Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, December 4, 2025
    8:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 3:00 pm

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.

    9:00 am
    OPENING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    10:00 am
    The Five People You Meet in Cybersecurity
    • session level icon
    speaker photo
    Founder & Fractional Chief Digital and Transformation Officer, Wired for Change
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Cybersecurity isn’t just about systems—it’s about people. Inspired by The Five People You Meet in Heaven by Mitch Albom, this talk uses storytelling and lived experience to reveal five personas you’re likely to meet on the path to cyber transformation: from the under-resourced IT leader to the recently breached, the skeptic exec to the inspired keener, and the vulnerable populations most at risk. Amy Yee blends empathy, strategy, and systemic insight to reframe how we see our roles—and each other—in this high-stakes, human-centered field.

    10:00 am
    Cyber Behavioral Profiling
    • session level icon
    speaker photo
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Session details to come.

    10:00 am
    Communicating Effectively to the Board
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Session description to come.

    10:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:00 am

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    11:00 am
    What's Up? Hot Topics and Recent Headlines in Privacy, Cyber, and AI
    • session level icon
    speaker photo
    Member, Data Privacy & Cybersecurity, Clark Hill Law
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    Join us for a lively and engaging session that cuts through the noise of today’s privacy, cybersecurity, and artificial intelligence news. In this fast-paced presentation, we’ll dive into ten of the most significant and talked-about headlines, exploring the real-world legal and compliance implications for your business.
    Our host will put an entertaining and perhaps comical spin on these headlines, framing complex issues in a way that’s a little more light-hearted. Then, our special guest will test their knowledge, attempting to identify each headline and provide a breakdown of why it matters—or why it doesn’t—for your organization. Get ready to sort through the hype and walk away with a clear understanding of the developments you need to know about right now.
    11:00 am
    Frame by Frame: Deepfakes in the Wild and in Court
    • session level icon
    speaker photo
    Network Intrusion Forensic Analyst, Denver Field Office, United States Secret Service
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    This presentation treats deepfakes as a dual problem: first, scalable social-engineering for fraud and extortion, second, evidentiary trust and admissibility.

    We outline an operational triage for scams and a forensic pipeline for courtroom authentication. On the technical side, we interrogate video at three layers: container metadata, codec bitstream, and sensor. For HEVC (H.265) we examine GOP layout and I/P/B distributions in contrast to AI Generated Images.

    AI-generated sequences are profiled for temporal inconsistencies, mouth-eye desynchrony, lighting and specular drift, unstable motion-vector fields relative to content, and atypical of camera originals. The goal is for a playbook for rapid scam mitigation and a repeatable, tool-logged, frame-by-frame method to either authenticate legitimate HEVC captures or challenge AI-assisted fabrications in court.

    We also cover tools and methodology used in deepfakes.

    11:00 am
    Micro Segmentation: What You Need to Know
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Session description to come.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    A Practical Guide to Data Protection for Enterprise AI Adoption
    • session level icon
    speaker photo
    Head of Enterprise Security, Box
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    As enterprises embrace the limitless possibilities of AI, we security professionals need to adapt to safeguard sensitive data. In this talk, we’ll unpack a few real-world patterns of how data leaks into or out of AI systems and offer a simple framework for threat-modeling enterprise AI usage without slowing down innovation.

    12:00 pm
    Leadership Excellence: Strategies to Enhance Productivity, Performance, and Collaboration
    • session level icon
    speaker photo
    CEO & Founder, Optimize You High-Performance Coaching
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    In today’s dynamic and diverse workplace, effective leadership requires more than just strategic thinking; it demands emotional intelligence, active listening, and the ability to inspire trust and collaboration. Leadership Excellence is a high-impact session designed to help leaders elevate performance while fostering a culture of belonging, collaboration, and well-being.

    This engaging presentation equips professionals with actionable strategies to lead with clarity, connection, and confidence. Participants will explore a proven framework for listening beyond words, building trust across teams, managing conflict with empathy, and driving meaningful results, without sacrificing their own health or values.

    Grounded in real-world application and supported by research, this session empowers leaders to balance professional excellence with personal well-being. Attendees will walk away with tools to minimize burnout, improve collaboration, and create psychologically safe environments where individuals and ideas thrive.

    Through interactive exercises, real-time feedback, and practical takeaways, participants will learn how to become the kind of leader who energizes people, unites diverse perspectives, and delivers consistent results. Whether you’re an executive, team lead, or rising professional, this session offers a blueprint for sustainable success and impactful leadership.

    12:00 pm
    Exploiting the Human Side: Phishing, Social Engineering, and Con Artists
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session description to come.

    12:45 pm
    Networking Break
    Registration Level:
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    The Last Human Advantage: How Persuasion, Trust, and Influence Win Budget and the Battle for Security
    • session level icon
    speaker photo
    Head of New Ventures Security Team, Walmart; Founder, CyberX
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Hackers don’t just exploit code, they exploit people. They use Cialdini-grade persuasion, authority cues, urgency, and trust triggers to get humans to click, comply, and reveal. In this provocative and practical session, former Fortune-1 cybersecurity and privacy executive Anthony Martin turns that playbook inside out—showing security leaders how to ethically apply those same influence principles to drive results in the boardroom instead of the inbox.

    Attendees will learn why persuasion works at a neural level, how to translate “attacker psychology” into ethical communication, and how to use those levers to win budget, accelerate adoption, and build departmental trust. Whether you’re a rising manager or a CISO in waiting, this session will give you the science-backed techniques to sell your strategy, earn executive confidence, and move the needle on both your program and your career.

    Key take-aways: 

    • Leverage “persuasion” or “influence” as the ultimate leadership differentiator
    • Transform technical expertise into influence that secures funding, drives adoption, and accelerates both organizational impact and personal career growth.
    1:00 pm
    You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    1:00 pm
    Cyber Intel Briefing
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    1:00 pm - 1:45 pm

    In an increasingly volatile world, this session offers a critical debrief on the most pressing global issues and their direct impact on organizational strategy and resilience. The talk will cover significant geopolitical developments, from shifting international power dynamics to the complex relationship between global events and digital security. It will also explore the dramatic changes in data privacy regulations driven by the rise of artificial intelligence, highlighting the new compliance and ethical responsibilities for all leaders. Finally, the presentation will provide a strategic framework for building resilience against modern threats, from digital attacks to supply chain disruptions. As we wrap up 2025 and start to think about 2026, attendees will leave with a clear understanding of the evolving landscape and a proactive plan to secure their operations in the year ahead.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    [Closing Keynote] Zero Trust and AI: Strengthening Security, Reducing Complexity, and Driving Innovation
    • session level icon
    speaker photo
    VP, CTO-in-Residence, Zscaler
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Businesses stand to benefit from AI in unprecedented ways, but only if IT and security leaders overcome transformation challenges. This includes implementing a modern zero trust architecture to protect data and users, embracing AI while managing its risks, and handling the technical and financial implications of ever-expanding environments. A risk-based approach to security ensures CIOs and CISOs deliver a secure, phased transformation.

    Join this session to:

    • Understand how zero trust and AI together, unlike firewalls, provide the strongest cyber defense by stopping threat actors from lateral movement within networks
    • Learn strategies for protecting AI applications developed internally for customers and employees, while preventing data leaks from public AI applications
    • Discover how AI is being leveraged for better cyber defense, in areas like segmentation, data classification and agentic operations
Exhibitors
  • Automox
    Booth: n/a

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • Cyera
    Booth: n/a

    Cyera is the data security company that gives businesses context and control over their most valuable asset: data. As a pioneer in Data Security Posture Management, Cyera instantly provides companies visibility over their sensitive data, context over the risk it represents and their security exposure, and automated remediation to reduce the attack surface and ensure operational resilience. We are redefining the way companies secure their data. Learn more at cyera.io.

  • Google Cloud
    Booth: n/a

    Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.

  • Huntress
    Booth: n/a

    Protect Your Endpoints, Identities, Logs, and Employees.

    The fully managed security platform that combines endpoint detection and response, Microsoft 365 identity protection, a predictably affordable SIEM and science-based security awareness training. Powered by custom-built enterprise technology for mid-market enterprises, small businesses, and the MSPs that support them and delivered by unrivaled industry analysts in our 24/7 Security Operations Center.

    By delivering a suite of purpose-built solutions that meet budget, security, and peace-of-mind requirements, Huntress is how the globe’s most under-resourced businesses defend against today’s cyberthreats.

    As long as hackers keep hacking, we keep hunting.

  • Tanium
    Booth: n/a

    Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).

    The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.

    For more information, visit: https://www.tanium.com.

  • Zscaler
    Booth: n/a

    Zscaler is universally recognized as the leader in zero trust. Leveraging the largest security cloud on the planet, Zscaler anticipates, secures, and simplifies the experience of doing business for the world’s most established companies.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Amy Yee
    Founder & Fractional Chief Digital and Transformation Officer, Wired for Change

    Amy E. Yee is a Fractional Chief Digital and Transformation Officer and the founder of Wired for Change, a podcast exploring digital impact and innovation. With more than eight years in senior executive roles, she has led enterprise-wide digital and cybersecurity transformations across sectors, including healthcare. Amy brings deep expertise in human-centered design, digital strategy, and product development, and has advised Fortune 500 companies, tech startups, and venture capital initiatives. A recognized speaker and thought leader, she also serves on nonprofit and academic boards, including Carleton University’s Systems and Engineering advisory board and the board of Kemptville District Hospital.

  • speaker photo
    Cameron H. Malin
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi

    Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.

    During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.

    He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
    Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).

  • speaker photo
    Myriah V. Jaworski, Esq., CIPP/US, CIPP/E
    Member, Data Privacy & Cybersecurity, Clark Hill Law

    Myriah Jaworski is a Member, Data Privacy and Cybersecurity, at Clark Hill Law. She represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.

  • speaker photo
    Jared Lobato
    Network Intrusion Forensic Analyst, Denver Field Office, United States Secret Service

    With a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification.  Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.

  • speaker photo
    Akhila Nama
    Head of Enterprise Security, Box

    Akhila Nama leads the Enterprise Security organization at Box where she oversees security design, strategy, architecture and risk management, with a focus on securing modern enterprise environments while driving business growth. With more than a decade of experience, Akhila has worked through multiple roles and domains, helping organizations navigate complex threats while building security programs and teams that scale.

  • speaker photo
    Eva Medilek
    CEO & Founder, Optimize You High-Performance Coaching

    Eva Medilek, the CEO & Founder of Optimize You High-Performance Coaching, is a multi-award-winning executive leadership coach, #1 best-selling author, renowned international speaker, and successful real estate investor.

    As a Brendon Burchard certified high-performance coach, ICF trained coach, master trainer, and inclusion communications trainer, Eva offers holistic leadership and collaborative communication coaching programs to individuals, groups, and organizations so they can achieve optimal performance in every area of their lives.

    To date, she has clocked over 1,200 coaching hours in her career. With her signature Human Relationship Style Assessment™, she helps her clients identify what’s stopping them so they can go from sabotaging habits and behaviors to creating the time and energy for what matters most to them—all while achieving higher levels of personal and professional success.

    She has also contributed to the #1 best-selling book, "Possibilities Unlimited," alongside luminaries Les Brown and Dr. Cheryl Wood.

  • speaker photo
    Anthony Martin, J.D.
    Head of New Ventures Security Team, Walmart; Founder, CyberX

    I’m Anthony Martin. I teach ethical persuasion and influence to cybersecurity and privacy leaders. I’m a Cialdini Institute certified practitioner and former Fortune-50 operator: led cybersecurity for Walmart International, served as Chief Privacy Officer at GAP, and taught Information Privacy & Data Security as a law professor. My current research explores influence, trust, negotiation, and influence—practical ways to help technical professionals be heard by boards and executives.

  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    With more than 25 years at the forefront of AI, cloud, enterprise technologies, cybersecurity, privacy, and risk management, VJ is a proven leader, trusted advisor, and strategic investor. He has a demonstrated history of building and scaling successful programs for global enterprises and transforming innovative concepts into impactful products.

    As a trusted Board advisor and subject matter expert, VJ guides organizations through intricate digital landscapes, fostering both innovation and strategic foresight. He brings particular value to Audit & Risk Management committees, where he rigorously evaluates and audits technology and cybersecurity organizations and programs, ensuring their veracity, efficiency, resilience, and strategic effectiveness.

    A sought-after advisor across expert, incubator, and accelerator networks, VJ empowers VC and PE firms with incisive market analysis, competitive intelligence, and opportunity mapping.

    VJ currently applies his diverse skills as the Founding Partner of CYFORIX, a strategic defense and technology risk advisory group, and as CEO of TORQE, a specialized firm focused on solution engineering and transformation.

  • speaker photo
    Sanjit Ganguli
    VP, CTO-in-Residence, Zscaler

    Sanjit Ganguli is VP, CTO-in-Residence at Zscaler, specializing in zero trust strategy, network transformation and digital experience monitoring engagements. For more than 20 years, he has worked in a variety of roles, including as a Gartner analyst and Deputy CTO at Riverbed. Sanjit was among the original analysts that coined and defined the Digital Experience Monitoring (DEM) and Artificial Intelligence for IT Operations (AIOps) markets. Sanjit also worked on the original SASE research. While at Zscaler, Sanjit has written three books on the topics of zero trust and SASE/SSE.

    Sanjit’s current focus is on helping customers along their zero trust transformation journeys, which includes advising on best practices, aligning to industry and analyst frameworks, and adopting zero trust while maintaining user experience.

Stay up to date and earn 6 CPEs

Join your cybersecurity peers for practical insights from industry thought leaders. Sign up today!