Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, May 17, 202310:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 4:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 amOPENING KEYNOTERegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
12:00 pmReducing Complexity While Increasing Data Protection in Financial ServicesRegistration Level:Open Sessions
12:00 pm - 12:30 pmFinancial service firms have a responsibility to provide fool-proof security to instill faith in customers, and send a strong message that combating threats is a prime objective. They cannot afford to be complacent, especially when the majority of information produced or utilized in financial services is private and sensitive, not to mention highly regulated. All this adds up to make cybersecurity vital to business.
Building sustainable ongoing security starts with all-inclusive optics into the sensitivity of data and automated organization-wide control of it. Organizations can assemble all this with multiple solutions, but doing so is time-consuming, expensive, and can be fraught with integration woes.
There’s a better way. This session takes a deep dive into reducing complexity in sensitive and private data protection, including:
- How to dig deep across the enterprise into every place sensitive data may be stored, from data lakes to endpoint devices
- The benefit of automatic policy-specific remediation, including masking, redaction, deletion, and encryption
- How to scale data protection and compliance as data volumes increase
12:00 pmBEC Attacks: The Stealthiest and Most Lucrative ThreatRegistration Level:Open Sessions
12:00 pm - 12:30 pm12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:00 pmDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Open Sessions
1:00 pm - 1:45 pm1:00 pmTop 10 Activities to Avoid Identity Theft / Financial FraudRegistration Level:Open Sessions
1:00 pm - 1:45 pmIn the increasingly online world we live in, many people are concerned about having their identity stolen. A few simple precautions can go a long way to avoiding the hassle of identity theft. Join us as we explore ten action steps that we as consumers can take to lower the likelihood and impact of identity theft.
Presentation Level:
GENERAL (InfoSec best practices, trends, solutions, etc.)1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:00 pm[Panel] CISOs in Financial ServicesRegistration Level:Open Sessions
2:00 pm - 2:45 pmSession description and speaker lineup to come.
2:00 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
2:00 pm - 2:45 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
3:00 pmRansomware: How to Stay out off the Front PagesRegistration Level:Open Sessions
3:00 pm - 3:45 pm3:00 pmSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Open Sessions
3:00 pm - 3:45 pmKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
4:00 pmDeveloping a Crisis Management PlaybookRegistration Level:Open Sessions
4:00 pm - 4:45 pmWhen a data breach or other cyber incident happens, having a plan in place can mean the difference between a quick recovery and unwanted headlines and irreparable harm to stakeholder trust.
4:00 pmA Look into Third-Party Risk Management (TPRM) for FinTechs and StartupsRegistration Level:Open Sessions
4:00 pm - 4:45 pmKey Take-away:
How to navigate the establishment of a TPRM program for FinTechs and Startups with simplicity.You have a great idea, you pitch it and the investors love it, you received your first (or second) round of funding, but now you are left stumped. A sponsor is asking you how are you managing the risk of your third parties. You think, I don’t have any “third parties” then you remember your cloud service provider, you connected APIs, the applications your employees (hopefully) installed via legitimate channels, the open-source software used in the development, and all the unknowns. You are left thinking you may have just opened Pandora’s box. How do you navigate this process, now, tomorrow, and into the future?
Presentation Level:
GENERAL (InfoSec best practices, trends, solutions, etc.)
- Panel Discussion

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!
