlining threat analysis to planning trips and solving real-world problems at home. With relatable examples, lessons learned, and a focus on what works (and what doesn’t), this talk offers a grounded perspective on AI’s role in modern cybersecurity and beyond — accessible to both technical and non-technical audiences.

    1:10 pm
    Building Cybersecurity Resilience for Small Businesses: State Programs and Practical Tools
    • session level icon
    Focus areas: Small Business Resilience & Funding; Security Foundations & Baselines: Interactive Security Training
    speaker photo
    Outreach Program Manager, MassCyberCenter
    speaker photo
    Sr. Program Manager, MassCyberCenter
    Registration Level:
    • session level iconConference Pass
    1:10 pm - 1:45 pm

    Representatives from the MassCyberCenter lead an informative session on how small businesses in Massachusetts can strengthen their cybersecurity posture with the help of state-supported programs and resources. Learn about the minimum cybersecurity baseline recommended for small businesses, explore available state initiatives and funding opportunities, including the MassCyberCenter’s Security Operations Center / Cyber Range Initiative and the Cyber Resilient Massachusetts Grant Program, and discover engaging tools like the Cybersecure: Defend the Network card game that make learning cyber defense strategies interactive and fun. This session is designed to empower small businesses with practical steps and accessible resources to protect their operations and thrive in today’s digital landscape.

    1:10 pm
    Data Minimization: Turning ROT Data into Risk Reduction and Savings
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:10 pm - 1:45 pm

    Session details to come.

    1:10 pm
    [Panel] Resilience Engineering: Incident Response, Business Continuity, and Cyber Insurance
    • session level icon
    Focus Areas: Operational Resilience & BCP; Incident Response & Crisis Management; Cyber Insurance & Executive Reporting
    speaker photo
    Director, Information Security, Hypertherm Associates
    Registration Level:
    • session level iconOpen Sessions
    1:10 pm - 1:45 pm

    Resilience has shifted from a compliance task to a vital business skill. This panel explores how organizations prepare for disruptive cyber incidents involving multi-cloud setups, SaaS dependencies, supply chain issues, and rapid ransomware attacks. With experts in incident response, digital forensics, MDR, insurance, and crisis management, the panel emphasizes developing response playbooks that mirror current operational dependencies.

    Panelists will explore insurer-driven requirements for identity security and MFA, lessons from major SaaS outages, and how to communicate effectively with executives and boards when downtime impacts revenue-critical operations. Attendees will gain a comprehensive understanding of how to engineer resilience—not just respond—and how to align IR, continuity planning, insurance, and business priorities into a unified, enterprise-wide strategy.

    1:50 pm
    Networking Break & Cyber Connect
    • session level icon
    Cyber Talent Crisis: Recruiting, Retaining, and Reskilling Your Team
    Registration Level:
    • session level iconOpen Sessions
    1:50 pm - 2:10 pm
    Location / Room: Networking Hall

    The cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.

    Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.

    2:10 pm
    Code, AI, and Vibes: Securing Apps When the Robots Start Freelancing
    • session level icon
    Focus Areas: Application Security; Generative AI Security; DevSecOps
    speaker photo
    Application Security Leader, McKinsey & Co.
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    As AI takes over the heavy lifting in code generation, “vibe coding,” where developers steer AI with ideas instead of syntax, is changing the game. But with great AI power comes great security responsibility. This talk dives into the quirks of AI-built code, the new role of developers as vibe curators, and how application security needs to level up to keep pace with our robot co-workers.

    2:10 pm
    Security and AI: Friends and Foes
    • session level icon
    Focus Areas: Agentic AI; Model Context Protocol (MCP) Security; Vibe Coding; AI-Assisted Defense: Scaling Penetration Testing and Code Review
    speaker photo
    Principal Engineer, Application Security, CarGurus
    Registration Level:
    • session level iconConference Pass
    2:10 pm - 2:45 pm

    LLMs and AI-powered applications are reshaping application security. They introduce new risks, but they also give security engineers powerful new capabilities.

    This presentation covers the emerging threat landscape created by AI adoption (including MCPs, agentic AI, LLM-integrated systems, and vibe coding), and the new security failure modes that come with them. It also explores how AI can strengthen security programs through faster, higher-signal code reviews, more scalable penetration testing, and other AI-assisted techniques that improve coverage and resilience.
    2:10 pm
    OT/ICS Incident Response: Specialized Triage for Critical Infrastructure Breaches
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Session details to come.

    2:10 pm
    [Panel] The Great Consolidation: Rationalizing the Security Stack
    • session level icon
    Focus Areas: Security Stack Consolidation; SecOps Efficiency & ROI; Unified Detection & Response (XDR/SIEM Integration)
    speaker photo
    Sr. Sales Engineer, Reach Security
    speaker photo
    CTO, ColorTokens
    speaker photo
    Principal Software Engineer, Chainguard
    speaker photo
    Global Principal Solutions Architect - Cyber Intelligence & Risk, Google Cloud
    speaker photo
    vCISO & Executive Advisor, LRS
    Registration Level:
    • session level iconOpen Sessions
    2:10 pm - 2:45 pm

    Security teams are under increasing pressure to reduce tool sprawl, streamline SOC workflows, and demonstrate measurable ROI—fueling a wave of consolidation across the industry. This panel explores the shift toward unified detection and response platforms, integrated identity and data controls, AI-enabled SOC copilots that unify telemetry, and architectural simplification that reduces operational drag.

    Panelists from XDR, SIEM, platform security, and MSSP providers will discuss frameworks for evaluating ROI, navigating contract consolidation, avoiding visibility gaps, and deciding where consolidation strengthens or weakens security posture. Ideal for leaders facing budget constraints or platform migrations, this session offers practical guidance for optimizing spending without sacrificing coverage.

    2:45 pm
    Networking Break and Dash for Prizes
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:15 pm
    Location / Room: Networking Hall

    Visit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.

    Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

    3:15 pm
    [PLUS Course] Protecting AI Systems from Malicious Cyber Attacks - Part 4
    • session level icon
    speaker photo
    Sr. Cybersecurity Consultant, Wilson Cyber
    Registration Level:
    • session level iconSecureWorld Plus
    3:15 pm - 4:45 pm

    Upon completion of this course, attendees will have an up-to-date understanding of how AI works, AI implementation options, AI threats and vulnerabilities, AI security controls standards, best practices for building an AI security program, and assessing risks assessing AI security risks. The course covers technical security controls applied to AI systems and underlying infrastructure before, during, and after a cyberattack. Finally, administrative security capabilities, including AI governance, risk management, compliance, and audit considerations will be discussed.

    Today’s companies develop, deploy, access AI applications and workloads through many computing environments including public cloud, private cloud, multi-cloud, hybrid cloud, and on-premises. These AI implementations and operations involve the risk of one or more cyberattacks that target the AI systems directly (model tampering, agent manipulation, data poisoning, GPU runtime exploits, etc.) or target the underlying infrastructure (public cloud, private cloud, on-premises, etc.) where the AI systems reside. The various development and deployment solutions make securing high-risk AI systems a challenge. A comprehensive AI cybersecurity program should account the various of development / deployment / operations scenarios.

    The objective of this class is to help organizations design, develop, build, and manage high-risk AI systems and the underlying cloud, multi-cloud, hybrid cloud, on-premises environments that support AI systems throughout design, development, deployment, and operations. The course deliverables are grouped into six modules which cover key topics related to building a highly effective AI Security Program.

    Module 1: What is Artificial Intelligence (AI) and how does AI work?

    Includes an overview of Artificial Intelligence (AI) including how AI works (applications and workloads), AI architecture, components, and processes (models, algorithms, workflows). Module 1 includes topics such as AI Models (Generative AI, Large Language Models (LLMs), foundation models), and Multi-Agent Systems (MAS). A review of AI Use Cases across multiple industry sectors is included.

    Module 2: AI Cloud Adoption Frameworks (CAFs)

    An AI Cloud Adoption Framework (CAF) provides a structured approach to adopting AI solutions effectively and responsibly. It is designed to guide organizations through the process of implementing AI workloads ensuring scalability, security, and operational excellence. Topics include developing, deploying, and securing AI solutions in Microsoft Azure Cloud, Amazon Web Services (AWS), Google Cloud Platform (GCP) and Oracle Cloud Infrastructure (OCI). Deployment models include IaaS (bring your AI), PaaS (build your AI), and SaaS (buy your AI).

    Module 3: AI threats and Vulnerabilities

    AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.  Topics include an overview of the FS-ISAC Adversarial AI Framework, MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems), and OWASP Agentic AI Threats. Module 3 also includes a discussion of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. Topics include the OWASP Top 10 for LLM Applications (2025) and the OWASP Top 10 for Agentic Applications (2026).

    Module 4: AI security controls

    Includes an overview of NIST SP 800-218A Secure Software Development Framework (SSDF) for AI, the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, and the Cloud Security Alliance AI Controls Matrix (AICM). NIST SP 800-218A provides secure software development practices specifically for generative AI and dual-use foundation models. The Google Secure AI Framework (SAIF) provides guidance for securing AI systems, including the SAIF Risk Self-Assessment to help build and deploy AI systems securely. The OWASP AI Security and Privacy Guide provides clear and actionable insights on designing, creating, testing, and procuring secure and privacy-preserving AI systems. The AI Controls Matrix (AICM) is a comprehensive framework developed by the Cloud Security Alliance (CSA) to help organizations align their AI practices with international standards and regulations. 

    Module 5: Building an AI Security Program

    This module focuses on building a comprehensive AI security program to protect AI systems (in development and in production) as well as a security program for the underlying multi-cloud / hybrid-cloud solution. NIST SP 800-18 Rev. 2 Developing Security, Privacy, and Cybersecurity Supply Chain Risk Management Plans for Systems outlines the essential components of a System Security Pan (SSP), which documents security requirements for a system and describes the controls in place or planned to meet those requirements.  NIST SP 1800-35 Implementing a Zero Trust Architecture, which includes a discussion on enabling secure authorized access to enterprise resources distributed across on-premises and multiple cloud environments.  Module 5 also includes is a summary of NIST practices for Assessing Risks and Impacts of AI (ARIA) which supports three evaluation levels: model testing, red-teaming, and field testing.

    Module 6: AI governance, AI risk management, AI compliance, AI audit  

    This module Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.

    3:15 pm
    [PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six Hours - Part 4
    • session level icon
    speaker photo
    vCISO, Cyber Risk Opportunities LLC
    Registration Level:
    • session level iconSecureWorld Plus
    3:15 pm - 4:45 pm

    This intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:

    • Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
    • Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
    • A step-by-step action plan – No more guessing what to do next
    • Real-world case studies – See how organizations just like yours have successfully implemented the framework
    • Expert-level confidence – Finally speak cybersecurity with authority and clarity

    What makes this different?
    This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.

    Perfect for:

    • IT Directors and Managers
    • Cybersecurity Professionals
    • Business Leaders responsible for risk management
    • Compliance Officers
    • Anyone tasked with “figuring out cybersecurity”

    Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:

    • Getting BUY-IN from your senior decision makers
    • Discovering your top five cyber risks
    • Creating a prioritized risk mitigation plan with implementation roadmap
    • A score card you can use to track progress

    Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.

    Your organization’s cybersecurity can’t wait. Register now.

Exhibitors
  • 1Kosmos
    Booth: 245

    For strong authentication, you need a strong identity. Upgrade identity authentication & Go Passwordless with the 1Kosmos digital identity solution.

  • Abnormal AI
    Booth: 317

    Abnormal AI is the leading AI-native human behavior security platform, leveraging machine learning to stop sophisticated inbound attacks and detect compromised accounts across email and connected applications. The anomaly detection engine leverages identity and context to understand human behavior and analyze the risk of every cloud email event—detecting and stopping sophisticated, socially-engineered attacks that target the human vulnerability.

    You can deploy Abnormal in minutes with an API integration for Microsoft 365 or Google Workspace and experience the full value of the platform instantly. Additional protection is available for Slack, Workday, ServiceNow, Zoom, and multiple other cloud applications. Abnormal is currently trusted by more than 3,200 organizations, including over 20% of the Fortune 500, as it continues to redefine how cybersecurity works in the age of AI.

  • AccessIT Group
    Booth: 400

    AccessIT Group is your partner in cybersecurity. Our talented team of security experts deliver customized solutions designed to protect your systems and information from increasing security threats. From design and implementation to cybersecurity compliance and training, we provide a single point of contact for all your security needs.

    AccessIT Group seeks to differentiate itself by offering a higher level of expertise from engineers and sales staff, all of whose knowledge was derived from real life enterprise deployments. These values have helped AccessIT Group grow to become the first-choice cyber security provider in our region. Today, AccessIT Group maintains sales and service offices in King of Prussia, PA, Mountain Lakes, NJ, New York, NY, Columbia, MD, and Boston, MA.

  • Action1
    Booth: 426

    Action1 reinvents patch management with an infinitely scalable and highly secure platform configurable in 5 minutes that just works. With integrated real-time vulnerability discovery and automated remediation for both third-party software and OS, peer-to-peer patch distribution, and IT ecosystem integrations, it ensures continuous patch compliance and reduces security and ransomware risks—all while lowering costs. Action1 is certified for SOC 2/ISO 27001 and is trusted by thousands of enterprises managing millions of endpoints globally.

  • Akamai Technologies
    Booth: 275

    Akamai powers and protects life online. Leading companies choose Akamai to build, deliver, and secure digital experiences. With the most distributed compute platform—cloud to edge—customers can build modern apps while keeping experiences closer to users and threats farther away. Learn about Akamai’s security, compute, and delivery solutions at akamai.com.

  • Anzenna
    Booth: 165

    Anzenna provides advanced security solutions that streamline the investigation of identity threats by integrating multiple security tools and reducing the need for extensive manual operations.

  • AppOmni
    Booth: 200

    AppOmni SaaS security helps security and IT teams protect and monitor their entire SaaS environment, from each vendor to every end-user.

  • Arctic Wolf Networks
    Booth: 610

    Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit  https://www.arcticwolf.com.

  • Axonius
    Booth: 315

    Axonius gives customers the confidence to control complexity by mitigating threats, navigating risk, automating response actions, and informing business-level strategy with solutions for both cyber asset attack surface management (CAASM) and SaaS management.

  • Backslash Security
    Booth: 324

    Backslash Security offers a fresh approach to application security, addressing the new risks of Vibe Coding, the AI revolution in software development. Backslash provides instant visibiliy, governance and protection for AI-coding environments, reduces the risk of unsactioned models and MCP servers, and preempts the creation of insecure code. Forward-looking organizations use Backslash to modernize their security for the AI era, drive AI efficiencies and agility, and accelerate time-to-market of their applications.

  • Barracuda
    Booth: 427

    At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-first, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 200,000 organizations worldwide trust Barracuda to protect them—in ways they may not even know they are at risk—so they can focus on taking their business to the next level. For more information, visit barracuda.com.

  • BforeAI
    Booth: 635

    BforeAI is a cybersecurity company specializing in proactive threat prevention. Our PreCrime™ technology autonomously predicts, blocks, and preempts malicious campaigns before they impact your business. Our core services are Behavioral Analysis & Predictive Results: Our cutting-edge AI goes beyond reactive blocklists, predicting dangerous domains before they launch attacks. Our predictive security solution, Brand Protection identifies and takes down online impersonation threats, securing your brand from financial and reputational harm.

  • Black Duck
    Booth: 529

    Black Duck® offers the most comprehensive, powerful, and trusted portfolio of application security solutions in the industry. We have an unmatched track record of helping organizations around the world secure their software quickly, integrate security efficiently in their development environments, and safely innovate with new technologies. As the recognized leaders, experts, and innovators in software security, Black Duck has everything you need to build trust in your software. Learn more at www.blackduck.com.

  • BlinkOps
    Booth: 328

    Automate all things security in the Blink of AI.

    BlinkOps is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless.

    Whether you prefer code, low-code, or no-code, BlinkOps has you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt.

    Use BlinkOps as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.

  • Blue Mantis
    Booth: 330

    Blue Mantis is a security-first IT solutions and services provider with a 30+ year history of successfully helping clients achieve business modernization by applying next-generation technologies including managed services, cybersecurity and cloud. Headquartered in Portsmouth, New Hampshire, the company provides digital technology services and strategic guidance to ensure clients quickly adapt and grow through automation and innovation. Blue Mantis partners with more than 1,500 leading mid-market and enterprise organizations in a multitude of vertical industries and is backed by leading private equity firm, Recognize. For more information about Blue Mantis and its services, please visit www.bluemantis.com.

  • Brinqa
    Booth: 250

    Make security chaos work for you with AI-powered Exposure Management, built on data. The Brinqa platform delivers scalable, AI-driven exposure management that unifies every data source for a complete picture of risk. Separate false alarms from real risk by uniting Security and IT, accelerating remediation, and delivering a single, trusted source of truth for the business.

  • Canary Trap
    Booth: 120

    Canary Trap is a recognized industry leader in offensive security, security advisory and assessment services. Founded by ethical hackers and certified security experts who share in the common goal of protecting organizations from becoming a victim of the next cyber-attack.

    Canary Trap combines human expertise with sophisticated tools and, where appropriate, threat intelligence to ensure a thorough, in-depth approach to all security testing and assessments.

  • Chainguard
    Booth: 332

    Chainguard Images provide the building blocks for a secure software supply chain. Leverage container images that have cryptographic signatures, SBOMs, SLSA provenance, and more to help meet compliance and prevent supply chain attacks.

  • Clarity Security
    Booth: 145

    Clarity Security makes identity governance autonomous, intelligent, and effortless. Powered by attribute-based access control, we automate user access reviews and every aspect of identity lifecycle management—saving time, cutting cost, reducing risk, and turning IT into a business enabler.

  • Cloud Security Alliance Boston Chapter
    Booth: TBD

    The Cloud Security Alliance (CSA) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events, and products. CSA’s activities, knowledge, and extensive network benefit the entire community impacted by cloud — from providers and customers, to governments, entrepreneurs, and the assurance industry — and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. CSA Boston holds meetings on a variety of topics directly related to cloud security.

  • Cogent Security
    Booth: 420

    Cogent is an applied AI lab building AI systems for enterprise cybersecurity teams. We focus on cybersecurity because it affects everyone—the reliability of the services we use, the privacy of our data, and the safety of the organizations we depend on. Our mission is to prevent breaches using autonomous AI systems that continuously secure systems against AI-armed adversaries operating at machine speed. Founded by researchers and operators from Google DeepMind, Abnormal Security, and Coinbase. Backed by Greylock Partners.

  • ColorTokens
    Booth: 565

    ColorTokens, the premier enterprise microsegmentation provider, specializes in making organizations “breach ready” by halting the lateral spread of ransomware and malware within intricate network infrastructures using its innovative ColorTokens Xshield™ platform. The platform visualizes traffic patterns between workloads, devices, and users, enabling organizations to enforce granular micro-perimeters, swiftly isolate critical assets, and respond to breaches effectively. Recognized as a Leader in the Forrester Wave™: Microsegmentation Solutions, Q3 2024 evaluation, ColorTokens safeguards businesses by thwarting ransomware and malware attacks, ensuring significant savings in potential disruptions. For more information, visit www.colortokens.com.

  • Comcast Business
    Booth: 229

    Comcast Business offers a broad suite of technology solutions to keep businesses of all sizes ready for what’s next. With a range of offerings including connectivity, secure networking, advanced cybersecurity, and unified communications solutions, Comcast Business is partnering with business and technology leaders across industries to help drive businesses forward.

  • Compyl
    Booth: 550

    Eliminate the need for multiple security tools, gain enterprise-level insights, and grow with a scalable GRC ecosystem. Compyl monitors and assigns workflows in a single location to ensure regulatory requirements and IT frameworks are continuously met by establishing a proper information security foundation across the entire organization.

  • Concentric AI
    Booth: 345

    Concentric AI delivers data risk assessment, monitoring, and protection for corporate data.

  • Control D
    Booth: 630

    ControlD is a fully customizable DNS service that allows you to not only block annoyances like malware, tracking, ads or IoT telemetry, but also unblock over 200 services through a network of servers in over 100 cities. All without any apps to install.

  • Cyble
    Booth: 140

    Cyble provides capabilities for customers to manage cyber risks with AI powered actionable threat intelligence. We are specialists in gathering intelligence across the Deepweb, Darkweb, and the Surface Web.

  • Cyera
    Booth: 305

    Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.

  • Darktrace
    Booth: 323

    Darktrace is a global leader in AI for cybersecurity that keeps organizations ahead of the changing threat landscape every day. Founded in 2013, Darktrace provides the essential cybersecurity platform protecting organizations from unknown threats using its proprietary AI that learns from the unique patterns of life for each customer in real-time. The Darktrace ActiveAI Security Platform™ delivers a proactive approach to cyber resilience with pre-emptive visibility into security posture, real-time threat detection, and autonomous response – securing the business across cloud, email, identities, operational technology, endpoints, and network. Breakthrough innovations from our R&D teams in Cambridge, UK, and The Hague, Netherlands have resulted in over 200 patent applications filed. Darktrace’s platform and services are supported by over 2,400 employees around the world who protect nearly 10,000 customers across all major industries globally. To learn more, visit http://www.darktrace.com.

  • DeleteMe
    Booth: TBD

    DeleteMe reduces business risk from threats such as social engineering, doxxing, and online harassment by continuously removing executive and employee personal data from online sources. With 35+ million individual pieces of personal data removed since 2010, DeleteMe is the trusted privacy partner to some of the world’s most recognizable brands. Personal data is dangerous. Delete it.

  • Delinea
    Booth: 520

    Delinea is a leading provider of privileged access management (PAM) solutions that make security seamless for the modern, hybrid enterprise. Our solutions empower organizations to secure critical data, devices, code, and cloud infrastructure to help reduce risk, ensure compliance, and simplify security. Delinea removes complexity and defines the boundaries of access for thousands of customers worldwide. Our customers range from small businesses to the world’s largest financial institutions, intelligence agencies, and critical infrastructure companies.

  • Drata
    Booth: 215

    Replace manual GRC efforts, reduce costs, and save time preparing for audits and maintaining compliance. Drata is the world’s most advanced security and compliance automation platform with the mission to help companies earn and keep the trust of their users, customers, partners, and prospects. We help thousands of companies streamline compliance for SOC 2, ISO 27001, HIPAA, GDPR, your own custom frameworks, and many more through continuous, automated control monitoring and evidence collection. Drata is backed by ICONIQ Growth, Alkeon, Salesforce Ventures, GGV Capital, Okta Ventures, SVCI (Silicon Valley CISO Investments), Cowboy Ventures, Leaders Fund, Basis Set Ventures, SV Angel, and many key industry leaders. Drata is based in San Diego, CA with team members across the globe.

  • EchoMark
    Booth: 320

    Enterprise Software as a Service (SaaS) startup providing innovative information security and privacy products to enable the seamless flow of private information.

  • EchoStor Technologies
    Booth: 105

    EchoStor Technologies is a leading information technology solutions provider focusing on enterprise storage, virtualization and data protection.

    We offer products from industry leading manufactures integrated with EchoStor professional services.

    Headquartered in New England, our highly skilled sales and technical teams have extensive experience and certifications with the latest storage and virtualization solutions. Our capabilities and broad services portfolio compels our manufacturer partners to utilize EchoStor’s bench of engineering resources for their customer engagements.

  • Exabeam
    Booth: 155

    Exabeam is a leader in intelligence and automation that powers security operations for the world’s smartest companies. As a global cybersecurity innovator, Exabeam provides industry-proven, security-focused, and flexible solutions for faster, more accurate threat detection, investigation, and response (TDIR). Cutting-edge technology enhances security operations center performance, optimizing workflows and accelerating time to resolution. With consistent leadership in AI innovation and a proven track record in security information and event management (SIEM) and user behavior analytics, Exabeam empowers global security teams to combat cyberthreats, mitigate risk, and streamline operations. Learn more at www.exabeam.com.

  • Expel
    Booth: 400

    Expel provides transparent managed security, on-prem and in the cloud. It’s the antidote for companies trapped in failed relationships with their managed security service provider (MSSP) and those looking to avoid the frustration of working with one in the first place. To learn more, go to https://www.expel.io.

  • ExtraHop Networks, Inc.
    Booth: 265

    ExtraHop is a force multiplier for IT teams struggling with increasing complexity. With the ExtraHop platform, organizations can regain control over the security and performance of their applications and infrastructure, and capitalize on their data analytics opportunity to improve business operations and results. Learn more at www.extrahop.com

  • F5
    Booth: 400

    F5 provides solutions for an application world. F5 helps organizations seamlessly scale cloud, data center, telecommunications, and software defined networking (SDN) deployments to successfully deliver applications and services to anyone, anywhere, at any time. F5 solutions broaden the reach of IT through an open, extensible framework and a rich partner ecosystem of leading technology and orchestration vendors. This approach lets customers pursue the infrastructure model that best fits their needs over time. The world’s largest businesses, service providers, government entities, and consumer brands rely on F5 to stay ahead of cloud, security, and mobility trends

  • Flare
    Booth: 310

    Flare Systems enables financial institutions to prevent financial crime. Using AI and over 10 years of criminology research, it extracts actionable intelligence from millions of data points from the dark, deep and clear web in real time.

  • GhostEye
    Booth: 600

    The human-centric security validation platform. GhostEye uses autonomous AI agents to continuously test how attackers exploit human vulnerabilities to compromise organizations. Just as red teams simulate technical attacks against infrastructure, we simulate sophisticated social engineering campaigns against people. Our multi-agent platform validates complete attack paths from initial social engineering to data exfiltration, providing security teams with actionable intelligence about their true human attack surface exposure before attackers find it.

  • Google Cloud Security
    Booth: 130

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • HPE
    Booth: 329

    Hewlett Packard Enterprise (HPE) is a global technology company that focuses on developing intelligent solutions for capturing, analyzing, and acting upon data. They operate in areas like networking, hybrid cloud, and AI, helping customers create new business models and improve operational performance.

  • Imper.ai
    Booth: 510

    imper.ai prevents AI-driven impersonation and social engineering by analyzing the device, network, and behavioral signals attackers can’t fake. Its real-time risk scoring and automated blocking verify every participant across voice, video, and chat before trust is established.

  • Infoblox
    Booth: 615

    Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.

  • InfraGard Boston
    Booth: 237

    InfraGard is a United States government (FBI) and private sector alliance. InfraGard Boston was developed by the Boston FBI office in 1998 to promote protection of critical information systems. InfraGard provides formal and informal channels for the exchange of information about infrastructure threats and vulnerabilities. The purpose of the synergistic exchange is to allow members to better protect themselves and their corporate interests while enhancing the ability of the United States government to provide national security.

  • ISACA New England Chapter
    Booth: 180

    The New England Chapter of ISACA® was founded in 1976. From the modest beginnings of its first meeting—which was held at Valle’s Steak House on Route 9 in Newton, Massachusetts—the chapter has grown to over 2000 members across four states (MA, NH, ME, VT).

    The primary objective of the New England Chapter  is to provide quality Information Systems audit and security-related education to support its members and their professional certifications.

  • ISC2 Eastern Massachusetts
    Booth: 680

    Advancing Information Security One Community at a Time
    As anyone seriously involved in the information security profession can attest, peer networking is an invaluable resource. ISC2 Eastern Massachusetts Chapter provide members with the opportunity to build a local network of peers to share knowledge, exchange resources, collaborate on projects, and create new ways to earn CPE credits!

  • Island
    Booth: 100

    What if the enterprise had complete control over the browser? What would it mean for security, for productivity, for work itself? Introducing Island, the Enterprise Browser—the ideal enterprise workplace, where work flows freely while remaining fundamentally secure. With the core needs of the enterprise naturally embedded in the browser itself, Island gives organizations complete control, visibility, and governance over the last mile, while delivering the same smooth Chromium-based browser experience users expect. Led by experienced leaders in enterprise security and browser technology and backed by leading venture funds—Insight Partners, Sequoia Capital, Cyberstarts and Stripes Capital—Island is redefining the future of work for some of the largest, most respected enterprises in the world.

  • ISSA New England
    Booth: 685

    The Information Systems Security Association (ISSA) is an international organization providing educational forums, publications, and peer interaction opportunities that enhance the knowledge, skills, and professional growth of its members’ information security professionals. The primary goal of ISSA is to promote management practices that will ensure availability, integrity, and confidentiality of organizational resources.

    Since its inception in 1982, ISSA’s membership has grown to include more than 100 chapters around the world with members who represent a diverse collection of organizations, including major U.S. and international corporations, leading consulting firms, world-class educational institutions, and government agencies. From EDP audit and corporate security to contingency planning and disaster recovery, ISSA members are committed to protecting their organizations’ assets and resources.

    Visit the National Headquarter’s website at www.issa.org.

  • K Logix
    Booth: 650

    K logix is the leading information security company. We provide security consulting, technology solutions, and integration services to enterprise companies. Our experienced team and our established process help enterprise customers make confident security decisions that impact their business goals.

  • Keysight
    Booth: 575

    Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline, by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes; protecting users and applications with increased the efficiency, performance, and reliability of your security systems;  patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic; and practice your cyber skills enhancing your security and attack response skills against real-world threats.

  • Lightbeam
    Booth: 220

    LightBeam.ai, the zero trust data protection pioneer, converges and simplifies data security, privacy, and AI governance, so businesses can accelerate their growth in new markets with speed and confidence. Leveraging generative AI as a foundational technology, LightBeam ties together sensitive data cataloging, control, and compliance across structured, unstructured, and semi-structured data applications providing 360-visibility, risk remediation, and compliance with PCI, GLBA, GDPR, HIPAA among other regulations. Continuous monitoring with full data residency ensures ultimate zero-trust data protection. LightBeam is on a mission to create a secure privacy-first world.

  • MassCyberCenter
    Booth: 665

    The MassCyberCenter, launched in September 2017, strives to create a diverse, vibrant, and competitive Massachusetts cybersecurity ecosystem that enhances resiliency for public and private entities, provides workforce development opportunities, and elevates public cybersecurity awareness.

    In 2022, the Massachusetts Legislature codified the establishment of the Center and confirmed its mission of convening the Massachusetts cybersecurity ecosystem to improve cybersecurity resiliency, workforce development, and public awareness within the Commonwealth by developing cutting edge programs, organizing engaging events, and leading collaborative working groups.

    Cybersecurity encompasses the people, process, and technology that provide confidentiality, integrity, and availability of data and critical control systems that keep our Commonwealth running. The Center focuses its activities on balancing the core principles of cybersecurity: People, Process, and Technology.

  • Material Security
    Booth: 655

    Material Security uses ubiquitous tools in unexpected ways to understand and mitigate risk in cloud office apps. Material is known and loved in the security community for protecting cloud email at global media and financial conglomerates, large tech companies, and highly-targeted public sector organizations. The platform connects in minutes to Microsoft and Google environments to analyze risk, detect threats, automatically investigate incidents, and crowdsource mitigation with end-users via novel integrations with identity providers like Okta, Duo, Ping, and Microsoft Azure AD.

    The company was started in response to the 2016 Election hacks, is backed by Andreessen Horowitz, and was recently valued at $1.1B. Material is single-tenant, can be deployed in the customer’s cloud, and Material personnel do not need access to customer data. Material also protects the personal accounts of high-risk VIPs.

  • Military Cyber Professionals Association (MCPA) New England Chapter
    Booth: TBD

    The New England Chapter leads MCPA efforts across the states of that region. We have periodic events planned that provide truly world-class networking and learning for anyone in the broader military cyber community of interest since we have a number of military cyber units and other important organizations in our footprint. We invite you to join us while you’re in town! Find details on the member-only intranet. The Chapter President is Colonel Richard Berthao.

  • National Cybersecurity Alliance
    Booth: 170

    Our alliance stands for the safe and secure use of all technology. We encourage everyone to do their part to prevent digital wrongdoing of any kind. We build strong partnerships, educate and inspire all to take action to protect ourselves, our families, organizations and nations. Only together can we realize a more secure, interconnected world.

  • New England IT Security Consortium
    Booth: 185

    Objective: The group will foster collaboration and knowledge sharing among IT security professionals by discussing challenges, trends, and opportunities around IT Security.

    What to Expect:

    • Engaging Discussions: This peer-to-peer forum will foster knowledge sharing among IT security professionals. We’ll discuss current challenges, emerging trends, and opportunities to optimize your security posture.
    • Focus on Efficiency: The central topic will be “Making IT Security Spend More Efficient.” With many organizations facing budget constraints, we’ll explore strategies to maintain tight security while potentially reducing costs.
    • Thought Leadership Participation: Active participation is encouraged! This is a space for thought leaders to share insights and develop collaborative
  • Nexum
    Booth: 645

    Nexum, Inc. is a cybersecurity and networking company that builds and secures global networks for organizations across multiple verticals around the world. In addition to its Chicago headquarters, Nexum has sales, training and support presence in Kentucky, Michigan, New Hampshire, Ohio, and Wisconsin, as well as the Security and Network Operations Command Centers (SNOCC) in New Mexico and Illinois.

  • Novacoast
    Booth: 210

    A uniquely positioned IT services and solutions company, Novacoast is less defined by our broad range of expertise and services than by a perspective rooted in our cooperative environment of adaptable problem solving.

    Beyond security specialists, software developers or network engineers, we are guides, allies, and problem solvers.

    From implementation services, license fulfillment and technical training to software development, staffing services and custom or emerging solutions, Novacoast is an experienced and comprehensive IT business resource empowered on every level by our flexible and fearless perspective.

  • One Identity
    Booth: 225

    One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.

  • OpenText Inc.
    Booth: 555

    OpenText Cybersecurity provides comprehensive security solutions for companies and partners of all sizes. From prevention to detection and response, to recovery, investigation and compliance, our unified end-to-end platform helps customers build cyber resilience via a holistic security portfolio. Powered by actionable insights from our real-time contextual threat intelligence, OpenText Cybersecurity customers benefit from high efficacy products, a compliant experience, and simplified security to help manage business risk.

  • P0 Security
    Booth: 110

    P0 Security is helping companies modernize PAM for multi-cloud and hybrid environments with the most agile way to ensure least-privileged, short-lived and auditable production access for users, NHIs and agents. Centralized governance, just-enough-privilege and just-in-time controls deliver secure access to production, as simply and scalably as possible. Every identity. Every system. All the time.

    P0’s Access Graph and Identity DNA data layer make up the foundational architecture that powers privilege insights and access control across all identities, production resources and environments. With P0, production access is least-privilege, short-lived and auditable by default, including the new class of AI-driven agentic workloads emerging in modern environments.

    To explore P0 Security further or book a demo, visit p0.dev.

  • Per Scholas
    Booth: 535

    Per Scholas is a national nonprofit organization of 24 chapters dedicated to unlocking potential and increasing access to high-growth tech careers. Per Scholas has provided rigorous no-cost training, industry-recognized credentials, professional development, and employer connections to adults for 30 years and trained more than 30,000 technologists in the most sought-after tech skills. The Greater Boston campus, located in Kendall Square, trains 250 adults (18+) per year in 13-15 week, full time bootcamp style courses, both in person and remotely, in the areas of IT Support (CompTIA A+), Cybersecurity (CompTIA CySA+), Salesforce Administrator, and AWS Cloud Practitioner. Graduates go on to secure roles at employer partners throughout the region as Desktop Support Technicians, Network Engineers, Cyber Analysts, and more. This 1-minute video provides a thorough overview of the program, including testimonials from three Greater Boston employer partners: TEKsystems, PEGA, and EverQuote: https://www.youtube.com/watch?v=3VyoS6ZZ_Qw.

  • Picus Security
    Booth: 260

    Picus Security is the pioneer of Breach and Attack Simulation (BAS). The Picus Complete Security Control Validation Platform is trusted by leading organizations worldwide to continuously validate the effectiveness of security controls against cyber-attacks and supply actionable mitigation insights to optimize them.

    Picus has offices in North America, Europe and APAC and is supported by a global network of channel and alliance partners. The company is dedicated to helping security professionals become more threat-centric and via its Purple Academy offers free online training to share the latest offensive and defensive cybersecurity strategies.

  • Ping Identity
    Booth: 515

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

  • Presidio
    Booth: 300

    Presidio is the premier provider of digital transformation; solutions built on agile secure infrastructure deployed; in a multi-cloud world with business analytics.

  • Proofpoint
    Booth: 241

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

  • Everpure, Inc. (formerly Pure Storage)
    Booth: 605

    We are Everpure. We don’t just store data—we bring it to life.

    As AI becomes core to business, infrastructure must evolve, yet too many organizations are still relying on rigid, siloed systems built for the past. The Everpure Platform replaces static storage with a unified, living platform that evolves with you—agile, resilient, and built to scale—so you can eliminate friction and unleash the power of your data.

  • Push Security
    Booth: 640

    Founded in 2020, Push Security is a cybersecurity company offering identity threat detection and response (ITDR) via a browser-based platform. The platform provides real-time visibility and security controls, targeting attacks such as phishing and credential stuffing. Push Security serves customers in technology, finance, and healthcare, with deployment on over 1.5 million endpoints, and has raised $45 million in funding. Based in London, the company’s approach includes automated guidance and behavioral nudges.

  • Qualys, Inc.
    Booth: 505

    Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud-based security and compliance solutions with over 9,300 customers in more than 120 countries, including a majority of each of the Forbes Global 100 and Fortune 100. Qualys helps organizations streamline and consolidate their security and compliance solutions in a single platform and build security into digital transformation initiatives for greater agility, better business outcomes and substantial cost savings. The Qualys Cloud Platform and its integrated Cloud Apps deliver businesses critical security intelligence continuously, enabling them to automate the full spectrum of auditing, compliance and protection for IT systems and web applications on premises, on endpoints and elastic clouds. Founded in 1999 as one of the first SaaS security companies, Qualys has established strategic partnerships with leading managed service providers and consulting organizations including Accenture, BT, Cognizant Technology Solutions, Deutsche Telekom, Fujitsu, HCL Technologies, HP Enterprise, IBM, Infosys, NTT, Optiv, SecureWorks, Tata Communications, Verizon and Wipro. The company is also a founding member of the Cloud Security Alliance. For more information, please visit www.qualys.com.

  • Rapid7
    Booth: 227

    Rapid7 transforms data into insight, empowering IT and security professionals to progress and protect their organizations. How? Our solutions are powered by advanced analytics and an unmatched understanding of the attacker mindset. This makes it easy to collect data, transform it into prioritized and actionable insight, and get it to the people who can act on it—all in an instant.

  • Reach Security
    Booth: 125

    Reach is defining AI-Native Exposure Management by bridging the gap between knowing where you’re exposed and taking action to fix it. We help organizations reduce risk by making better use of the tools they already have delivering clarity, prioritization, and automation to turn understanding into results.

  • RetroFit Technologies, Inc.
    Booth: 422

    RetroFit Technologies, Inc. – Your Trusted Technology Partner in New England!

    As a proud Women Business Enterprise (WBE), we specialize in delivering top-tier Technology Solutions tailored for state and local government, healthcare, non-profits, schools, and small to medium-sized businesses.

  • RevBits
    Booth: 150

    Established in 2018, RevBits is dedicated to providing customers with superior protection against the most sophisticated cyber threats companies face. Its integrated platform, CIP, includes five main modules, all accessible via single sign-on through CIP’s dashboard: RevBits Endpoint Security & EDR, RevBits Email Security, RevBits Privileged Access Management, RevBits Zero Trust Network, and RevBits Deception Technology.

  • Rubrik
    Booth: 335

    Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.

  • Seceon Inc.
    Booth: 253

    Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools.

    What Sets Seceon Apart:

    • Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution.
    • AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation.
    • Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard.
    • Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360.


    Why Organizations Choose Seceon:

    • Cut cybersecurity costs by 60% by replacing siloed tools
    • Stop threats faster with AI-powered detection and automated response.
    • Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence.

    Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.

  • SecureFlag
    Booth: 430

    SecureFlag is a Secure Coding Training platform for Developers and DevOps engineers to learn secure coding through hands-on exercises.

    Forget boring slideshows and ineffective quizzes that “teach” developers to just take tests–and are forgotten faster than they can say “security breach.”

    Enterprises can effectively augment their Secure Coding Training program with SecureFlag’s on-demand, 100% practical training. Through our platform, developers learn how to identify and remediate real security issues using familiar tools and technologies, in an authentic development environment accessed through the web browser.

    SecureFlag delivers on-demand “Adaptive AppSec Learning” through individualized learning paths, real-time feedback, and content tailored to the needs of each learner. Our metrics dashboard highlights areas of improvement at individual, team, and organizational levels to clarify competency, risks, and remedial actions.

  • SecurityScorecard
    Booth: 400

    SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their third-parties through continuous, non-intrusive monitoring. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Application Security, Malware, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Information.

  • Sentra
    Booth: 418

    Sentra’s multi-cloud data security platform, discovers, classifies, and prioritizes the most business-critical data security risks for organizations, enabling more effective, faster remediation and compliance adherence.

    Specializing in Data Security Posture Management (DSPM), Sentra ensures that the correct security posture moves with sensitive cloud data.
    By automatically detecting vulnerabilities, misconfigurations, over-permissions, unauthorized access, data duplication, and more – Sentra empowers data handlers to work freely and safely with public cloud data, while leveraging rich insights to drive business growth and innovation.

  • Simbian
    Booth: 255

    Simbian’s AI Agents work together across SOC, threat hunt, and pentest to provide unified, modern SecOps that gets smarter every time you use it. Simbian captures your unique security context, building on the knowledge of your team, then uses that context to generate precision response and build a living playbook.

  • SnowCap Technologies
    Booth: 243

    SnowCap Technologies enables information technology by offering a consultative approach to IT architecture. They start with business goals and work backward to design a hardware and software solution and work with enterprises to ensure that they take advantage of the right tier of storage performance at the right time for their needs.

  • Sophos
    Booth: 500

    Sophos delivers superior cybersecurity outcomes by providing cybersecurity as a service to protect companies of all sizes from the most advanced cyberthreats. Our cybersecurity products and services include managed detection and response (MDR), firewall, email, endpoint (XDR), and cloud native security protection. Sophos products and services defend against ransomware, phishing, malware, and more. They connect through the cloud-based Sophos Central management console and are powered by Sophos X-Ops, our cross-domain threat intelligence unit. We provide fully managed security solutions so you can manage your cybersecurity directly with our security operations platform. Or, you can supplement your in-house team with Sophos’ products and services.

  • Splunk, a Cisco Company
    Booth: 570

    Splunk helps build a safer and more resilient digital world. Organizations trust Splunk to prevent security, infrastructure and application incidents from becoming major issues, absorb shocks from digital disruptions and accelerate digital transformation.

  • Sprocket Security
    Booth: 205

    Sprocket Security was founded to improve the way we approach cybersecurity. Currently the industry performs services in a timeboxed, or point-in-time approach. We think this is fundamentally flawed. We protect your business by monitoring the cybersecurity landscape and performing continuous penetration testing services.

  • Sublime Security
    Booth: 625

    Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.

  • Sumo Logic
    Booth: 432

    Sumo Logic was founded in 2010 by experts in log management, scalable systems, big data, and security. Today, our purpose-built, cloud-native service analyzes more than 100 petabytes of data, more than 16 million searches, and delivers 10s of millions of insights daily – positioning Sumo among the most powerful machine data analytics services in the world.

  • Tenable
    Booth: 400

    Tenable®, Inc. is the Cyber Exposure company. Over 27,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 25 percent of the Global 2000 and large government agencies. Learn more at www.tenable.com.

  • ThreatAware
    Booth: 428

    ThreatAware gives you real-time visibility across your entire estate, exposing the 30% of devices that are typically invisible and unprotected. Our award-winning platform continuously validates security controls across every cyber asset, ensuring nothing slips through the cracks.

    While most tools operate in silos, leaving 15% of devices with protection gaps. ThreatAware unifies your entire security stack via API feeds. With automated remediation, intuitive visualization, and tailored risk profiling, we deliver complete visibility and continuous protection across all assets.

  • ThreatLocker
    Booth: 620

    ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com

  • Torq
    Booth: 417

    Torq is your security product’s favorite security product. Torq Hyperautomation unifies and automates the entire security infrastructure to deliver unparalleled protection and productivity.

  • Utimaco
    Booth: 135

    Utimaco develops on-premises and cloud-based hardware security modules, solutions for key management and data protection as well as data intelligence solutions for regulated critical infrastructures and Public Warning Systems. Utimaco is one of the world’s leading manufacturers in its key market segments.

    500+ employees around the globe create innovative solutions and services to protect data, identities and communication networks with responsibility for global customers and citizens. Customers and partners in many different industries value the reliability and long-term investment security of Utimaco’s high-security products and solutions.

  • Vanta
    Booth: 525

    Vanta is the leading trust management platform that helps simplify and centralize security for organizations of all sizes. Thousands of companies rely on Vanta to build, maintain and demonstrate trust in a way that’s real-time and transparent. Founded in 2018, Vanta has customers in 58 countries with offices in Dublin, New York, San Francisco and Sydney.

  • WEI
    Booth: 160

    Why WEI?  We go further.

    At WEI, we’re passionate about solving your technology problems and helping you drive your desired business outcomes. We believe in challenging the status quo and thinking differently.  There are a lot of companies that can take today’s technology and create a great IT solution for you. But we do more. We go further. And we have the customer, vendor and industry awards to prove it.  WEI is a premier technology partner, who always puts our customers first while providing the most innovative solutions for over 29 years.

  • WiCyS Massachusetts Affiliate
    Booth: TBD

    The Massachusetts WiCyS Affiliate offers mentoring, learning, networking and career development to professionals at all stages of their cybersecurity careers, Whether you are a student just considering a career in cybersecurity or an experienced leader in the cybersecurity workforce, WiCyS provides tangible benefits and a supportive community of all genders. Our affiliate provides an online community for mentorship, networking, and collaboration as well as local meetups, community awareness programs, and support for other organizations with a common mission to bridge the Cybersecurity workforce gap while addressing diversity and inclusion of women and minorities.

  • Yubico, Inc.
    Booth: 321

    Yubico (Nasdaq Stockholm: YUBICO), the inventor of the YubiKey, offers the gold standard for phishing-resistant multi-factor authentication (MFA), stopping account takeovers in their tracks and making secure login easy and available for everyone. Since the company was founded in 2007, it has been a leader in setting global standards for secure access to computers, mobile devices, servers, browsers, and internet accounts. Yubico is a creator and core contributor to the FIDO2, WebAuthn, and FIDO Universal 2nd Factor (U2F) open authentication standards, and is a pioneer in delivering hardware-based passwordless authentication using the highest assurance passkeys to customers in 160+ countries.

    Yubico’s solutions enable passwordless logins using the most secure form of passkey technology. YubiKeys work out-of-the-box across hundreds of consumer and enterprise applications and services, delivering strong security with a fast and easy experience.

  • Zafran Security
    Booth: 115

    The Zafran Threat Exposure Management Platform is the first and only consolidated platform that integrates with your security tools to reveal, remediate, and mitigate the risk of exposures across your entire infrastructure. Zafran uses an agentless approach to reveal what is truly exploitable, while reducing manual prioritization and remediation through automated response workflows.

  • Zscaler
    Booth: 340

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Scott Margolis, Moderator
    CISO, Massachusetts Bay Transportation Authority (MBTA)

    Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business continuity, and operational efficiency. Reputation for leading new initiatives focused on transforming operations, establishing partner/industry relationships, increasing revenue, and reducing cost and risk exposure. Proactive leader with intense focus on customers and beneficial outcomes.

  • speaker photo
    Len Evenchik, Guest Speaker
    Professor, Carroll School of Management, Boston College

    Professor Len Evenchik has more than 25 years of senior management and engineering experience in industry, government, and academia. He teaches courses on the strategic use of Information Technology (IT) and Data Analytics, and a course on Cybersecurity Strategy and Management. He has also served as the faculty supervisor for experiential learning courses for MBA students.

    Before coming to Boston College, he was the Assistant Dean and founding director of the online education program at Harvard's Division of Continuing Education. Mr. Evenchik managed all aspects of the program from its inception in 1997, when one online course with four students was offered, to an enrollment of over 10,000. He has also taught graduate level computer science courses on Internet protocols and information security at the Harvard Extension School for over 25 years, including the first course at Harvard to use video streaming and multimedia to deliver classroom lectures to online students around the world.

    Mr. Evenchik began his professional career at BBN in Cambridge, where he developed some of the first networking protocols used in the Internet, and then managed the implementation of large commercial networks. He was Director of Communications for the State of Massachusetts where he managed the organization responsible for the strategic planning, implementation, and operation of statewide networks supporting over 15,000 users. His industry experience also includes senior management positions in sales, program management and engineering at both large firms and at a number of venture capital backed startups, one of which had a successful IPO.

    Prof. Evenchik earned three degrees from MIT in the fields of both Engineering and Management. He received a B.S. and an M.S. in Electrical Engineering and Computer Science, and he was awarded a patent based on some of his work while a graduate student. He also earned a B.S from the Sloan School of Management where he worked with Prof. Fischer Black on the first online implementation of the Black-Scholes options model.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Gaël Frouin
    Director, IT Security, CISO, AAA Northeast

    Experienced Information Security Officer with a demonstrated history of working in various industries (higher education, healthcare, large industries, etc.). Skilled in risk management, privacy regulations, identity and access management, and security operations. Strong interpersonal skills and will to find the most adequate compromise between the business and security needs.

  • speaker photo
    Christopher Rich
    BISO, MassMutual

    Christopher Rich is a seasoned cybersecurity executive with deep expertise in cyber risk management, identity and access management (IAM), and security strategy. As the Business Information Security Officer (BISO) at MassMutual, he advises multiple business lines, driving security transformation and aligning cybersecurity initiatives with business objectives in a Fortune 100 environment.

    With a proven track record in reducing enterprise risk, enhancing identity security, and championing agile methodologies, Christopher has led strategic initiatives that significantly improved security posture, including reducing software vulnerabilities by over 50% and spearheading customer IAM advancements for over 1.3 million users.

    Beyond his corporate leadership, Christopher serves as the President of the ISC2 Eastern Massachusetts Chapter, fostering cybersecurity education and community engagement. He is a sought-after speaker at industry conferences, having presented at events such as the Gartner Identity & Access Management Summit and OKTANE, where he shares insights on IAM best practices, cybersecurity risk reduction, and the evolving security landscape.

    Christopher holds a CISSP certification and a BS in Business Administration from Villanova University. His passion for cybersecurity as a business enabler and differentiator drives his mission to bridge the gap between security and innovation.

  • speaker photo
    Praveen Sharma
    Head of Product Security, Product Security Officer, Cubic Transportation Systems

    Ms. Praveen Sharma is an executive with more than two decades of leadership in cybersecurity, privacy, data and AI, and emerging technologies across regulated and mission-critical national security environments.

    She has held senior leadership roles at Philips Healthcare, BD (Becton Dickinson), Xerox, Insulet, and Cubic Transportation Systems, where she built and scaled products as well as enterprise security, AI and data governance, and critical infrastructure protection programs.

    Ms. Sharma’s leadership is grounded in deep technical expertise. Earlier in her career at MIT Lincoln Laboratory, MITRE, and Raytheon BBN, she designed software systems, large-scale data platforms, and advanced AI algorithms before AI became a widely-recognized strategic imperative; one of her AI innovations later transitioned into the startup ecosystem.

    Beyond her corporate leadership, Ms. Sharma contributes to the broader technology community by volunteering within the MIT CIO symposium, and serving as a technology innovation advisor to nonprofit organizations.

  • speaker photo
    Kyle Bubp, Moderator
    CISO, Avid

    Kyle Bubp is currently serving as Chief Information Security Officer at Avid Technology and is also a member of IANS Faculty. He's a seasoned cybersecurity leader with over 20 years of IT and security experience.
    Kyle has worked for Fortune 200 enterprises, hosting providers, the FBI, the Department of Energy, and the Department of Defense to analyze and improve their security posture. His expertise spans security architecture, application security, vulnerability management, incident response, and developing comprehensive security programs.

    He's also a published author, featured in the "Tribe of Hackers" book series, mentors students as part of MassCyberCenter’s Mentorship Program, serves on multiple cybersecurity startup advisory boards, and continues to research security issues and present on improving the security industry.

  • speaker photo
    Josh Behnke
    Manager of Pre-Sales Engineering, Concentric AI

    Josh Behnke is the Manager of Pre-Sales Engineering at Concentric AI. With a career spanning over three decades, Josh offers a rare perspective gained from sitting on both sides of the table—serving as a veteran security practitioner and a strategic leader at industry giants like CrowdStrike, Proofpoint, and GuidePoint Security.

    Before moving into the vendor space, Josh spent more than 20 years working in various security roles, holding titles such as Director of IT and Information Security Officer, giving him a deep, first-hand understanding of the operational challenges CISOs face today. When he’s not securing the data landscape, you can find him in the great outdoors hunting or catching the latest superhero flick.

  • speaker photo
    Sam Curry
    VP & CISO in Residence, Zscaler

    Sam Curry, VP & CISO in Residence, Sam Curry is a 30-year veteran of the cybersecurity industry. He began his career in signals and cryptanalysis and was the first employee at Signal 9 Solutions, a small start-up that invented the personal firewall, executed the first commercial implementation of Blowfish, and devised early stealthy (symmetric key) VPN technology that was ultimately sold to McAfee.
    Sam would go on to serve as Chief Security Architect there and as head of Product for McAfee.com before holding several positions at RSA including head of RSA labs at MIT, head of product, and CTO, as well as Distinguished Engineer for EMC. After seven years with RSA, Curry acted as SVP and CISO at Microstrategy, CSO & CTO for Arbor Networks before it became Netscout, and as CSO for Cyberreason.

    Sam is a Forbes contributor, holds 17 active patents in cybersecurity and a master’s degree in counterterrorism, and sits on two boards of directors. In addition, he teaches courses at Harvard (online), Wentworth Technology Institute, and Nichols College. He is also a Fellow at the National Security Institute at George Mason University.

  • speaker photo
    Richard Genthner
    VP, CISO, Boost Insurance
  • speaker photo
    Bill Bowman
    Operating Partner | CISO, Welsh, Carson, Anderson & Stowe

    Bill Bowman built the information security programs as the initial cybersecurity leader at Bright Horizons, Houghton Mifflin Harcourt, Eze Software, ZoomInfo, and Emburse. With over two decades of experience creating cybersecurity programs that meet rigorous certifications such as PCI, ISO 27001, ISO 27701, SOC 1, and SOC 2, he has consistently satisfied both client demands and regulatory requirements.

    Bowman is passionate about data privacy, having established the Office of the Data Protection Officer at two organizations. His leadership has also contributed to the success of four companies that have exited private equity. Over the past 14 years, he has cultivated a strong network of security leaders, following his role as the founding President of the ISC2 Eastern Massachusetts chapter.

  • speaker photo
    Randall Jackson
    CISO / Head of Infrastructure, Income Research + Management

    Seasoned IT and Cybersecurity Executive with a track record of leading enterprise-wide technology, security, and support operations. Proven ability to align IT strategy with business goals, drive process improvements, and lead complex implementations. Deep expertise in cybersecurity, technology transformation, managed services, and team leadership. Known for strategic thinking, decisive execution, and a pragmatic approach to solving high-stakes problems.

  • speaker photo
    Mohammad Eshan
    CEO & Co-Founder, GhostEye

    Mohammad Eshan is a security researcher, offensive operator, and the CEO and Co-Founder of GhostEye (YC S25), building vulnerability management for human risk. GhostEye uses AI and OSINT to simulate realistic social engineering attacks across voice, email, and SMS, helping organizations find and fix the human vulnerabilities that scanners can't see. Before founding GhostEye, Eshan served on BlackRock's Red Team and conducted offensive operations at MITRE. He holds a Bachelor's and a Master's in Cybersecurity from RIT.

  • speaker photo
    Jack Butler
    Sr. Solutions Engineer, Sumo Logic

    Jack Butler is a Senior Solutions Engineer at Sumo Logic, specializing in logging, SIEM, and application security. He helps organizations modernize security operations, streamline data integration, and strengthen resilience against evolving threats. Jack also serves as an OWASP Boston chapter leader, helping advance security education, promote secure-by-design principles, and drive collaboration within the local community.

  • speaker photo
    Bart Lenaerts
    Sr. Product Marketing Manager, Threat Intel, Infoblox

    Bart Lenaerts is a Senior Threat Intelligence Product Marketing Manager with Infoblox. Bart is a 20+ year veteran in Network Systems & Security with a focus in Digital Risk Management and Automated Investigations.

  • speaker photo
    Chandra Pandey
    Founder & CEO, Seceon

    Chandra Pandey is the Founder and CEO of Seceon, bringing more than 30 years of experience in cybersecurity and networking. Fueled by a relentless drive to demystify high-stakes security, he has spearheaded the creation of a unified, AI/ML-powered platform that transforms SIEM, SOAR, XDR, UEBA, NDR, and beyond into intuitive, battle-ready defenses for more than 9,300 organizations worldwide. Chandra’s mission is simple, yet profound: cut the total cost of ownership and deliver genuine real time threat protection that organizations can count on.

  • speaker photo
    Shashwat Sehgal
    Founder & CEO, P0 Security

    Shashwat Sehgal is the Co-Founder and CEO of P0 Security. He’s spent most of his career building security and observability products for developers, DevOps, and security teams. Shashwat is passionate about solving the problem of cloud access security and helping security engineers control "who has access to what sensitive resources" in any environment. He enjoys playing tennis, spending time with his family, teaching his son how to play chess, and geeking out on all things security.

  • speaker photo
    Nick Bruno
    CISO & SVP of IT, SHL

    Nick Bruno is the Chief Information Security Officer (CISO) and SVP of IT at SHL, a global HR SaaS provider specializing in talent acquisition and talent management solutions. He oversees information and cyber security, IT services and business systems, cloud infrastructure, and DevOps, along with business continuity management.

    With more than 20 years of experience, Nick has led security and data protection programs for technology and healthcare cloud service providers. His previous leadership roles include positions at SAI360, Monster Worldwide, Philips (HealthSuite digital platform), and Continuum Managed Services.

    Nick is recognized for establishing security and data protection programs that enable business growth across diverse industries and cloud service environments. He holds an M.S. in Network Security from Capitol College, and a B.S. in Business Administration from Salem State College. His certifications include C|CISO, CISSP-ISSAP, and CISM, and he actively serves on multiple advisory boards.

  • speaker photo
    Lorna Koppel
    CISO, Tufts University

    Lorna Koppel is the Chief Information Security Officer (CISO) for Tufts University, where she provides executive leadership for information security, privacy, and compliance across a highly diverse academic, research, clinical, administrative, and student environment. In this role, she is responsible for enterprise security strategy, risk management, policy and governance, regulatory alignment, and the university’s overall security posture, including detection and response. Prior to Tufts, Lorna held the senior security leadership roles at Iron Mountain, Kohler Co., and BT-Infonet Services Corp., and earlier in her career worked at CSC and Meso Inc. She also served in the United States Air Force Weather Service. Lorna holds degrees from Bowling Green State University, Penn State, and the University at Albany.

  • speaker photo
    Astrid Lambert
    CISO, Cambridge Health Alliance

    Astrid Lambert is a seasoned leader with expertise in information security, healthcare analytics, database administration, and website development. Known for her forward-thinking leadership and innovative approach, she currently serves as CISO/Senior Director in the IT department at Cambridge Health Alliance, where she oversees strategic initiatives critical to the organization's success.

    Astrid's expertise has enabled Cambridge Health Alliance to make data-driven decisions, driving efficiency and improvements across multiple domains. A strong advocate for information security, she implements robust measures to protect sensitive healthcare data and ensure compliance with regulatory standards. She holds degrees in Industrial-Organizational Psychology and Industrial Engineering and is a Certified Information Systems Security Professional (CISSP).

    Beyond her professional accomplishments, Astrid is committed to making a positive impact on the broader healthcare community. She volunteers her time and expertise with various organizations, sharing her knowledge and helping others develop creative solutions to complex challenges.

  • speaker photo
    Esmond Kane, Moderator
    CISO, Advarra

    Esmond Kane brings more than two decades of expertise as a distinguished leader in information security, safeguarding vital sectors. With a rich leadership background at prestigious institutions like Harvard University, Mass General Brigham, and Steward Health Care, he also serves on the advisory boards of multiple companies, providing valuable insights on cyber matters. Kane excels as a trusted consultant to top executives and founders, ensuring secure IT operations, regulatory compliance, and resilient design. His stellar track record is a testament to his recognized authority in the field.

  • speaker photo
    Scott Taylor, Moderator
    Director of Cyber Resilience, Field Solution Architects, Everpure

    Scott Taylor is a senior technology leader with over 23 years of experience across end-user, partner, and manufacturer environments within the IT industry. He currently serves as Director, Cyber Resilience, Field Solutions Architect at Everpure, where he leads technical strategy and helps drive customer success through innovative security and resilience solutions. For more than a decade, Scott has focused on pre-sales technical leadership, building and guiding high-performing teams that consistently deliver measurable business outcomes.

    He is passionate about delivering innovative and efficient solutions while fostering a growth-oriented culture grounded in strategic thinking and strong leadership. Throughout his career, Scott has successfully navigated complex technical landscapes, providing valuable insights to clients, executive leadership, and key stakeholders. Known for cultivating high-performing, collaborative teams across practices and business units, he promotes continuous learning, creativity, and a strong focus on helping clients achieve their business objectives.

  • speaker photo
    Justin Armstrong
    CISO, TMF Health Quality Institute

    Justin Armstrong is a security, privacy, and regulatory compliance leader with over 25 years of experience in the Healthcare Industry. He led Product Security at MEDITECH, a top three Electronic Health Record vendor, and has helped numerous organizations as a fractional CISO. He has engaged with Hospitals in nearly 100 ransomware incidents, and is dedicated to securing Healthcare and Critical Infrastructure. Justin is a contributor to the IEEE/UL 2933™ Standard for Clinical IoT Data and Device Interoperability with TIPPSS — Trust, Identity, Privacy, Protection, Safety, and Security, which defines secure and interoperable practices for connected healthcare systems.

    He holds the CISSP, CCSP, and HCISPP certifications and obtained his Masters in Cybersecurity Leadership at Brandeis University.

  • speaker photo
    Ben Focht
    Deputy CISO, TMF Health Quality Institute

    Ben is a cybersecurity leader with over a decade of experience shaping and scaling security programs across diverse industries including healthcare, finance, and education. From building red teams and security operations centers to leading executive strategy and cultural transformation, his career spans nearly every dimension of the cyber landscape.

    Throughout his career, Ben has been driven by a belief that successful cybersecurity is built not just on controls and compliance, but on culture, communication, and continuous improvement. He's known for turning complex challenges into collaborative solutions whether guiding incident response, launching DevSecQps initiatives, or mentoring the next generation of security professionals.

    A Colorado native with a deep passion for building teams and growing successful programs, Ben sees his ideal role as that of a cyber culture architect, fostering environments where security becomes second nature, not an afterthought. His presentations blend real-world experience with practical takeaways and a human-centered approach that resonates across technical and executive audiences alike.

  • speaker photo
    Jim Bearce
    VP, Professional Services, AccessIT Group

    Jim Bearce is a seasoned cybersecurity leader with over 20 years of experience in IT security development, operations, and executive leadership. As Vice President of Professional Services at AccessIT Group, Jim oversees the delivery of cutting-edge security solutions, helping organizations strengthen their defenses against evolving cyberthreats.

    Prior to joining AccessIT Group, Jim played a pivotal role in guiding enterprises through complex security challenges. He has led global security teams across North & South America, Europe, and the Asia-Pacific region, specializing in threat detection, incident response, and risk mitigation for large-scale organizations. He has also served as an interim CISO, advising executive teams and Boards of Directors on cybersecurity strategy, risk management, and compliance.

    Jim holds a Master of Science in Information Security & Assurance from Norwich University, along with multiple industry-recognized security certifications, including CISSP and CISM.

  • speaker photo
    Lewis Foggie
    Sales Engineer, SecureFlag

    Having achieved an M.Sci in Astrophysics from Glasgow University in Scotland, Lewis went on to spend three years working for UK Defence, developing radar systems for naval vessels and fighter jets. Looking to take advantage of his communication skills combined with his technical skills, he went on to work as a solutions engineer in FinTech SaaS, before finding a passion for cybersecurity (namely by watching too many documentaries about ransomware) and moving on to SecureFlag.

  • speaker photo
    Peter Steyaert
    Evangelist, Sr. Solutions Architect, Security Operations, Fortinet

    Peter Steyaert is a leading cybersecurity and IT architect who directs all detailed and extensive ASOC product discussions for private and public sector customers. His background and knowledge spans the fields of cyber defense, SOC management, VoIP, and network architecture. Peter has worked on significantly large projects in both the federal government space and private sector. He received his Master of Science degree in Cyber and Information Security from Capitol Technology University, an accredited institution recognized by both NSA and DHS as an Academic Center of Excellence.

  • speaker photo
    Patricia Titus
    Field CISO, Abnormal AI

    Patricia Titus, a Field Chief Information Security Officer at Abnormal AI, has more than 25 years of CISO experience. Her extensive background includes CISO positions at prominent organizations such as Booking Holdings, Markel Corporation, Freddie Mac, Symantec, Unisys, and the U.S. Transportation Security Administration. Throughout her career, she has been responsible for developing and implementing security strategies that align with business objectives and ensure adherence to global regulations. Recognized for her expertise in areas like risk management, artificial intelligence, cybersecurity operations, and crisis management, Patricia has a proven track record of optimizing security frameworks, improving business resilience, and incorporating innovative solutions, including AI, into security practices. She currently contributes her expertise by serving on the boards of Black Kite, The Girl Scouts of the Commonwealth of Virginia, and Glasswing Ventures.

  • speaker photo
    Ian Sun
    IT Support Specialist, Boston University

    Ian Sun is a cybersecurity researcher and conference speaker focused on social engineering defense and human layer security. He previously presented original research at SecureWorld Financial Services in 2025, where he introduced the Dissonance Test, a behavioral method for surfacing deception in hiring and access control, including nation-state infiltration into IT roles. His work bridges threat intelligence with practical defenses for help desks, hiring, onboarding, and workforce identity. Ian brings hands-on experience from MSP and university IT roles and holds CompTIA Network+, Security+, and ISC² Certified in Cybersecurity credentials. He is currently pursuing the PNPT.

  • speaker photo
    Jay Martin
    CISO, Blue Mantis

    Jay Martin is the Chief Information Security Officer (CISO) and Vice President of Cybersecurity & Risk at Blue Mantis, where he leads the charge in securing enterprise ecosystems, building business resilience, and navigating the evolving digital threat landscape. With more than 25 years of experience across IT, cybersecurity, and risk management, Jay bridges technical complexity with business strategy—helping organizations not just survive but thrive securely.

    At Blue Mantis, Jay architects the cybersecurity vision across internal operations and external service delivery, aligning technical defenses with real-world business imperatives. He oversees cybersecurity posture across seven practice areas while empowering clients to achieve measurable, resilient growth in an increasingly hostile digital world.

    Jay’s leadership was recently showcased on the global stage when he helped lead security operations for a major city that hosted Super Bowl LIX, safeguarding one of the world’s most high-profile events against cyber threats. Before joining Blue Mantis, Jay co-founded Service Catalyst and held senior leadership roles at Dunkin’ Brands International, InteQ Corporation, and Hewlett-Packard. Throughout his career, he has built security programs from the ground up, led major business continuity initiatives, and guided enterprises through regulatory compliance with precision and foresight.

    Jay has held the Certified Information Security Manager (CISM) credential and is an active voice in cybersecurity leadership forums. His passion: translating risk into resilience, complexity into clarity, and cybersecurity into a business enabler — not a barrier. When Jay speaks, he brings a rare combination of technical insight, executive pragmatism, and forward-looking vision—making cybersecurity approachable, strategic, and mission-critical for today’s leaders.

  • speaker photo
    Geoff Smith
    Sr. Practice Director, Managed Services and Modern Workspace, Blue Mantis

    Geoff has more than 35 years of experience working in all verticals and markets, from the SMB to the enterprise, focusing on the application of IT solutions that enable businesses to achieve their goals. As Senior Practice Director of Managed Services and Modern Workspace, Geoff is focused on the development of co-sourced and federated Infrastructure Operations, Help Desk, Cloud, Modern Workspace, and Security Service Frameworks designed to optimize IT operations and drive economic value to the business.

    Geoff helps develop new services and marketing strategies for the company, as well as provides strategy and support to Blue Mantis’ key clients. Prior to Blue Mantis, Geoff was the Director of Client Services for Managed Technology Partners, where he was part of an overlay team that architected a new services methodology, marketing strategy, and client acquisition model. Geoff’s professional certifications include CCSP, MCNE, and VTSP. He earned a BS in Computer Science from Westfield State College.

  • speaker photo
    Jonathan Borgesen
    Technical Director of Security, EchoStor

    As Technical Director of Security at EchoStor Technologies, Jonathan leads the organization’s comprehensive security practice. He focuses on building strong security programs that align with modern trends, ensuring customers meet both their security and business objectives.

    With more than 15 years of experience in the cybersecurity industry, Jonathan has built and led security practices for multiple organizations. His approach emphasizes business impact, cross-architecture solutions, and strategic alignment rather than simply focusing on technology, earning him a reputation as a trusted advisor and thought leader among clients and peers.

  • speaker photo
    Jagathi Gururajan, Guest Speaker
    Managing Director, Novus Laurus

    Jagathi is a global executive, strategic operator and advisor with over two decades of experience across technology, governance and large scale transformation. She has held senior leadership roles at Thomson Reuters, PwC and venture backed firms, leading global teams and scaling operations in highly regulated environments. Today, she advises high-growth, resource-constrained organizations on using AI to compete, innovate, and grow with discipline and intent.

  • speaker photo
    Faisal Khan
    Lead, GRC Solutions Expert, Vanta

    Faisal is a seasoned cybersecurity & compliance professional with more than a decade of consulting and industry experience. He is a GRC Solutions Specialist at Vanta, helping customers with guidance on their security & compliance programs. Vanta is a trust management platform and provides one place to centralize security program management, automate compliance workflows, and build and manage trust with customers and vendors alike, supporting more than 15,000 customers and counting.

  • speaker photo
    Adam Connell, Moderator
    Director, Information Assurance, Acadian Asset Management
  • speaker photo
    Panel Discussion
  • speaker photo
    Gene Kingsley
    CISM, CRISC, GISP, ITILv4

    As an experienced information security strategist and collaborative executive leader, Gene Kingsley builds and leads scalable, highly-effective cybersecurity programs that enable organizations to protect their intellectual property and maintain critical operations while maximizing profitability. Gene is passionate about designing secure, compliant infrastructures that proactively mitigate potential risk, preparing organizations across diverse industries for incident response, disaster recovery, and sustained business continuity.

    Gene’s robust industry experience gives him a comprehensive view of the broader security landscape, informing his innovative and collaborative approach. He began his career in IT help desk and operations roles and continuously progressed into information security leadership positions across the higher education, healthcare, and financial services industries.

    One of Gene’s greatest accomplishments was developing and launching a security-as-a-service program for the University of Massachusetts in 2015, known as the Massachusetts Advanced Secure Technologies (MAST) program. He was recognized by the governor of Massachusetts in 2017 for this effort. To this day, MAST provides crucial security support to 501(c)3 nonprofits and institutions of higher education as well as local municipalities and government organizations at the request of the Massachusetts governor.

    During his tenure with Reliant Medical Group, Gene managed the cybersecurity and data protection practice across 23 urgent care clinics and hospital facilities, ensuring the uninterrupted functionality of the critical operational infrastructure and healthcare platforms required for ongoing patient care. In this role, Gene managed the oversight and mitigation of potential HIPAA concerns and ensured continuous alignment with the requirements of a highly regulated environment.

    In his most recent role with Farm Credit Financial Partners, Gene supported six separate farm credit associations and agricultural banks across the US. He designed and proposed a consolidated information security strategy that was accepted and even championed by the leaders of all six partners on the first draft, demonstrating his ability to navigate the competing priorities of multiple stakeholders while influencing the adoption of new processes that optimize the organizational security posture.

    A common thread throughout each of Gene’s experiences has been his willingness to educate and drive awareness around information security and cloud computing practices. He has created and led tabletop incident response exercises, and since 2010 he has been an advisor, keynote speaker, panelist, and workshop facilitator for The Seguro Group. He develops and presents his own content and facilitates certificate-based workshops that are sought after by information security practitioners of all levels at Seguro’s SecureWorld and Secure Plus conferences.

    Gene holds a Master of Science in Communications and Information Management from Bay Path University in Longmeadow, Massachusetts, and an MBA from the University of Massachusetts Isenberg School of Management in Amherst. He has two Global Information Assurance Certifications (GIAC)—Certified Information Security Professional and Certified Forensic Examiner—as well as an ITIL 4th Edition Foundation Certificate in IT Management. Gene is also certified in Risk and Information Systems Control (CRISC) and is a Certified Information Security Manager (CISM). He currently resides in the Springfield, Massachusetts area.

  • speaker photo
    Troy Batterberry
    CEO & Co-Founder, EchoMark

    Troy Batterberry is the founder and CEO of EchoMark, a Software-as-a-Service (SaaS) company pioneering a new standard in information protection. The company was founded on that trust is central to empowering everyone to do their best work. Troy brings years of product and technology experience, including 25 years at Microsoft, where he most recently served as a Corporate Vice President as the product leader of Microsoft Teams Meetings, Calling, and Events. During his tenure, Troy also played an integral role in the growth and success of marquee Microsoft products, such as Windows, Explorer/Edge, Bing, Xbox, and MSN. Before joining Microsoft, Troy held engineering positions at Sony and within the U.S. Department of Defense. Troy is driven by a long-standing passion for creating new experiences and products.

    In addition to his professional pursuits, Troy is a parent volunteer at his kids’ schools, spends time volunteering for Boy Scouts, and also enjoys time outdoors boating, hiking, and running. He holds an M.S. in Information Systems from the University of Southern California and a B.S. in Electrical and Electronic Engineering from North Dakota State University.

  • speaker photo
    Happy Hour
  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

  • speaker photo
    Craig Stanland, Guest Speaker
    Author, "Blank Canvas: How I Reinvented My Life After Prison"
  • speaker photo
    Silas Adams
    CISO, Pep Boys

    Silas Adams is a 22-year information security veteran and currently serves as Chief Information Security Officer at Pep Boys. A former Marine, he sharpened his craft supporting missions at U.S. Cyber Command, the NSA, DIA, and (what is now) the CIA’s Directorate of Digital Innovation, and later served as a DARPA Innovation Fellow within the Information Innovation Office (I2O).

    In the private sector, Silas has led security and risk programs at PwC, Cognizant, Wells Fargo, Chesapeake Utilities, RubiconMD, Oak Street Health, Lincoln Investment, and others, building expertise across highly regulated industries. He is known for pairing deep technical rigor with pragmatic leadership, he drives security transformations that enable business outcomes while delivering and transforming technology ecosystems that are secure, compliant, scalable, and built for speed. His risk-oriented approach to building, transforming and leading secure digital ecosystems enables organizations to seize opportunities throughout their business lifecycle, intelligently embrace risk to yield returns and cause disruptive innovation.

  • speaker photo
    Silas Adams
    CISO, Pep Boys

    Silas Adams is a 22-year information security veteran and currently serves as Chief Information Security Officer at Pep Boys. A former Marine, he sharpened his craft supporting missions at U.S. Cyber Command, the NSA, DIA, and (what is now) the CIA’s Directorate of Digital Innovation, and later served as a DARPA Innovation Fellow within the Information Innovation Office (I2O).

    In the private sector, Silas has led security and risk programs at PwC, Cognizant, Wells Fargo, Chesapeake Utilities, RubiconMD, Oak Street Health, Lincoln Investment, and others, building expertise across highly regulated industries. He is known for pairing deep technical rigor with pragmatic leadership, he drives security transformations that enable business outcomes while delivering and transforming technology ecosystems that are secure, compliant, scalable, and built for speed. His risk-oriented approach to building, transforming and leading secure digital ecosystems enables organizations to seize opportunities throughout their business lifecycle, intelligently embrace risk to yield returns and cause disruptive innovation.

  • speaker photo
    Matthew Incera
    Manager, Security Architecture & Strategy, Eversource Energy

    Matt is a security architecture manager with more than 20 years of experience helping critical industries, including experience driving growth through business alignment and operational excellence.

  • speaker photo
    Anatoly Podstrelov
    VP, Global Head IT & Security, EDETEK Inc.

    Anatoly oversees global technology, cloud, security, and product operations, and he is dedicated to delivering and managing EDETEK’s innovative suite of clinical platforms. As a technology leader, Anatoly brings more than 25 years of experience which spans multiple industries and business verticals. Prior to joining EDETEK, Anatoly worked in both small startups and large established companies, including leadership positions at SmashFly, where he was responsible for navigating company’s technology team through rapid growth cycle; and global brokerage firm ITG (now Virtu Financial), where he was architecting, building, and operating best of breed SaaS platforms for financial services industry. Anatoly has a Master’s Degree in Computer Sciences and Electrical Engineering from St. Petersburg Polytechnic University.

  • speaker photo
    Michael Leland
    VP, Field CTO, Island

    Michael joined Island in October 2024 as Field CTO, bringing over 30 years of data networking, operations, and cybersecurity domain expertise.

    He formerly served as Head of Technical Marketing and Chief Cybersecurity Evangelist at SentinelOne where he was responsible for messaging and strategic development of their XDR product roadmap as well as the identity security portfolio. Prior to SentinelOne he held the title of Chief Technical Strategist for McAfee.

    Michael was the co-founder and CTO of NitroSecurity–later acquired by McAfee–where he was responsible for developing and implementing their overall SIEM technology vision and roadmap and has held senior technical management positions at Cabletron and Avaya.

    Michael studied Computer and Electrical Engineering at the Georgia Institute of Technology and received an honorary MBA from Bentley University where he helped create the Information Age MBA curriculum. He is also an adjunct professor teaching cybersecurity courses at Rochester Institute of Technology in New York and Norwich University in Vermont.

  • speaker photo
    Robyn Ready
    CISO | SVP, Infrastructure and Operations, KnitWell Group

    With more than 17 years’ experience in the cybersecurity field, Robyn has led five organizations in their transformation from no security program or a minimal security program to a mature security organization. Starting with an organization that needed to achieve NIST compliance to survive, moving to a large financial firm, and then into the retail industry, Robyn has been instrumental in achieving continuous risk reduction for all these organizations. These risk reductions allowed her to move to her next challenge while leaving a team that was set up to succeed and continue their maturity journey. This includes not only cybersecurity but also the IT risk, IT compliance, and when it came, privacy disciplines.

    Currently responsible for security, IT risk, IT compliance, and privacy at the Knitwell Group, Robyn has been asked to lead the IT Operations team, as well. This adds the Service Desk, Identity and Access, Major Incident Response, Production Control, and Operations to her responsibilities, which is a little bit of back to the future for her, as she started her journey on the Help Desk and in Professional Services, prior to making the move into the security field.

  • speaker photo
    Christopher Fielder
    Field CTO, Arctic Wolf

    Christopher Fielder has worked within the cybersecurity world for more than 26 years and holds 18 industry certifications along with a Master's Degree in Information Security. His experience ranges from military, government, and corporate environments with security roles that cover offensive, defensive, and analytical positions. Christopher has also helped train some of the next generation of security professionals as a university instructor and former member of the SANS Institute. Today, his role as the Field CTO and Editor-in-Chief allows him to focus on trending security concerns, modern defense techniques, and the power and intelligence of Arctic Wolf.

  • speaker photo
    Javed Ikbal, Guest Speaker
    CISO & VP, Information Security & Risk Management, Bright Horizons

    Javed Ikbal is the CISO at Bright Horizons. Prior to that, he held CISO positions at Upromise Rewards, GTECH, and Omgeo, and brings 20 years of information security experience in financial services, gaming, and scientific research sectors. He specializes in building or re-engineering information security programs, regulatory compliance, application security, and aligning IT and information security programs to business goals. He is the co-author of "The Laidoff Ninja" and is currently working on his next book, "Clicking Up: Building a Great Information Security Program."

  • speaker photo
    Chad Barr
    Director of Governance & Compliance, Risk Advisory Services, AccessIT Group

    Chad Barr is a seasoned leader in the field of information security, currently serving as the Director of Governance, Risk and Compliance (GRC) within the Risk Advisory Service practice at AccessIT Group (AITG). With a proven track record of success, Chad brings a wealth of experience to AccessIT Group.

    As a visionary leader in the realm of cybersecurity, Chad has honed his skills across multiple disciplines, including security engineering, project management, risk management, and compliance. His extensive background underscores his ability to guide organizations toward robust and resilient security postures.

  • speaker photo
    Brian Carmen
    Sales Engineering Director, Delinea

    Brian Carmen is a security leader with more than 15 years of experience helping C-level executives and technologists solve complex security and risk management challenges while keeping initiatives on time and on budget. Guided by a “people first, technology second” philosophy, he focuses on strengthening organizational security through education, enablement, and practical strategy that aligns policy, process, and technology.

    He has presented on cyber and operational security at major industry conferences and serves as a trusted advisor to government agencies and global enterprises, including the FAA, Department of Energy, U.S. Senate, Honeywell, John Deere, Volvo, and Booz Allen.

  • speaker photo
    Lucas Fryer
    Sr. Solutions Engineer, Splunk, a Cisco company

    Lucas Fryer is a Senior Security Solutions Architect at Splunk, where he works with organizations to strengthen their security and data strategies using modern analytics and cloud technologies. With a background in technology and data systems and a degree from Wentworth Institute of Technology, Lucas specializes in helping teams transform complex machine data into actionable insights that improve security, resilience, and operational performance. He regularly collaborates with security and engineering leaders to design scalable solutions and is passionate about making advanced data and security capabilities accessible to organizations at every stage of their digital journey.

  • speaker photo
    Michael Traub
    Sr. Principal Sales Engineer, Ping Identity

    Michael serves as a Senior Principal Sales Engineer at Ping Identity, bringing more than 14 years of deep-domain expertise to the identity landscape. His career is defined by a unique evolution—beginning in the rigorous world of Lithium-Ion battery research before pivoting to optimize digital ecosystems through web application testing and performance engineering. At Ping, Michael acts as a strategic advisor across the entire identity lifecycle. He specializes in bridging the gap between complex technical protocols and seamless user experiences. His current focus lies at the intersection of Access, Authorization, and the transformative power of AI, helping organizations navigate the next frontier of secure, intelligent identity.

  • speaker photo
    Brendan Campbell, Moderator
    VP, Technology and Cybersecurity Audit & Advisory Services, Manulife
  • speaker photo
    Brian Levine
    Cybersecurity Leader and Executive Director of FormerGov; Former Cybercrime Prosecutor and National Coordinator for Cybercrime Prosecutors Across U.S.
  • speaker photo
    Jared Rinehimer
    Assistant Attorney General; Chief, Privacy and Responsible Technology Division, Massachusetts Office of the Attorney General
  • speaker photo
    Stephanie Siegmann
    Partner & Chair - International Trade, National Security, Cybersecurity & AI, Hinckley Allen; Former National Security Chief, U.S. Attorney’s Office for the District of Massachusetts

    Leveraging her extensive and vast experience as a former Navy JAG and national security prosecutor, B. Stephanie Siegmann specializes in handling high-stakes criminal and civil litigation matters, sensitive internal investigations, government enforcement proceedings and cyber-related incidents of all kinds. She is a litigation partner at Hinckley, Allen, & Snyder LLP and serves as the Chair of its Cybersecurity, Privacy, International Trade, and National Security Practice Groups and Co-Chair of its Artificial Intelligence Practice Group. Stephanie has been a trial lawyer for more than 25 years, has overseen hundreds of complex investigations, and tried dozens of federal trials. She uses her experience as a former prosecutor to defend companies and individuals in complex government investigations and advises clients on a full range of issues involving national security, export controls, sanctions, cybersecurity, cyber incident response, data privacy, the use of AI tools and systems, anti-money laundering, grant compliance, theft of trade secrets and intellectual property, and healthcare and financial crimes. Stephanie conducts internal investigations, provides guidance on developing robust regulatory compliance programs, interfaces with law enforcement agencies, responds to government inquiries and subpoenas, seeks to favorably resolve government enforcement matters, and provides aggressive representation in civil and criminal matters.

    Prior to joining Hinckley Allen in March 2022, Stephanie handled and supervised some of the highest profile national security matters in the country during her 18-year tenure as a former prosecutor and National Security Chief in the United States Attorney’s Office for the District of Massachusetts. In her capacity as National Security Chief, she was responsible for supervising all national security investigations/prosecutions in Massachusetts, including cyber intrusions, international and domestic terrorism, terrorist financing, violations of U.S. export control laws and sanctions regulations, espionage, trade secret theft, foreign influence operations, money laundering, and fraud.

    Stephanie has earned numerous honors and awards during her career, most notably, she is ranked as a top lawyer in White-Collar Crime & Government Investigation by Chambers and Partners (2025) and was the recipient of the 2025 UMass Boston Distinguished Alumni award. Stephanie graduated magna cum laude from the University of Massachusetts with a Bachelors of Arts Degree in History and Psychology and graduated magna cum laude from Suffolk University Law School with a Juris Doctor. She also now teaches as adjunct faculty member at Boston College Law School’s Master of Legal Studies in Cybersecurity, Risk and Governance.

  • speaker photo
    Scott Margolis
    CISO, Massachusetts Bay Transportation Authority (MBTA)

    Senior Information Technology/Security Executive with over 25 years of experience at premier institutions successfully building services and client relationships, developing methodologies, and integrating cross-functional skills. Specializes in information security and risk management, compliance, knowledge management, strategy, business continuity, and operational efficiency. Reputation for leading new initiatives focused on transforming operations, establishing partner/industry relationships, increasing revenue, and reducing cost and risk exposure. Proactive leader with intense focus on customers and beneficial outcomes.

  • speaker photo
    Mark Annati
    CISO, Executive Office of Economic Development, Commonwealth of Massachusetts

    Mark Annati is an experienced IT and cybersecurity leader, currently CISO for the Executive Office of Economic Development, Commonwealth of Massachusetts. A board member of InfraGard Boston, he previously served as CISO for advansappz.com and Extreme Reach. With over 20 years in IT security and two successful startups, Mark has led security operations, risk management, enterprise IT, and cloud initiatives. A former U.S. Navy submariner, he values teamwork, strategic planning, and continuous learning. Holding CISSP and SSCP certifications, he is passionate about aligning security with business goals and advancing security awareness.

  • speaker photo
    Nick Butts
    Outreach Program Manager, MassCyberCenter

    Nick Butts is the Outreach Program Manager at the MassCyberCenter at the Massachusetts Technology Collaborative (MassTech). In his role, Nick focuses on amplifying the Center’s programs and initiatives to strengthen cybersecurity resilience across the Commonwealth. He leads outreach efforts to engage businesses, municipalities, and key stakeholders, ensuring they have access to practical tools and resources for improving their cybersecurity posture. Nick also manages major events for the MassCyberCenter, creating opportunities for collaboration and knowledge-sharing among industry leaders, government partners, and the broader cybersecurity community.

    Prior to joining the MassCyberCenter, Nick served in a variety of positions within Massachusetts state government. His experience includes working in the Office of Governor Charles D. Baker as Deputy Director of Boards and Commissions and subsequently as Director of Constituent Services..

    Nick holds a B.A. in Politics and History from Curry College.

  • speaker photo
    Max Fathy
    Sr. Program Manager, MassCyberCenter

    Max Fathy is the Senior Program Manager, Cybersecurity Innovation, at the MassCyberCenter at the Massachusetts Technology Collaborative (MassTech). He is responsible for supporting the MassCyberCenter’s workforce development efforts, including the Cybersecurity Training and Education Working Group and the Cybersecurity Mentorship Program, and building stronger relationships with the private sector cybersecurity community.

    Prior to joining the MassCyberCenter, Max worked as a Manager of Government Relations and Public Policy for ML Strategies, where he advised private sector companies across a range of industries on state and local public policy in Massachusetts. He also served as a Project Analyst at Mintz Levin, where he supported legal, government relations, and community service initiatives.

    Max holds a Master of Arts in Law and Diplomacy with a focus on International Security and Technology Policy from the Fletcher School of Law and Diplomacy at Tufts University. During his studies at Fletcher, he served as a Rosenthal Fellow in the Office of the Under Secretary of Defense for Policy in the United States Department of Defense. He also received his B.A. in International Relations from Tufts.

  • speaker photo
    James Thompson, Moderator
    Director, Information Security, Hypertherm Associates

    James brings more than 20 years of experience in Information Technology including seven years in cybersecurity within the manufacturing vertical. He has a passion for team development and attributes his program’s success to relationship and team building skills developed earlier in his career. He started his career in higher education and has since shifted to private sector organizations and holds several industry certifications including CISSP, CISA, PMP and PCIP.

    A motivated builder and problem solver who loves working with others to create the solutions that drive innovation, optimization, and change.

  • speaker photo
    Panel Discussion
  • speaker photo
    Joshua Bregler
    Application Security Leader, McKinsey & Co.

    Joshua Bregler is a cybersecurity executive with deep expertise in application security, cloud architecture, and mission-critical systems. He currently serves as the Application Security Leader at McKinsey & Company, where he builds and scales firmwide application security capabilities, enabling secure product development and enterprise resilience.

    Before joining McKinsey, Joshua was a Principal Security Architect at Amazon Web Services, where he supported the U.S. Department of Defense and the Intelligence Community. In that role, he led secure cloud transformation initiatives, architected high-assurance systems, and partnered with national security stakeholders to advance zero-trust security models across classified and critical workloads.

    Joshua holds an MBA from Johns Hopkins University and is a U.S. Marine Corps veteran, bringing a mission-first mindset and disciplined leadership style to every engagement. His career reflects more than two decades of advancing cybersecurity strategy, designing secure digital ecosystems, and guiding organizations through complex technical and regulatory environments.

  • speaker photo
    Kishore Gangwani
    Principal Engineer, Application Security, CarGurus

    Kishore has 20-plus years' experience in software architecture and application security and is currently a Principal Engineer, Application Security, at CarGurus  He has presented at Identiverse.

  • speaker photo
    Walter Abeson
    Sr. Sales Engineer, Reach Security

    Walter Abeson is currently a Solutions Engineer at Reach Security where he helps enterprises prevent breaches by ensuring that their security tools are optimized to defend against attacks. Walter has a deep background in security operations and threat hunting, with over 10 years of experience. Prior to joining Reach, Walter worked at Dazz, SentinelOne, Endgame, RSA NetWitness, and was the Technology Manager for Black Hat. He continues to serve as staff for the Black Hat NOC and as a goon for DEF CON. When not behind a computer, Walter enjoys photography, reading, and spending time outdoors.

  • speaker photo
    Harish Akali
    CTO, ColorTokens

    Harish Akali is Chief Technology Officer at ColorTokens, leading innovation in cybersecurity platforms that secure modern enterprise infrastructure. With over 30 years of experience building and scaling enterprise infrastructure and security products, he has founded and exited a cybersecurity startup, built platforms trusted by the Fortune 100, and led global engineering teams delivering enterprise-grade innovation at scale.

  • speaker photo
    Maxime Gréau
    Principal Software Engineer, Chainguard

    Maxime Gréau is a Principal Software Engineer at Chainguard, where he builds DriftlessAF, an open source agentic reconciliation framework that powers Chainguard Factory 2.0. Previously at Elastic for 7+ years, he led cross-engineering supply chain security efforts that reduced CVEs across Elastic's container images, pioneered Sigstore container signing, and contributed to the design of GitOps-based serverless CD workflows. He's a published author ("Apache Maven") and conference speaker (DevoxxFr, DevNation).

  • speaker photo
    Ryan Roobian
    Global Principal Solutions Architect - Cyber Intelligence & Risk, Google Cloud

    Ryan Roobian has over 25 years of experience in various specialties in IT including Cybersecurity. As a Global Solutions Architect at Google Cloud Security, Ryan serves as a subject matter expert for all security products and services within the Google Cloud portfolio. In his current role, Ryan works with strategic customers around the world in developing complex solutions with security inherent in their design, while also helping with internal product and go-to-market strategies.

  • speaker photo
    Helen Negre, Moderator
    vCISO & Executive Advisor, LRS

    Helen Negre is a seasoned cybersecurity executive and digital transformation leader with extensive experience in building security strategies for global enterprises. As a Virtual Chief Information Security Officer (vCISO) for LRS and former Chief Cybersecurity Officer at Siemens, Helen has led large-scale security programs, developed compliance frameworks for standards such as PCI DSS, ISO 27001, NIST, and CMMC, and driven organizational shifts from traditional manufacturing to technology focused operations. She specializes in risk management, regulatory compliance, and executive advisory services. Helen’s career spans leadership roles in IT, OT, product security, and incident response, with a proven track record of collaborating with intelligence agencies, regulators, and industry boards to anticipate and mitigate emerging threats.

  • speaker photo
    Larry Wilson, CISSP, CISA, Instructor
    Sr. Cybersecurity Consultant, Wilson Cyber

    Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.

  • speaker photo
    Kip Boyle, Instructor
    vCISO, Cyber Risk Opportunities LLC

    Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Propel your cyber career at SecureWorld!

Hone your skills and connect with your regional peers in InfoSec.