Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, August 28, 202510:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 amOPENING KEYNOTERegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmThe Enemy Within: Insider Threats and the Impact to Critical InfrastructureRegistration Level:Open Sessions
12:00 pm - 12:45 pmA careless or malicious insider can destroy an enterprise. Optimizing a cybersecurity insider threat program and integrating it into the enterprise risk management strategy can increase security resilience and provide early warning to threats. What security and contingency policies should you consider that are right for you? Examine how to assess your existing risk profile and how to design, plan, and build a successful insider risk program. Participants will learn what critical infrastructure sectors are doing to combat the threat and discuss how to build an effective strategy along with technology solutions that may aid security programs.
12:00 pmRansomware: How to Stay Off the Front PagesRegistration Level:Open Sessions
12:00 pm - 12:45 pm12:00 pmAI-Driven Cybersecurity: The Good, the Bad, and the UglyRegistration Level:Open Sessions
12:00 pm - 12:45 pmSession description to come.
12:00 pmInvesting in Your Application Security ProgramsRegistration Level:Open Sessions
12:00 pm - 12:45 pmSession description to come.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmAI: The New Guardian of Critical InfrastructureRegistration Level:Open Sessions
1:00 pm - 1:45 pmAI is becoming essential in protecting critical infrastructure by improving threat intelligence. It helps detect vulnerabilities, predict threats, and respond quickly to keep vital systems secure. This discussion will explore how AI is changing the way we defend against cyber threats.
1:00 pmEngaging with and Driving Innovation in CybersecurityRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pmHarnessing Data Analytics for Robust Fraud Detection and PreventionRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pmMicro Segmentation: What You Need to KnowRegistration Level:Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmThreats to the Critical InfrastructureRegistration Level:Open Sessions
2:00 pm - 2:45 pmSession description to come.
2:00 pmUsing GenAI to Turbocharge Your GRC TeamsRegistration Level:Open Sessions
2:00 pm - 2:45 pmTraditional methods of managing Governance, Risk Management, and Compliance (GRC) programs often lack the efficiency and scalability needed in today’s fast-paced environment. This talk will demonstrate the use of Generative AI technologies to transform and turbocharge GRC teams, offering significant advancements in processing capabilities, decision-making speed, and overall accuracy. We will explore practical applications of Generative AI in automating routine GRC tasks such as policy drafting, efficient risk assessment, threat modeling, and writing your own GPTs to automate workflows.
2:00 pm[Panel] Protecting Data and Systems in the CloudRegistration Level:Open Sessions
2:00 pm - 2:45 pmSession description to come.
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmIntegrating Transformative OT Cybersecurity ProgramsRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:00 pmExploiting the Human Side: Phishing, Social Engineering, and Con ArtistsRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:00 pmStarting Your Zero Trust Journey on the Right FootRegistration Level:Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmCLOSING KEYNOTERegistration Level:Open Sessions
4:00 pm - 4:45 pm
- Google CloudBooth:
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Reserve your spot today!
