Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, September 19, 20237:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:50 amParticipating professional associations and details to be announced.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 am[Opening Keynote] Lessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn SolesCISO, State of North DakotaRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterIn a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amShut Up and Scan: A Rugged DevOps Approach to Software Development and SecurityPrincipal Engineer - Enterprise Security, UnitedHealth GroupSenior Director Rugged DevOps and Enterprise DevOps Ambassador, Alight SolutionsRegistration Level:Conference Pass
10:15 am - 11:00 amSession description coming soon.
10:15 amThe Future of WorkRegistration Level:Conference Pass
10:15 am - 11:00 amOver the last few years, the workforce, and the way we work, has entirely shifted focus. Between hybrid work models, attracting and retaining diverse talent, forced digital migrations/transformations, cybersecurity succession planning, and overall mental fatigue, the future of work has dramatically changed. We will discuss how to navigate the “new normal” and lessons learned along the way. This discussion is followed by a Q&A, so come prepared to ask your burning workforce questions!
10:15 amHow to Build an Insider Threat ProgramRegistration Level:Open Sessions
10:15 am - 11:00 amSometimes just having a SOC isn’t enough to address insider threat issues. Security operations teams are managing massive amounts of data across billions of events from on premises to the cloud. Looking for specific needles like insider threats in this complex haystack has special requirements that encompass both searching historic data and seeing evolving credential behavior changes as they happen.
Whether from downsizing or expanding the business, employees, vendors, contractors, and more are moving in and out of your environment. And often, it is during turbulent times that insider threats go unobserved as everything changes so quickly. Insider threat initiatives require a new, more focused approach.
This presentation will explore:
- The common scenarios that indicate you need an insider threat team, how to build a mission statement, and tools
- Four attributes of a successful insider threat program
- How behavioral analytics baseline “normal” behavior of users and devices—showing risk faster
- An automated investigation experience that replaces manual routines and effectively guides new insider threat teams
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
11:10 amSocial Engineering: Training the Human FirewallTeam Leader of Information Security, GarminRegistration Level:Conference Pass
11:10 am - 11:55 amPhishing is one of the leading cyberattacks worldwide, resulting in numerous social engineering training exercises to train average users to defend against these attacks. This discussion focuses on research that took a pool of users with three different phishing campaigns. Each campaign progressively has a phish that should be more advanced to spot than the previous phish presented. The research shows the psychological reasoning behind why a user will interact with a phish, regardless of educational awareness. Results include why a 0% or 100% report rate is unrealistic and how to use phishing metrics to quantify risk in a business.11:10 am[Panel] There's a Bad Moon on the Rise – Are You Ready?Identifying the Current Threat LandscapeRegistration Level:Open Sessions
11:10 am - 11:55 amLike the main character in the 1981 horror movie, An American Werewolf in London, cybercriminals continue to morph into something evil, lurking in the night (and day) to cause harm to people, organizations, and governments. Cue the Creedence Clearwater Revival song, Bad Moon Rising.
The cybersecurity community is smart and more than capable of thwarting bad actors, fangs and all. They have tools, technologies, partnerships across private and public entities, and solution vendors to help them along the way. Don’t forget about the consultants working hard to stay ahead of those wanting to do harm, as well.
Hear our panelists’ views on the current threat landscape, solutions they have to offer, and ideas they have for turning a bad moon into a harvest moon.
11:10 amBehind the Scenes of Teams and OneDrive: The Secret Life of Shared FilesVP Revenue Operations, TenfoldRegistration Level:Open Sessions
11:10 am - 11:55 amWith the accelerated use of Microsoft 365, we are shooting more sensitive and confidential data into the cloud than we are aware of. Keeping track of what files users are sharing among each other in Teams and OneDrive and knowing who else has access to seems an impossible task. What can you do about it? Find out in this talk.
Topics covered include:
- What goes on in the background when we share data in Teams & OneDrive.
- Why more people have access to shared files than we think.
- How tenfold helps you keep track of permissions and shared files once and for all
12:00 pm[Lunch Keynote] What Do Drag Racing and Cybersecurity Have to Do With Each Other?CISO, United Musculoskeletal PartnersRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterYou’d be amazed what you can learn from everyday hobbies or obstacles to help you become a better practitioner. Krista Arndt shares a very personal story of survival after a bad drag racing accident in 2015. It was a life-altering experience and provided perspective on her personal and professional life that drives her every day as a loving mom and wife, volunteer, and successful CISO.12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmAdvisory Council – VIP / INVITE ONLY
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pmAPI Security: A CISO PerspectiveVP, ISSA Denver Chapter; Information Security Lead, TRACE3 Mountain State RegionRegistration Level:Conference Pass
1:15 pm - 2:15 pmIn today’s rapidly evolving digital landscape, APIs have become integral components of business operations, propelling innovation and interconnectivity. However, they also pose unique security challenges that must be managed strategically. This talk provides a CISO’s perspective on API security, exploring the balance between technological advancement and robust protection. The session examines the risks associated with APIs, current best practices in API security, and strategies that a CISO can employ to mitigate threats, ensuring the secure and effective utilization of APIs within an organization. This session aims to provide insights into creating a strong security culture that can adapt to the dynamic nature of API technologies while protecting valuable business assets.
How are CISOs and security leadership developing API security and incident response readiness governance?
Key questions addressed include:
- How are APIs tied to business success?
- Why having an API strategy is essential?
- How to develop API lifecycle management?
1:15 pmRansomware: How to Stay Off the Front PagesRegistration Level:Conference Pass
1:15 pm - 2:15 pm1:15 pm[Panel] Lucy in the Cloud with DiamondsSecuring Your Cloud EnvironmentRegistration Level:Open Sessions
1:15 pm - 2:15 pmCan you “imagine” if The Beatles, when first starting out, had to deal with having their catalog of music hacked, stolen, and held for ransom simply because it was in an unsecure cloud setting? While it is possible for that to happen with their hit-laden collection of songs today, it’s merely a tiny example of how businesses operate at a minimum in a hybrid cloud environment—many in a cloud-only platform.
With that comes security issues and another major area which cybersecurity professionals must work diligently to protect.
Our panel of experts share the good, the bad, and the ugly of operating in a cloud environment, what it takes to make the move to hybrid or multi-cloud successful, how to protect data from insider and outsider threats, and what it takes to provide the support DevOps teams need.
2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pm[Fireside Chat] Sustainable Cybersecurity and ResiliencyRegistration Level:Conference Pass
2:30 pm - 3:15 pmAs the nation’s cyber defense agency, CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. Since the majority of our nation’s critical infrastructure is privately owned, ensuring the nation’s cybersecurity posture requires continued collaboration between government and the private sector. During this fireside chat, CISA will discuss the current cyber threat landscape, the agency’s latest initiatives to help critical infrastructure owners and operators protect and defend their networks, and the catalog of CISA services available to organizations to become more cyber resilient.
2:30 pmDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Conference Pass
2:30 pm - 3:15 pm2:30 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
2:30 pm - 3:15 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:15 pmHappy HourSponsored by UptycsRegistration Level:Open Sessions
3:15 pm - 5:00 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beer, wine, soda, and hors d’oeuvres. This is a great opportunity to network with other security professionals from the area, and to discuss the hot topics from the day.
Generously sponsored by Uptycs. A drink ticket is included on your attendee badge.
3:45 pmCLOSING KEYNOTERegistration Level:Open Sessions
3:45 pm - 4:30 pmLocation / Room: Keynote Theater - Wednesday, September 20, 20239:00 am[PLUS Course] Topic TBDRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmTopic(s) and instructor to be announced.
Our PLUS courses provide 6 hours of in-depth training onsite the day before the conference. Learn in a small group of your peers from an instructor with subject matter expertise on a critical, timely security issue.
Includes a Conference Pass; earn 12 CPE credits total!
- AuditBoard, IncBooth: TBD
AuditBoard is the leading cloud-based platform transforming how enterprises manage risk. Its integrated suite of easy-to-use audit, risk, and compliance solutions streamlines internal audit, SOX compliance, controls management, risk management, and security compliance. AuditBoard’s clients range from prominent pre-IPO to Fortune 50 companies
looking to modernize, simplify, and elevate their functions. AuditBoard is the top-rated audit management and GRC software on G2, and was recently ranked for the second year in a row as one of the 100 fastest-growing technology companies in North America by Deloitte.
- CRESTBooth: TBD
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- Critical StartBooth: TBD
Critical Start simplifies breach prevention by delivering the most effective managed detection and incident response services. Powered by our Zero Trust Analytics Platform, the industry’s only Trusted Behavior Registry, and MOBILESOC, our 24x7x365 expert security analysts and Cyber Research Unit monitors, investigates, and remediates alerts swiftly and effectively.
- Envision Technology AdvisorsBooth: TBD
Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.
- ExabeamBooth: TBD
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- IllumioBooth: TBD
We built the Illumio Adaptive Security Platform (ASP)™ to provide unprecedented visualization and control of enterprise applications. Our system constantly inspects and adapts to the computing environment it is protecting, without pause.
Moreover, since 75 percent of computing interactions never leave the data center, our customers can now have complete visibility behind the firewall, whether it is running in their data center or the vibrant public cloud services of Amazon Web Services, Microsoft Azure, Google Compute Engine, Rackspace, and many others. - TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- Tenfold SecurityBooth: TBD
The access management solution tenfold enables organizations to manage all access rights and user accounts across their on-prem, cloud and third-party systems and apps centrally from within one platform. Not only does this accelerate approval processes, it also protects data against theft and misuse. Thanks to seamless logs and on-demand reports, compliance regulations are also kept at bay. tenfold is quick and easy to install, user-friendly and integrates with numerous systems, making it the perfect fit for mid-size organizations.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- UptycsBooth: TBD
Inspired by CRM and business process analytics, the Uptycs vision is to empower security teams with the same real-time decision making, driven by structured telemetry and powerful analytics.
By providing a unified view of cloud and endpoint telemetry from a common solution, making every user and platform action auditable, and having an open and extensible API, we eliminate black-box operations, reduce tool sprawl, and ultimately arm modern defenders with the insights they need across their cloud-native attack surfaces.
- Veeam SoftwareBooth: TBD
Veeam provides a single platform for modernizing backup, accelerating hybrid cloud and securing data. Veeam has 400,000+ customers worldwide, including 82% of the Fortune 500 and 69% of the Global 2,000. Veeam’s 100% channel ecosystem includes global partners, as well as HPE, NetApp, Cisco and Lenovo as exclusive resellers, and boasts more than 35K transacting partners worldwide.
With offices in more than 30 countries and over 200 industry awards, Veeam is unquestionably the leader in data protection across all environments. In fact, Veeam has been positioned by Gartner, Inc. in the Leaders quadrant of the 2022 Magic Quadrant for Enterprise Backup and Recovery Solutions. Not only does this mark the sixth consecutive time Gartner has recognized Veeam as a Magic Quadrant Leader, but it is the third consecutive year Veeam is positioned highest overall in ability to execute.
- Michael GreggCISO, State of North Dakota
Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.
With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.
- John PrewettPrincipal Engineer - Enterprise Security, UnitedHealth Group
John Prewett is a security technologist with over 20 years’ experience helping private sector, government agencies, and educational institutions identify risk and improve their security postures. John's latest passion is code writing, software engineering best practice, and otherwise improving the overall relationship between security practitioners and application developers. Outside of work, John cherishes early morning walks with his wife (during which time they solve all the world's problems), completing home improvement projects, and generally enjoying the beautiful state (Colorado) in which he and his family live.
- Shua GamradtSenior Director Rugged DevOps and Enterprise DevOps Ambassador, Alight Solutions
- Reanna SchultzTeam Leader of Information Security, Garmin
Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.
- Panel Discussion
- Helmut SemmelmayerVP Revenue Operations, Tenfold
In his role as VP Revenue Operations at the Austrian IAM software company tenfold, Helmut has been responsible for partner sales and product marketing across Europe and North America since 2012.
Right at the start of his tenfold career, he launched the company’s direct sales and was later strongly involved in developing its channel sales strategy.
From 2015, Helmut, who holds a degree in Business Informatics, drove forward the company’s expansion to Germany and Switzerland and additionally expanded sales to include the UK and North America from 2019.
He is in charge of tenfold’s North American branch “tenfold Software North America Corp”.
- Krista ArndtCISO, United Musculoskeletal Partners
Krista Arndt is the Chief Information Security Officer (CISO) at United Musculoskeletal Partners. As the CISO, Krista is responsible for the safety and security of all UMP and its practices' patients and employees. Krista accomplishes this by ensuring continued maturation and providing strategic direction for UMP's information security program in alignment with the business objectives. Additionally, Krista provides oversight of the security program's day to day operational effectiveness.
Prior to joining UMP, Krista served as the Director of Security Governance, Risk and Compliance for Voyager Digital, a leading cryptocurrency trading platform, where she was responsible for the development, maturation, and maintenance of Voyager's security program. Krista has served in various leadership and operational roles within the information security profession for 14 years within the financial and defense sectors, bringing a deep understanding of how strong security and privacy practices can help enable best in class care and peace of mind for UMP and its practices' patients.
Krista has a Bachelors Degree in Biology from Felician College and currently holds her Certified in Risk and Information Systems Control (CRISC) and Certified Information Security Manager (CISM) certifications.
Krista is an active member of ISACA, Infragard's Philadelphia Chapter, as a member of both Neumann University's Business Advisory Council and Women in Cybersecurity-Delaware Valley Affiliate's Membership and Education Committees. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.
- Gina YaconeVP, ISSA Denver Chapter; Information Security Lead, TRACE3 Mountain State Region
Gina, based in Denver, severs as the information security lead for TRACE3's mountain state region. Additionally, Gina offers valuable guidance to Trace3 clients on implementing innovative security solutions, enabling companies to safeguard their most valuable digital assets. Furthermore, she is an accomplished public speaker and a mentor in the field. Gina hold seven security certifications and has obtained her Master’s Degree in Cybersecurity from the School of Engineering at the University of New Hampshire.
In her previous role as a vCISO, Gina was entrusted with safeguarding numerous organizations. She oversaw the overall security strategy and operations, including the implementation and guidance of protective and detective controls, security operations, threat intelligence, incident response, governance, risk and compliance (GRC), risk assessments, audits, architecture and integration, as well as secure software development
life cycle (SDLC). Her expertise spans across diverse industries, including healthcare, biotech, pharmaceuticals, hedge funds, alternative investments, insurance, education, manufacturing, technology, and local government.Additionally, Gina played a crucial role in a startup that established a Security Operations Center (SOC) specializing in Managed Detection and Response (MDR) and threat intelligence services. Later on, these services were acquired by Sophos.
Gina actively engages with the information security community and holds membership in several professional governing bodies, including ISSA, ISACA and WiCyS. She is frequently seen on conference stages, having delivered insightful presentations on information security at over 50 events.
- Panel Discussion
- Happy Hour

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your regional cybersecurity community for learning and professional growth. Sign up today!
