- Open Sessions
- Conference Pass
- SecureWorld Plus
- VIP / Exclusive
- Thursday, February 27, 202510:30 amExhibitor Hall openRegistration Level:
- Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 am[Panel] Compliance, Automation, and AIRegistration Level:- Open Sessions
11:00 am - 11:45 amSession description coming soon.
11:45 amNetworking BreakRegistration Level:- Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmDigital Forensics in Financial ServicesCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:- Open Sessions
12:00 pm - 12:45 pmSession description to come.
12:00 pmCyber Playbook: How to Train Your Business to Secure CodeTeam Leader of Information Security, Garmin InternationalRegistration Level:- Open Sessions
12:00 pm - 12:45 pmAttendees will learn how to integrate security into the development process while encouraging a security-driven mindset within the business. The session will explore strategies for training business teams to adopt security best practices and aligning security goals with business objectives.
The focus will be on STRIDE, a threat modeling methodology, and Threat Dragon, an OWASP tool that helps developers identify vulnerabilities and security risks early. These tools offer a cost-effective way to promote secure thinking across the business. Attendees will leave with practical knowledge on how to advocate for secure coding practices, collaborate effectively with developers, and meet project deadlines while ensuring robust security.
12:00 pm[Panel] Achieving Continuous Compliance: How to Make IT Work for Your OrganizationDirector of Security and IT, AutomoxCybersecurity and Compliance Advisor, GoogleSecurity GRC Lead, PlaidRegistration Level:- Open Sessions
12:00 pm - 12:45 pmIn today’s rapidly evolving regulatory landscape, maintaining continuous compliance is no longer a choice, but a necessity. This panel discussion brings together leading experts to explore how organizations can leverage IT to streamline compliance efforts, reduce risk, and achieve sustainable growth.
Discussion Points:
- The Evolving Compliance Landscape: Navigating the complexities of GDPR, CCPA, HIPAA, and other industry-specific regulations.
- Automation and Orchestration: Utilizing IT tools and technologies to automate compliance tasks, monitor systems, and ensure adherence to policies.
- Building a Culture of Compliance: Integrating compliance into organizational DNA through training, communication, and accountability.
- The Role of IT in Risk Management: Leveraging IT infrastructure and security protocols to identify, assess, and mitigate compliance risks.
- Best Practices for Continuous Compliance: Practical strategies and real-world examples of successful IT-driven compliance programs.
Join us for an engaging discussion on how to transform IT from a compliance burden to a strategic enabler.
12:45 pmNetworking BreakRegistration Level:- Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmAI and Security Awareness: Building a Future-Ready CultureSecurity Behavior and Culture Lead, TikTokRegistration Level:- Open Sessions
1:00 pm - 1:45 pmIn the era of rapid technological change, the intersection of artificial intelligence (AI) and cybersecurity presents both tremendous opportunities and complex challenges. This presentation will explore how AI is transforming security awareness programs and shaping security culture within organizations. Attendees will learn how to leverage AI to build a more resilient and proactive security culture that empowers individuals to become active participants in the fight against cyber threats. We’ll discuss the importance of human behavior in security, practical tools for implementing AI-driven training, and how to create a dynamic culture where employees continuously adapt to emerging threats.
1:00 pmPreventing, Detecting, Responding, and Recovering from a Ransomware AttackSr. Cybersecurity Consultant, Wilson CyberRegistration Level:- Open Sessions
1:00 pm - 1:45 pmSession description to come.
1:00 pmPrevent Emerging Threats in Financial Services with Proactive Data SecurityChief Product Officer, VotiroRegistration Level:- Open Sessions
1:00 pm - 1:45 pm2024 plagued financial services firms with some major breaches. Insider threats, third party risks, and typical threat actors all had hands in high-profile stories like the incidents at LoanDepot, SRP Federal Credit Union, and Navy Federal Credit Union.
In this session, you’ll get a quick overview of this emerging threat landscape and how data security solutions such as data loss prevention, data security posture management, and data detection and response can address the primary risks to your data (insider, third party, threat actors). You’ll come away from this session with the knowledge of how to use these solutions to achieve proactive data security that fits in a zero trust architecture and enables compliance for regulations like PCI DSS 4.0, ISO-27001, GDR, and more.
1:45 pmNetworking BreakRegistration Level:- Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmCybersecurity Reset: Navigating the FFIEC Cybersecurity Assessment Tool SunsetvCISO & Managing Director, Cyber Risk Opportunities LLCRegistration Level:- Open Sessions
2:00 pm - 2:45 pmAs the FFIEC Cybersecurity Assessment Tool (CAT) approaches its retirement in 2025, financial institutions are looking for guidance to fill the void it leaves with a practical and modern approach. This presents an opportunity for the use of a more robust and flexible framework. In this session, we will explore the implications of this change and why the NIST Cybersecurity Framework (CSF) Version 2.0 is an ideal replacement. Attendees will gain insights into the history and limitations of the FFIEC CAT, the background and core components of the NIST CSF, and how its risk-based, adaptable approach can enhance cybersecurity resilience. The session will include practical strategies for conducting a gap analysis, developing a tailored implementation plan, and integrating NIST CSF into existing programs.
2:00 pmThreat Intelligence Concerns for FinServCEO & Founder, Center for Threat IntelligenceRegistration Level:- Open Sessions
2:00 pm - 2:45 pmSession description to come.
2:00 pmMy Voice Is My Password: Security in the Age of AI Voice CloningCEO & Co-Founder, Adaptive SecurityRegistration Level:- Open Sessions
2:00 pm - 2:45 pmAs the financial industry becomes a prime target for deepfake-based fraud, staying ahead of sophisticated impersonation attacks has never been more critical. In this session, we’ll explore recent advancements in voice cloning and text-to-speech technologies, highlight real-world examples of successful (and foiled) manipulation, and discuss best practices for training employees to detect and mitigate deepfake threats. You’ll leave with actionable insights and strategies to fortify trust within your organization.
2:45 pmNetworking BreakRegistration Level:- Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmNavigating Third-Party Risk and Vendor ResilienceSVP, South Central Zone Regional Manager, Cyber Practice, MarshCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLPRegistration Level:- Open Sessions
3:00 pm - 3:45 pmSession description to come.
3:00 pmResponsible AI: Balancing Innovation and Ethics in CybersecuritySr. Risk & Security Manager, AmazonRegistration Level:- Open Sessions
3:00 pm - 3:45 pmThis presentation will draw on real-world examples and case studies to illustrate the challenges and opportunities in this rapidly evolving field. We will also discuss emerging trends such as federated learning and homomorphic encryption, which are reshaping the landscape of AI in cybersecurity.
- The role of AI in enhancing cybersecurity measures
- Ethical considerations in AI-driven cybersecurity solutions
- Implementing privacy-preserving AI techniques in threat detection
- Addressing bias and fairness in AI-powered security systems
- Regulatory compliance and AI governance in cybersecurity
3:00 pmProtecting the Bottom Line: Data Security Essentials for Financial ServicesTeam Manager, Product Marketing, ProofpointRegistration Level:- Open Sessions
3:00 pm - 3:45 pmIn the financial services sector, protecting sensitive data is critical to maintaining customer trust and regulatory compliance. Yet, financial and insurance industry experiences more data breaches than most other industries. According to 2024 Verizon DBIR report, financial services organizations were plagued by system intrusion attacks resulting from stolen credentials and human errors such as mis-delivery and misconfigurations.
Join us to hear our experts discuss the unique challenges of protecting information in the financial services industry and how Proofpoint Data Security helps organizations to:
- Prevent sensitive data exfiltration such as customer information
- Strengthen data posture to safeguard valuable data such as financial records
- Comply with strict regulations, such as PCI DSS
- Build insider threat programs
Bring your questions!
3:45 pmNetworking BreakRegistration Level:- Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pmReading the Tea Leaves: What to Expect from Your 2025 Cyber Insurance RenewalVice President, Cyber Liability, Woodruff SawyerFocus Group Leader, E&O, Cyber Risks, BeazleyCISO, The Anschutz CorporationAdjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & ForsterRegistration Level:- Open Sessions
4:00 pm - 4:45 pmThe claims environment remains fraught with cyber threats, particularly ransomware. At the same time, privacy concerns continue to escalate, with a heightened focus on data protection, biometric security, and non-breach privacy claims. Regulatory scrutiny from the FTC and State Privacy Regulators further emphasizes the need for robust cybersecurity measures.
To effectively mitigate risks, organizations must prioritize controls such as EDR, DLP, privileged account management, and technology product risk management. A proactive approach to third-party risk management and supply chain resilience is also essential. Culture and awareness training play a pivotal role in fostering a security-conscious workforce.
Maximizing cyber insurance efforts requires collaboration across departments. CISOs should engage with risk managers and legal teams to ensure alignment in coverage discussions and budget allocation. Cyber underwriting exercises can provide valuable insights for business impact assessments and audit committee reviews, fostering a shared understanding of risk and mitigation strategies.
4:00 pmCyber Intel Briefing: FinServCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:- Open Sessions
4:00 pm - 4:45 pmSession description to come.
- Adaptive SecurityBooth: n/a
Adaptive is building a platform that’s tailor-made for helping every company embrace this new era of technology without compromising on security.
- AutomoxBooth: n/a
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- CensysBooth: n/a
Censys is the one place to understand everything on the internet. We have built and operate the world’s largest internet scanning infrastructure and we empower organizations, individuals and security researchers by providing unparalleled visibility into the global internet landscape. We see more of the internet than anyone else, which gives us the most comprehensive internet visibility in the world. Our two main use cases are attack surface management and threat hunting with so many more on the horizon. Through our comprehensive internet data, we strive to enhance cybersecurity, facilitate data-driven decision-making, and reduce internet exposures for commercial and government organizations across the globe.
- ProofpointBooth: n/a
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- VotiroBooth: n/a
Votiro is Zero Trust Content Security and Data Detection & Response rolled into one seamless platform. With our proactive file-borne threat prevention, real-time privacy and compliance capabilities, and actionable data insights, our Data Security solution protects organizations from countless digital threats that pose unnecessary risks to your employees, your customers, and your reputation.
- Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.). - Reanna SchultzTeam Leader of Information Security, Garmin International
Reanna Schultz, from Kansas City, MO, holds both a Bachelor’s and Master’s degree in Cybersecurity. With over six years of professional experience, Reanna has contributed to various corporate environments, leveraging her expertise to strengthen cybersecurity practices.
Throughout her career, Reanna has worn many hats, including roles in Endpoint Security Engineering, Detection Engineering, and leading a Security Operations Center (SOC) team. In addition to her primary responsibilities, Reanna serves as an adjunct professor at the University of Central Missouri (UCM) and is also an entrepreneur.
Reanna is the founder of CyberSpeak Labs, a platform dedicated to fostering community engagement through collaboration. She hosts the podcast Defenders in Lab Coats, where she delves into cyber threats and occasionally invites passionate guests to share their insights.
Driven by her passion for cybersecurity, Reanna frequently travels to speak at events, sharing her industry knowledge and empowering others to improve their organizations' cybersecurity practices. - Tom BowyerDirector of Security and IT, Automox
Tom Bowyer is a versatile Security Engineer who enjoys working with engineering, product, and infrastructure teams to ensure safe and efficient code lands in production. He has extensive experience deploying, securing and breaking SaaS applications on different operating systems and cloud hosting providers. Tom also enjoys building and breaking CI/CD pipelines, and automating away security work with Python.
- Kenneth MorasSecurity GRC Lead, Plaid
Kenneth Moras is a recognized leader in the cybersecurity Governance, Risk, and Compliance (GRC) space, with extensive experience in building GRC teams from the ground up at Plaid and scaling large GRC programs at notable organizations such as Meta and Adobe. His expertise also extends to cybersecurity consulting for Fortune 500 companies during his tenure at KPMG. He holds various certifications, including CISSP, CISA, ISO 27001 LA, CDPSE, CEH, CHFI, and CCNA. Kenneth enjoys staying up-to-date with offensive strategies used by attackers and building proactive risk management programs that serve as business enablers.
- Melecia McLeanSecurity Behavior and Culture Lead, TikTok
Melecia McLean is a Security Behavior and Culture Lead at a leading tech organization, where she applies her expertise in human risk management, social engineering, and AI to develop and enhance a proactive security culture. She leads dynamic cybersecurity awareness programs that equip individuals to protect their data, fostering a culture of vigilance, adaptability, and resilience. Melecia focuses on bridging human behavior with technology to strengthen organizational security. A passionate advocate for diversity, she served as Managing Director of Girls in Tech - Houston, championing women’s leadership in cybersecurity and STEM. Melecia is also dedicated to empowering the next generation of kids to explore cybersecurity, ensuring a future of inclusive and accessible technology.
- Larry Wilson, CISSP, CISASr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Eric AvigdorChief Product Officer, Votiro
Eric Avigdor Is the Chief Product Officer for Votiro. He is a seasoned, innovative, and passionate Product Management executive with more than 20 years in the cybersecurity industry in both startups and large enterprise organizations. He leads the product organization at Votiro: defining the roadmap based on customer feedback and market needs.
- Glen SorensenvCISO & Managing Director, Cyber Risk Opportunities LLC
Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.
Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.
- Janet LawlessCEO & Founder, Center for Threat Intelligence
Janet is CEO and Founder of Center for Threat Intelligence. Janet established a team of intelligence experts to build a cutting-edge holistic threat intelligence program including assessments, consulting and training. Janet’s former leadership roles at Microsoft and Cisco, creating and managing global programs focused on compliance and security, in addition to her work at a cyber-security start-up, brings a wealth of knowledge in security services. Janet is currently the Chair for ASIS International Puget Sound Chapter, and former Committee Chair for Women in Security. She is Chair Emeritus for the Pacific Coast Analyst Roundtable and a former Board Member for the American Red Cross. She is also a member of InfraGard, the United States Secret Service Cyber Fraud Task Force and the Washington State Fusion Center.
- Brian LongCEO & Co-Founder, Adaptive Security
Brian is the CEO and Co-Founder of a Adaptive Security, where we build software to protect companies from new cyber threats like deepfakes, GenAI phishing, smishing and more. Today, Adaptive is growing fast, working with leading businesses like regional and national banks, leading tech and software companies, and critical health systems.
Brian is also the Co-Founder, Executive Chairman and Board Director at Attentive. Under Brian’s leadership, Attentive grew from Brian’s living room to:
• 8,000+ customers and hundreds of millions in annual revenue
• $850+ Million in venture capital raised over 6 financing rounds
• ~1,000 employees with offices all around the worldAttentive has been awarded as:
• Deloitte: The third fastest growing tech company in America (2021)
• Forbes: Top 10 private cloud companies globally (2022)
• G2: Top 100 Software products in the world (2023)
• Inc: Best Workplaces (2021)Previously, Brian co-founded and sold TapCommerce to Twitter, where he worked as a Senior Director.
- Shelly ThomasSVP, South Central Zone Regional Manager, Cyber Practice, Marsh
Shelly is the Southcentral Zone Regional Manager within Marsh’s Cyber Practice in Dallas, TX. Responsibilities include advising a number of Marsh’s clients across various industries on risk transfer solutions and helping clients tactically navigate the evolving cyber and technology landscape. Shelly strives to cultivate strong relationships with clients and markets.
- Shawn E. TumaCo-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP
Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.
- Sahil DhirSr. Risk & Security Manager, Amazon
As a Senior Manager at Amazon, I am experienced in ensuring regulatory compliance and cybersecurity through comprehensive product and process evaluations and have proactively managed risks in deploying generative AI systems. I am passionate about technology and building great products.
My core competencies include cybersecurity strategy, identity and access management, governance risk and compliance, cloud security, vulnerability management, data security, and cybersecurity frameworks. I have successfully built and launched GRC products at Amazon, where I also led the design and implementation of analytics, and tooling integration for GRC. I am passionate about empowering organizations and individuals to protect their data, privacy, and assets from cyber threats, and I enjoy coaching and mentoring others in this field.
- Itir ClarkeTeam Manager, Product Marketing, Proofpoint
I am an innovative product marketing and management professional with 20+ years of high tech and security industry experience. As a Product Marketing Group Manager at Proofpoint, my responsibilities include positioning and messaging of our Information Protection solutions, evangelizing our people-centric approach to data and cloud security, definition and execution of campaigns and promotions, and sales enablement. I work closely with product management, threat research, and corporate marketing to bring new data loss prevention, cloud security, and insider threat management capabilities to the market. I also collaborate with cloud security organizations such as Cloud Security Alliance and analyst firms on market research projects, conducting surveys to develop educational reports on data and cloud security trends and customer requirements.
As an OEM Marketing Manager at Brocade, I successfully developed go-to-market strategies and enabled sales through our major OEMs such as HP, Dell and Hitachi Data Systems. My responsibilities included product positioning and messaging for joint solutions as well as launch campaigns and sales programs. In my role as a Cisco Sr. Product Manager, I worked closely with engineering, integration partners, and vendors to bring new server products to market. I also collaborated on multiple market research projects, conducting customer interviews, surveys and competitive analysis as well as building financial models for new products and services. I am a data-driven decision maker, adept at relationship building and skilled at communicating technical and strategic vision to customers, analysts, partners and other stakeholders.
- David AndersonVice President, Cyber Liability, Woodruff Sawyer
David focuses on complex cyber, privacy, technology, and professional liability issues and is a dedicated and fierce advocate for his clients.
- Ashley HellerFocus Group Leader, E&O, Cyber Risks, Beazley
Ashley is responsible for the management of the Technology Liability portfolio at Beazley, a leading London-based specialty insurer. Prior to her time at Beazley, Ashley was an underwriting manager at AIG, where she underwrote Cyber for National Accounts.
- Sam MasielloCISO, The Anschutz Corporation
Sam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to The Anschutz Corporation, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the protection of employee, consumer, and customer data for all of the organization's clients, which included many Fortune 500 companies.
Sam has also been the Chief Security Officer, Head of Application Security, and Head of Security Research at companies such as Groupon, Return Path, and McAfee. He currently serves as Director-at-Large of The Coalition Against Unsolicited Commercial Email (CAUCE), National Advisory Board Member for SecureWorld, and is an Executive Board Member of Colorado Cyber. He has previously served as a member of the Board of Directors for the Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG), the Steering Committee of the Online Trust Alliance (OTA), and a member of the Anti-Phishing Working Group (APWG).
- Violet SullivanAdjunct Professor, Baylor School of Law; AVP, Cyber Solutions Team Leader, Crum & Forster
Violet Sullivan leads cyber consulting services at Crum & Forster. She works with insurance carriers, trade associations, and individual business clients from around the world providing expert guidance on cybersecurity threat management and response. She represents Crum & Forster within the legal, insurance, and risk management channels to develop long-term relationships, recurring revenue, and new business growth. Ms. Sullivan is a licensed attorney in Texas and Pennsylvania and a Certified Information Privacy Professional (CIPP/US), with her JD and MBA degrees from Baylor University. In addition to her full-time role, Violet serves as a professor of Cybersecurity & Privacy Law for Baylor Law School’s LL.M. Degree in Litigation Management, the first of its kind nationwide. Her diverse practice experience at both the individual and policy levels has prepared her for developing new tools and approaches to solving what is fast-becoming a pervasive and costly challenge in modern industry: how to respond to a cybersecurity incident.
Early in her career, Violet worked on the incident responses for some of the largest and most notable data breaches to date, including: Home Depot, Sony, and Anthem. Her experience in managing scaled breach responses led to her expertise and proficiency in proactively preparing organizations for cyber incidents. In the past eight years, she has facilitated over 450 cyber incident simulations (tabletops) for public and private sector companies, including many Fortune 100 companies.
As a cybersecurity and privacy attorney, Violet provides consulting services to respond to the needs of various cybersecurity programs. She reviews and develops customized incident response plans to ensure organizations are prepared to respond efficiently and effectively to a data breach. Violet also helps improve internal coordination by facilitating customized tabletop simulations focused on "pressure-testing" an organization's incident response procedures and protocols. Each of these customer-facing services mentioned has been built and developed for the purpose of creating long-standing relationships that turn to Violet for guidance, referrals, questions, and future projects.
As a cybersecurity and privacy professor, Violet developed the entire curriculum for an innovative course on cybersecurity and privacy law for licensed attorneys working toward their LL.M. degree. The specific focus on litigation management has made Sullivan’s course and her lecture series uniquely valuable to experts across the United States.
- Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
- VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.
With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.
VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.
VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.
• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.