Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, October 20, 20227:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
7:30 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
7:30 am - 8:20 amThis roundtable discussion is for our Advisory Council members only.
7:30 amAssociation Chapter MeetingsRegistration Level:Open Sessions
7:30 am - 8:20 amParticipating professional associations and details to be announced.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 3:00 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:30 am[Opening Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret ServiceFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:Open Sessions
8:30 am - 9:15 am9:15 amNetworking BreakRegistration Level:Open Sessions
9:15 am - 9:45 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
9:45 amThey Were Here, Now They're Everywhere: Leading Distributed TeamsRegistration Level:Conference Pass
9:45 am - 10:30 amIt’s no secret that many organizations abruptly shifted to a remote workplace model when the COVID-19 pandemic swept the globe. As leaders cope with the aftermath of the strangest time of their lives, they now consider what the workforce of the future looks like. Although the long-term answer will vary, one thing is certain: more organizations are embracing a dispersed workforce. Some leaders are concerned how they will continue to build and lead effective teams when many of our tried-and-true tactics are obsolete. While many have overcomplicated remote leadership, all we really need are four basic principles for success.
9:45 amConquering Cloud ComplexityRegistration Level:Open Sessions
9:45 am - 10:30 amCloud security is hard, not least because cloud platforms change so quickly. This talk presents several lessons learned from security teams struggling to get their arms around the sprawl of modern infrastructure, using practical analogies from pandemics and earthquakes.
9:45 amPaving the Way to AppSec Program SuccessHow to build a scaleable enterprise-wide application security program.Registration Level:Open Sessions
9:45 am - 10:30 amThis presentation offers a fundamental approach to creating a foundation for an application security program that holistically addresses findings by creating a conduit between the information security teams—who often discover the issues—and the development teams, who know the application better than anyone and can re-mediate issues in the best possible fashion.
10:40 amInsider Threats: A Multi-Pronged Approach to Protecting Your OrganizationRegistration Level:Conference Pass
10:40 am - 11:25 amInsider threats are a real danger and cannot be overlooked. While deploying the latest secure system to fight against cyber threats is a decent strategy, you must also implement an effective insider threat system for an overall cybersecurity solution. An insider threat program cannot be brought off the shelf, but is a continuous process to identify and detect an incident as it occurs. Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)
10:40 amCyber Incidents, Forensics, and Insurance: Are All Three up to Snuff?Registration Level:Open Sessions
10:40 am - 11:25 am2020 was the year of ransomware and the pandemic, and many organizations realized their IR wasn’t up to snuff, and others did not listen to external professionals helping and were re-compromised. Have you really tested your Incident Response processes? How about having a detailed post-mortem after an event? Have you looked at your cyber insurance policy to see who you are supposed to be using for assistance? This session will review going through an actual incident and what was good and what was missing in the recovery, alerting (oops, the customers are involved), and finding the root cause, and whether cyber insurance was worth it.
10:40 amRansomware Incident Command and Lessons Learned for ManagersRegistration Level:Conference Pass
10:40 am - 11:25 amThis presentation presents a practical approach to incident command for managers at all levels, irrelevant of cyber expertise. Managers of all types are asked to take charge in critical situations and can benefit from leveraging proven crisis management processes during ransomware response.
11:30 am[Lunch Keynote Panel] The CISO PerspectiveVP & CISO, National Veterinary AssociatesVP, Global GRC & BISO, CBRECISO, American First FinancePrincipal, Teknion Data SolutionsCSO, BestowRegistration Level:Open Sessions
11:30 am - 12:30 pmLocation / Room: Keynote Theater12:30 pmNetworking BreakRegistration Level:Open Sessions
12:30 pm - 1:00 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:00 pm[Panel] Tales from the Cloud: Doing More with LessRegistration Level:Open Sessions
1:00 pm - 1:50 pmThe cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.
1:00 pm[Panel] The Current Threat LandscapeRegistration Level:Open Sessions
1:00 pm - 1:50 pmIf we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?
It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.
2:00 pmIncident Response: Look Who's TalkingRegistration Level:Conference Pass
2:00 pm - 2:45 pmKey Takeaway:
Learn the essential elements of crisis communications and reputation control for the cybersecurity team and the elements not exercised in most Incident Response plans.The ability to control the narrative during a cyber event will shape public perception of the company’s preparedness for a cyber event. In a cyber crisis, for everyone outside of the technical teams, perception is reality, and that reality may affect the company’s reputation long after the incident is over. Businesses have a significant reliance on technology; a breach of customer trust can be just as devastating as a network breach. Employees who are unsure of the circumstances will not hesitate to share on social media. Does the Incident Response plan account for reputation control? How will the company handle crisis communications during a cyber incident?
2:00 pmHow to Build an Effective Security Awareness ProgramRegistration Level:Open Sessions
2:00 pm - 2:45 pmHow to build an effective security awareness program and help your team recognize phishing and BEC.
2:00 pmGoing Passwordless: Authentication Fact or Fiction?Registration Level:Open Sessions
2:00 pm - 2:45 pmAre your internal customers tired of passwords? Are you tired of easily breaking their passwords? Well, look no further. Passwordless authentication is upon us and can be achieved for multi-factor authentication (MFA), while making our internal customers happy. How is this possible? Come and listen with your colleagues as I share how we rolled it out, describe the lessons learned, and share who the players are.
Passwords are one of the most loathed controls in the wild. If you can’t beat ’em, join ’em. Learn who the passwordless alphas are and the lessons learned to achieve a win-win strategy within your company.
Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)
2:45 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
2:45 pm - 3:15 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:15 pmIndustrial Control Systems and CybersecurityRegistration Level:Conference Pass
3:15 pm - 4:00 pmIndustrial Control Systems are everywhere and have an impact on our lives every day. If they are not protected properly, we could lose access to electricity, oil & gas, and even food. This presentation will look at what an Industrial Control System is, what the possible dangers are, and how to best protect them.
3:15 pmFinding Your Own Vulnerabilities (Before Attackers & Auditors Do)Registration Level:Open Sessions
3:15 pm - 4:00 pmOrganizations can often struggle to identify and address vulnerabilities in their environment, whether for network devices, servers, workstations, IoT devices and other hosts. This presentation covers a number of “quick wins” in vulnerability management for the wide range of devices seen on corporate and home networks today.
3:15 pmAccess Management: How to Control Access in Today’s Technology EnvironmentRegistration Level:Open Sessions
3:15 pm - 4:00 pmUser IDs, long, complicated passwords, data breaches, internal audits, external audits, compliance assessments, hackers, and the list goes on and on. These are just a few things that access management professionals worry about. How do you set up your access management controls to limit the organization’s exposure and decrease the odds something bad will happen? Come learn proven techniques to control the access management environment.
- Arctic Wolf NetworksBooth:
Arctic Wolf Networks provides SOC-as-a-service that is redefining the economics of security. The AWN CyberSOC™ service is anchored by Concierge Security™ teams and includes 24×7 monitoring, custom alerting, and incident investigation and response. There is no hardware or software to purchase, and the end-to-end service includes a proprietary cloud-based SIEM, threat intelligence subscriptions and all the expertise and tools required. For more information about Arctic Wolf, visit https://www.arcticwolf.com.
- AvertiumBooth:
Avertium was born from 4 award-winning cybersecurity firms in 2019. Today, helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
- BlackCloak, IncBooth:
BlackCloak provides digital protection for corporate executives, Board Members, and high-profile and high-net-worth individuals and their families. Its award-winning Concierge Cybersecurity & Privacy™ Platform combines proprietary software with white-glove client service to prevent cyberattacks originating in an enterprise leader’s personal life from moving laterally into the organization. The Platform also protects individuals and their families from financial fraud, identity theft, targeted cyberattacks, reputational damage and other threats to privacy and security. Thousands of CISOs, CIOs, CFOs, and General Counsels trust BlackCloak to protect the personal privacy, devices, and homes of their most important personnel so they can continue to focus exclusively on what they do best: protecting the enterprise from cyberattack.
- CentripetalBooth:
Centripetal is a three-time Deloitte Fast 500 company, whose cyber security systems are deployed in many of the world’s most mission critical networks. Our mission is to make the most advanced intelligence-based defense available to everyone as a service. Through our research we are resolving each of the technological challenges to put trust back into internet connection.
- Code42Booth:
Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.
- Cybercrime Support NetworkBooth: N/A
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- CybereasonBooth:
Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.
- MimecastBooth:
Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector—email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world.
- OktaBooth:
Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.
- RiskReconBooth:
RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
enabling organizations to efficiently operate scalable, third-party risk management programs for
dramatically better risk outcomes. Request a demo to learn more about our solution. - SecureLinkBooth:
SecureLink is a leader in managing secure third-party access and remote support for both enterprise companies and technology providers. SecureLink serves over 400 customers and 30,000 organizations worldwide. World-class companies across multiple industries including healthcare, financial services, legal, gaming and retail rely on SecureLink’s secure, purpose-built platform.
- SecurityMetricsBooth:
Today, headquartered in Orem, Utah, we continue to provide expert services to small and large businesses around the world. We are most interested in helping businesses who view cybersecurity as a mindset rather than a checklist because we want to ensure the protection and success of our customers to the best of our ability.
- SonatypeBooth:
Every day, developers rely on millions of third party and open source building blocks – known as components – to build the software that runs our world. Sonatype ensures that only the best components are used throughout the software development lifecycle so that organizations don’t have to make the tradeoff between going fast and being secure. More than 120,000 organizations use Sonatype’s Nexus solutions to support agile, Continuous Delivery, and DevOps practices globally
- ThalesBooth:
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- TechTargetBooth: N/A
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- Women in CyberSecurity (WiCyS)Booth:
Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Sonja HammondVP & CISO, National Veterinary Associates
Sonja Hammond is the Vice President, Chief Information Security Officer at National Veterinary Associates. As an information and cyber security leader, Sonja brings experience from the financial, healthcare, manufacturing, and computing industries. An additional benefit that Sonja possesses is an information technology (IT) background with hands-on infrastructure knowledge and deep experience in large global corporate environments. She has had direct interaction with external regulators, worked in compliance and coordinated IT audit preparation and remediation. Sonja has done extensive information security work in vendor and supplier negotiations, mergers and acquisitions (MADO), risk and compliance, and provided lawsuit support as a forensic subject matter expert.
- Patrick BenoitVP, Global GRC & BISO, CBRE
Patrick is the Global Head of Cyber Governance, Risk, and Compliance / Business Information Security Officer for CBRE. He was formerly the Deputy CISO for Cheetah Digital. He has been an Executive Business Partner at Experian; a Customer Delivery Executive and Service Delivery Leader at Dell; and owned a technology consulting company. He is a highly effective Business Leader with a mastery of Technology and Security. He is also a Writer, Speaker, and a continuous Mentor/Advisor and Learner. He has demonstrated repeated success guiding business strategy to achieve maximum positive business impacts with minimum resource expenditures. Talented at building and launching global technology and security programs, grooming high-performing teams across all domains, plus guiding the digital transformation, enhancing the digital customer experience, driving and enhancing revenue using technology and reducing risk to the business. A skilled executive leader, presenter, negotiator, and businessperson, able to forge solid relationships with strategic partners and build consensus across multiple organizational levels.
He is certified as C/CISO, CISM, CISSP, CRISC, PMP, ITIL Expert, and Lean Six Sigma Black Belt. He is a pilot and flight instructor. He studies and teaches Aikido, rides motorcycles, and his favorite teaching is “From Chaos Comes Greatness,” a loose translation from the “I Ching."
- Jaimin ShahCISO, American First Finance
Jaimin Shah is an experienced security and technology leader in developing global information security and privacy program with diverse experience in various industries including Real Estate, Airline, Retail, Banking and Hospitality. Jaimin has over 25 years of extensive, strategic leadership experience in being a trusted advisor in the field of information security, privacy, compliance, governance, risk management, and information technology. He holds several active Security and Privacy Certification including CIPP/E (2018), CISA (2014), CISM (2009), CISSP (2005). He is active in the security community as a speaker at several conferences and is also the co-founder of CISO-XC events.
- Paola SaibenePrincipal, Teknion Data Solutions
Paola Saibene has been a technologist for 26 years, having held multiple C-suite roles (CIO, CTO, CSO) in large, global organizations, having received national awards in innovation and cybersecurity, and having led thousands of her own team members to fulfill business missions, and thrive despite constraints. She has also worked as a Data Privacy Officer and as a VP of Enterprise Risk Management. Paola blends innovation, digital transformation, strategy, growth, security, privacy, risk, compliance, and governance into an ecosystem of high resiliency and strength, especially as it pertains to data and its valuation process. Presently, Paola leads the Data Governance Practice at Teknion Data Solutions and teaches at Georgetown University (Information Security Master’s Program), Dallas Baptist University (Digital Risk Management Program), and the ENAE University in Spain (Master’s in Data Science ). Her curriculum across universities is built on data seen from a “Governance by Design” approach, infused with Cybersecurity, Data Privacy, Digital Ethics, Enterprise Risk Management, and Information Security Law. She is also the co-author of the “CISO Mentor”.
- Moderator: David BelangerCSO, Bestow
Dave Belanger has over 25 years of experience in Security and Technology Leadership roles. Dave is the Chief Security Officer for Bestow. In his prior roles, he served as Information Security Officer for a Technology Company operating in the corrections and public safety industry and as CISO for Maxor National Pharmacy Services. He was also the Data Center Manager for a large telecom company, providing Operational and Physical Security for nearly a decade. He holds security industry certifications including CISSP, CCISO and CEH. Dave is on the Board of Directors for the North Texas chapter of ISSA. He is on several advisory boards and is actively engaged in the cybersecurity community as a volunteer, mentor, and speaker.
- Panel Discussion
- Panel Discussion

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join us for high-quality, affordable cybersecurity training and networking. Sign up today!
