Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, April 29, 202610:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 5:00 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.
11:00 am[Opening Keynote] The Agentic Frontier: Defending the FutureFocus Areas: AI; Agentic AI; Machine Identity; Cyber ResilienceAmericas Financial Services Executive Trust Lead, Office of the CISO, Google CloudTechnical Solutions Lead - Financial Services, Office of the CISO, Google CloudRegistration Level:
Open Sessions
11:00 am - 11:45 amThe financial sector is entering a transformative Agentic Era, where AI moves beyond simple assistants to take autonomous actions. This shift coincides with the rise of AI-driven impersonation techniques that may elude traditional detective controls employed by cybersecurity teams.
In this keynote, Marina Kaganovich and Aaron Sutton from Google’s Office of the CISO outline a roadmap for securing this new frontier. They will explore the role of AI governance, how to modernize the SOC using AI-first defense capabilities, and empower human analysts to focus on what really matters.
The session delves into the critical concept of Machine Identity—treating AI agents as distinct digital actors with dedicated permissions and audit trails. Attendees will gain a strategic framework for building a resilient, autonomous enterprise prepared for the next generation of digital threats.
11:45 amNetworking BreakRegistration Level:
Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
12:00 pmThe Pocket-Sized Threat: Orchestrating Adversarial AI Workflows on a Local LaptopFocus Areas: Adversarial AI, Model Context Protocol (MCP), Local LLM, Agentic Workflows, Red Teaming, Open Source SecurityNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceRegistration Level:
Open Sessions
12:00 pm - 12:45 pmThe barrier to entry for high-level cyber operations has shifted. No longer requiring massive server farms, sophisticated “agentic” threats can now be orchestrated entirely from a single consumer-grade laptop. This session, delivered by a US Secret Service Network Intrusion Forensics Analyst, moves beyond the theory of “AI threats” and into the practical mechanics of how adversaries are using open-source tools to automate the kill chain.
This is a lab-heavy session designed to show you exactly how an adversary builds a local, autonomous hacking station. We will walk through the deployment of an Open Source Large Language Model (LLM) and demonstrate the power of the Model Context Protocol (MCP)—a protocol that serves as the “USB port” for AI, allowing models to interact seamlessly with local files, secure APIs, and system tools.
Attendees will participate in a live walkthrough of:
- Local LLM Deployment: How to run state-of-the-art models (like Llama 3 or Mistral) locally to avoid detection and maintain data privacy.
- The Power of MCP: Using the Model Context Protocol to grant an LLM “hands” (the ability to read logs, query databases, and execute scripts).
- Agentic Workflows: Moving from a simple chatbot to an “Agent” that can reason, plan multi-step attacks, and pivot autonomously based on forensic output.
- Defensive Implications: How to detect and defend against locally hosted, agentic adversarial activity that leaves a minimal network footprint.
This session is designed for security professionals who want to understand the “adversarial edge” of AI.
12:00 pmFrom Compliance to Confidence: Turning Cyber Risk into ROIFocus Areas: GRC, Compliance, Security Audit, Security ROI, Cloud SecuritySr. Manager, IT Platform Services, CircleRegistration Level:
Open Sessions
12:00 pm - 12:45 pmMost organizations treat cyber risk as a compliance checkbox—but real business resilience requires measurable action. In this session, Dr. Fredrick Dande, PhD, will show IT and business leaders how to transform cyber and IT risk into quantifiable business value.
Attendees will leave with a clear, actionable framework to turn cyber and IT risk into measurable business value and confident decision-making.
12:00 pmStrengthening Cyber Resilience in Financial Services with Deep ObservabilityFocus Areas: Cyber Resilience; GRC; Compliance; Audit; PCI DSS 4.0; DORASr. Technical Product Marketing Manager, GigamonRegistration Level:
Open Sessions
12:00 pm - 12:45 pmFinancial institutions are under pressure to defend against sophisticated cyber threats, satisfy expanding regulatory mandates, and keep digital banking, payments, and trading platforms always on. Yet the greatest blind spots often sit in encrypted, lateral (East-West), and hybrid cloud traffic—exactly where attackers hide and where traditional security tools lack network visibility.
Join this session to learn how banks, insurers, and fintechs strengthen security, improve compliance and audit readiness, and increase operational efficiency without ripping and replacing existing tools. We’ll explore real-world use case that shows how to expose hidden threats in encrypted traffic, validate PCI DSS 4.0 and DORA controls, and reduce MTTR across hybrid environments so you can protect sensitive financial data and keep critical services performing at scale.
12:45 pmNetworking BreakRegistration Level:
Open Sessions
12:45 pm - 1:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
1:00 pmThe Data War for FinServ Has BegunCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Registration Level:
Open Sessions
1:00 pm - 1:45 pmThe Financial Services sector is living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how wealth is managed, transactions are executed, and capital is protected. In this new era, your most valuable asset—customer trust and financial data—is under constant threat, not just from cybercriminals targeting your vaults, but from the rapid digitization of your own banking infrastructure.
In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots financial institutions face as they race to adopt Fintech innovations and migrate legacy systems to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional fraud controls, how AI is both a weapon for sophisticated financial crimes and a shield for defense, and why the cloud isn’t inherently secure for sensitive financial records—unless you make it so.
Whether you’re a CEO, CISO, or banking leader, this session will empower you with actionable frameworks to:
- Understand how AI and cloud reshape the cyber threat landscape for banks, insurers, and investment firms.
- Identify financial data exposure risks that live outside your control—and how to maintain sovereignty over critical assets.
- Shift from a legacy perimeter model to identity- and data-centric security to protect the modern financial ecosystem.
- Build an AI-aware security posture that accelerates—not blocks—Fintech innovation and algorithmic advantage.
- Win the new war for data ownership, visibility, and control in a highly regulated global market.
The convergence is already here. The question is, are you investing in resilience, or banking on luck?
1:00 pmTop 10 Most-Needed AI Skills in Cybersecurity – "Draft Day" to Accelerate Your CareerFocus Areas: AI; Cybersecurity Skills; Career Development; Professional Growth; Workforce EvolutionLead Information Security Analyst, TIAARegistration Level:
Open Sessions
1:00 pm - 1:45 pmThe cybersecurity talent market is officially on the clock. As AI-driven threats—from agentic malware to deepfake identity deception—move from theory to the frontline, the demand for AI-fluent defenders has reached a fever pitch. But which skills carry a first-round pedigree, and which are just pre-season hype?
In this high-energy session, join “Commissioner” Charles Hartley for the ultimate AI Cybersecurity Career Draft. Based on extensive research from TIAA’s Cybersecurity Awareness Team, we rank the Top 10 “franchise-player” skills—including Adversarial ML, Agentic Governance, and LLM Auditing—that are redefining the SOC.
Whether you’re a veteran or a rookie, you’ll leave with a professional scouting report on the most in-demand competencies and a winning playbook to secure your spot on the industry’s elite roster.
With the next pick in the AI career draft… will you be the one to change the game?
1:00 pm[Fireside Chat] 7 Questions, No Safety Net: Navigating AI Law with Jordan FischerFocus Areas: Privacy; GRC; AI Governance; Cyber Law; Data ProtectionFounding Partner & Owner, Fischer Law, LLCDigital Event Director, SecureWorldRegistration Level:
Open Sessions
1:00 pm - 1:45 pmSeven questions. Zero fluff. Unlimited insight. We’ve invited renowned privacy powerhouse Jordan Fischer to sit in the hot seat and answer the toughest questions regarding AI laws and governance in 2026. Jordan brings her unique perspective as a legal architect who understands both the code and the courtroom. This isn’t just a discussion on compliance; it’s a strategic roadmap for FinServ leaders. Watch as we deconstruct the EU AI Act, data lineage, and the legal tightrope of algorithmic bias in a session designed to trigger the questions you didn’t know you needed to ask.1:00 pmHunting at Internet Scale: Exposing Multi‑Vector Financial Threat Campaigns via DNS Threat HuntingFocus Areas: AI Phishing; Threat Hunting; Digital Trust; VisibilitySr. Director, Global Cybersecurity Engineering, InfobloxRegistration Level:
Open Sessions
1:00 pm - 1:45 pmModern threat actors targeting financial services no longer rely on a single delivery method. Instead, they orchestrate sophisticated, multi‑channel campaigns that blend AI‑driven phishing, search abuse, push notifications, and trusted infrastructure to exploit customer trust, financial brands, and exposed enterprise systems at scale. In this deep‑dive session, we examine what global DNS query data reveals about today’s financial threat ecosystem. Using real‑world examples observed at Internet scale, we explore how AI has reshaped phishing against banks and insurers, why abandoned and parked domains continue to fuel fraud and credential theft, how search poisoning and brand abuse undermine digital trust, and where misconfigurations like dangling CNAMEs expose financial environments to risk. Attendees will gain practical insight into how these techniques surface in DNS data and how DNS‑based visibility can uncover attacker behavior earlier in the kill chain.
1:45 pmNetworking BreakRegistration Level:
Open Sessions
1:45 pm - 2:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
2:00 pmCyber Intel Briefing: FinServFocus Areas: Cyber Defense; Ransomware; Operational Resilience; Critical Infrastructure; AI; GeopoliticalCNN Military Analyst; U.S. Air Force (Ret.); Founder & President, Cedric Leighton Associates, LLCFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)Registration Level:
Open Sessions
2:00 pm - 2:45 pmFinancial Services is no longer just a facilitator of global trade; it is the primary battlefield of modern conflict. This session connects the dots between global geopolitical volatility and the immediate risks to market liquidity, institutional integrity, and consumer trust. We will examine how shifting alliances and conflicts involving major powers like Russia, China, and the EU are reshaping the cyber threat landscape—specifically targeting cross-border payment systems, central bank digital currencies (CBDCs), and the global fintech supply chain.
The discussion will pivot to the “internal” evolution of the sector, analyzing the rapid integration of Generative AI in algorithmic trading and automated underwriting, and the resulting regulatory and privacy minefield. From state-aligned actors seeking to destabilize national economies to sophisticated ransomware syndicates targeting the high-frequency trading floor, we will profile the adversaries threatening the global fiscal order.
Join us for a 2026 outlook that moves beyond mere regulatory compliance, offering a battle-tested framework for maintaining operational resilience and capital stability in the face of unprecedented global instability.
2:00 pmSpeaking the Language of Risk: Bridging the CISO-CFO DividevCISO, Cyber Risk Opportunities LLCFormer CFO; Founder of kept.proRegistration Level:
Open Sessions
2:00 pm - 2:45 pmFor years, the relationship between security leadership and finance has been defined by a fundamental “language barrier.” While the CISO talks in vulnerabilities and threat vectors, the CFO thinks in terms of ROI, capital allocation, and fiscal resilience. This session moves beyond the myth that “security is too expensive” to address the real issue: a lack of shared vocabulary. Join a veteran vCISO and a seasoned CFO for a candid conversation on how to align technical requirements with business objectives. Attendees will learn how to transform security metrics into financial risk data that commands boardroom respect and secures long-term investment. The problem isn’t the budget; it’s the dictionary.
2:00 pm[Panel] Trust in the Crosshairs: Defeating Social Engineering and Strengthening Your PostureGlobal Head of Sales Engineering, DoppelCloud Security Architect, Google CloudChief Security Advisor, TaniumHead of Threat Intelligence, Sublime SecurityRegistration Level:
Open Sessions
2:00 pm - 2:45 pmThe financial sector remains the premier target for social engineering, but the tactics are shifting from simple phishing to AI-driven deception. As deepfakes and sophisticated business email compromise (BEC) evolve, traditional awareness training is no longer enough to protect the perimeter.
Join experts from Google Cloud Mandiant, Doppel Security, and Sublime Security for a tactical breakdown of the social engineering landscape. We’ll examine the trajectory of modern threats—from the “long-con” classics that still work to the high-tech exploits of tomorrow.
Key discussion points:
-
The AI Evolution: How attackers leverage voice cloning and synthetic identities to bypass MFA
-
FinServ Under Fire: Why financial institutions are the primary laboratory for new social engineering techniques
-
Modern Defense: Shifting from reactive training to proactive detection and behavioral signals
-
Resilient Culture: Building a security posture where every employee acts as a sophisticated sensor against fraud
Equip your organization to intercept the next generation of attacks before the first click occurs.2:45 pmNetworking BreakRegistration Level:
Open Sessions
2:45 pm - 3:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
3:00 pmAlways Listening, Always Connected: Why Smart Home AI Ecosystems Pose Enterprise and National Security RisksFocus Areas: IoT; Remote Work Security; Shadow IT; Data Privacy; AI-Powered Smart DevicesSr. Information Security Engineer, Reinsurance Group of AmericaRegistration Level:
Open Sessions
3:00 pm - 3:45 pmAI-powered smart home devices continuously collect, analyze, and transmit voice, behavioral, and environmental data to deliver seamless personalization. However, as the boundaries between home and office dissolve in a remote and hybrid workforce, these consumer AI ecosystems have quietly expanded the modern enterprise attack surface.
This session examines how AI-driven household systems process sensitive data from always-on microphones and biometric inference to multi-device sensor fusion and cloud analytics and identifies systemic failure points across the data lifecycle, including retention, aggregation, and third-party sharing. We explore the “Household Pivot Risk”: how persistent connectivity and opaque AI data flows can enable adversaries to traverse from consumer environments into corporate networks, regulated industries, and, at scale, broader national security contexts, particularly across critical infrastructure sectors.
Attendees will gain a practitioner’s perspective on the cascading risks of behavioral inference, shadow data perimeters, and AI supply-chain opacity. The session will provide actionable strategies for applying privacy-by-design and engineering-first controls to mitigate cross-domain data leakage and strengthen enterprise resilience in an increasingly AI-enabled society.
3:00 pm[Panel] Calculated Risk: The FinServ 'Would You Rather' Face-OffFocus Areas: FinServ; BEC attacks; Identity Management; Vendor Risk; AI; Operational SecurityDirector, Technology Risks and Controls - US Card and International Business and Payments, CapitalOneChief Information Security and Privacy Officer, The Anschutz CorporationRegistration Level:
Open Sessions
3:00 pm - 3:45 pmIn the hyper-connected, regulation-heavy world of financial services, a single second of latency costs millions, and a single breach costs trust. There are no “safe bets”—only calculated risks. Join us for an unscripted, high-energy session where top Financial Sector CISOs face off on the industry’s most brutal hypothetical scenarios.Moderated in a rapid-fire game show format, our panelists will be presented with unforgiving “Would You Rather” choices ranging from catastrophic wire fraud and third-party failures to SEC disclosure dilemmas and crippling legacy mainframe vulnerabilities. They won’t just pick a side; they have to defend it against the clock—and each other.Attendees will gain a unique window into the minds of security leaders, understanding how they balance friction-free customer experience against fraud controls, and rapid fintech innovation against strict regulatory compliance. Come ready to vote on who makes the best investment in a bad situation.3:00 pmThe Digital Path to Physical Harm: Profiling 'Cyber Violence' in the Modern AgeFocus Areas: Cyber Violence; Violence-as-a-Service; Digital Extortion; Digital Behavioral CriminalisticsCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiRegistration Level:
Open Sessions
3:00 pm - 3:45 pmThe line between a digital threat and a physical attack has officially vanished. From the targeted murder of executives to “Violence-as-a-Service,” the digital footprint is no longer just a trail of data—it is a measurable pathway toward intended harm. In this session, former FBI Profiler Cameron Malin introduces the concept of Cyber Violence, exploring how physical atrocities are now enabled, rehearsed, and amplified through digital systems.
Attendees will get an inside look at Digital Behavioral Criminalistics (DBC), a revolutionary forensic discipline that merges behavioral science with digital forensics. Learn how to reconstruct user thought processes and identify the “pre-attack” indicators hidden within digital media before the threat transitions from the screen to the street.
3:00 pmYour Internal AI: Empowering Innovation While Reducing Inadvertent Insider ThreatsFocus Areas: AI Security & Governance; Insider Risk Management; Data Privacy & ComplianceSr. Director, Cyber Security, Acumatica, Inc.Registration Level:
Open Sessions
3:00 pm - 3:45 pmThe explosive adoption of generative AI and large language models (LLMs) has transformed how organizations work, enabling employees at all levels to accelerate tasks, generate insights, and drive innovation. Yet this democratization of AI potentially introduces a significant and often overlooked risk: inadvertent insider threats.
This presentation examines how the convenience of “unsubscribed” mainstream AI tools has dramatically increased the attack surface for data exfiltration through non-malicious insider actions. We will explore real-world consequences, regulatory implications, and the growing awareness gap that leaves even sophisticated organizations vulnerable.
The core message is one of empowerment rather than restriction: organizations can and should provide their teams with the full power of state-of-the-art LLMs without compromising security. “Your Internal AI” introduces a secure, enterprise-ready alternative that enables seamless use of mainstream models while automatically safeguarding sensitive information.
Through intelligent pre-processing, redaction, anonymization, and policy enforcement, sensitive data is protected before it ever leaves the organization’s control, ensuring compliance and preserving privacy.
Attendees will see this solution in action through a live demonstration, illustrating how users can interact naturally with powerful LLMs in everyday business related activities, while the system transparently secures confidential content in real-time.
By the end of the session, participants will understand not only the risks posed by unchecked AI usage but also how to deploy “Your Internal AI” as a strategic enabler: delivering the productivity gains of cutting-edge AI to every employee, securely and responsibly.
3:45 pmNetworking BreakRegistration Level:
Open Sessions
3:45 pm - 4:00 pmVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
4:00 pm[Closing Keynote] Graph vs. Noise: Defending Against Modern Social Engineering AttacksFocus Areas: Social Engineering; Deepfakes; Executive Impersonation; Security Awareness Training; Endpoint ProtectionField CTO, DoppelRegistration Level:
Open Sessions
4:00 pm - 4:45 pmAI-powered attackers now operate across social platforms, domains, messaging apps, and ads simultaneously, creating complex deception campaigns that overwhelm traditional security tools with alerts but little actionable insight.
In this keynote, Dylan DeAnda (Field CTO, Doppel) explores how graph-driven intelligence connects signals across infrastructure, identities, and platforms to expose entire attacker ecosystems rather than isolated threats. Through real-world examples—including fraud campaigns, cloned login infrastructure, and executive impersonation—the session shows how organizations can move from reactive alerts to coordinated disruption, reducing response times from days to hours and turning intelligence into measurable risk reduction.
- DoppelBooth: n/a
Doppel is the social engineering defense platform using AI to fight AI. Built to outpace and overpower your would-be attackers, our sophisticated AI-forensics see attacks coming and crush them at their source. We safeguard every channel and move faster than attack speed. With intelligence that constantly compounds, we’re perpetually at the forefront of social engineering defenses.
We work relentlessly to defend your brand, people, and future from whatever comes next in social engineering.
- GigamonBooth: n/a
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures. The result: modern enterprises realize the full transformational promise of the cloud. Gigamon serves more than 4,000 customers worldwide, including over 80 percent of Fortune 100 enterprises, nine of the 10 largest mobile network providers, and hundreds of governments and educational organizations worldwide. To learn more, please visit gigamon.com.
- Google Cloud SecurityBooth: n/a
Google Cloud Security provides organizations with leading infrastructure, platform capabilities and industry solutions to help them solve their most critical business problems. Google Cloud Security helps customers protect their global operations with solutions such as zero trust security, application and data protection, fraud prevention, and threat detection and response.
- InfobloxBooth: n/a
Infoblox unites networking and security to deliver unmatched performance and protection for a world that never stops. By providing real-time visibility and control over who and what connects to the network, we use intelligent DNS and user context to stop threats other solutions will miss, enabling organizations to build safer, more resilient environments. We’re continually supporting more than 13,000 customers—including 92 of Fortune 100 companies, as well as emerging innovators—by building the brightest, most diverse teams and by thoughtfully engineering intelligent networking and security solutions for an increasingly distributed world.
- Sublime SecurityBooth: n/a
Sublime is the new standard for email security. Not just another black box, our AI-powered detection engine detects and prevents email attacks, so security teams can spend less time on email-originated incidents.
- TaniumBooth: n/a
Tanium defends every team, endpoint and workflow against the largest attack surface in history by delivering the industry’s first convergence of IT management and security operations with a single platform under a new category, Converged Endpoint Management (XEM).
The integrated offering links IT operations, security and risk teams from a single pane of glass to provide a shared source of truth, a unified set of controls, and a common taxonomy that brings together siloed teams for a shared purpose—to protect critical information and infrastructure.
For more information, visit: https://www.tanium.com.
Marina KaganovichAmericas Financial Services Executive Trust Lead, Office of the CISO, Google CloudMarina engages Google Cloud’s financial services customers in the Americas on security topics throughout their cloud journey, focusing on regulatory compliance, risk management, governance and oversight, cybersecurity and privacy.
Prior to joining Google, Marina held Legal and Compliance roles on Wall Street, overseeing the broker dealer compliance program at Thomson Reuters (now Refinitiv), leading US Compliance for the Technology, Human Capital Management and Corporate Services divisions at Goldman Sachs, and most recently, running the Digital Compliance team at BNP Paribas where she specialized in advising on emerging technologies including AI/ML and digital assets, and oversaw programs related to cybersecurity, data privacy, and cloud digital transformation initiatives.
Aaron SuttonTechnical Solutions Lead - Financial Services, Office of the CISO, Google CloudAaron works with large financial institutions in North America, Europe, and the UK to ensure they are able to safely and securely use Google Cloud for their critical workloads. Aaron has significant experience in the implementation and configuration of Google Cloud security products, and leads the development of security artifacts to meet stringent customer requirements. Aaron has been at Google for seven years, beginning in the Professional Services Organization, specializing in security. Prior to Google, Aaron worked as a data scientist in Cyber Risk at Deloitte.
Aaron also holds a PhD in experimental condensed matter physics from the University of Toronto, in Toronto, Ontario, and a Bachelor of Science degree in Engineering Physics from Queen’s University in Kingston, Ontario.
Jared LobatoNetwork Intrusion Forensic Analyst, Denver Field Office, United States Secret ServiceWith a tenure spanning 15 years in law enforcement and digital forensics, Jared Lobato's journey led in his current role as a Network Intrusion Forensic Analyst with the United States Secret Service. This position allows him to dig into the intricacies of cyber-crime, encompassing activities such as digital forensic analysis, mobile data recovery, and malware analysis/identification. Jared supports various local, state, and federal agencies, bringing to the table his expertise in both detailed lab evaluations and on-the-ground analysis of computer systems and networks. Internationally, Jared has volunteered across borders with the State Department, teaching on subjects like cyber exploitation in El Salvador, network investigations in Mongolia and digital evidence for judges in Hungary. A consistent thread in his work has been his focus on financial crimes, to include network intrusions and skimming.
Fredrick Dande, PhDSr. Manager, IT Platform Services, CircleDr. Fredrick Dande is a senior IT platform manager and doctoral scholar with more than 15 years of leadership experience deeply rooted in highly regulated financial services environments spanning modern fintech, global tax, wealth management, and banking. Currently serving as the Sr. Manager of IT Platform Services at Circle Internet Financial, he manages enterprise AI governance within the ITSM platform strategy for global 24x7 operations. As Circle’s ITSM AI Ambassador, he partners directly with Security, Legal, and Compliance to ensure the scalable and ethical adoption of AI assisted automation.
Dr. Dande’s career is defined by his ability to bridge the gap between complex infrastructure management and executive business strategy. Prior to Circle, he served as IT Director for Global Tax at Ernst & Young (EY), where he led ITSM modernization for over 10,000 global users, improving SLA compliance by 20%. His extensive financial sector tenure also includes Technical Services leadership at Janney, where he oversaw multi-million-dollar IT budgets and managed critical Disaster Recovery data center migrations, as well as NOC Management for PFFCU. Throughout roles at Comcast and PHH, he built resilient operational frameworks, championing rigorous "5 Whys" root-cause analysis to mitigate high-severity incidents.
A dedicated educator, Dr. Dande has over 10 years of college-level teaching experience as an Adjunct Professor, specializing in Security Essentials, Cloud Computing, and Disaster Recovery. He recently completed his PhD in Technology Management from Indiana State University, focusing his research on CMDB adoption within complex IT environments. A certified PMP and ITIL practitioner, Dr. Dande is recognized for his ability to translate high-velocity technical challenges into clear, actionable, ROI-based risk frameworks that empower executive decision-making.
Javier InclanSr. Technical Product Marketing Manager, GigamonJavier Inclan is an experienced information security specialist and technologist with more than 20 years of expertise. Throughout his career, he has held key positions in professional services, SOC incident response, and security solutions architecture at leading companies such as McAfee, VMware, and Cisco. He is dedicated to educating clients on how to mitigate emerging threats using the latest technology. Javier has also contributed to various YouTube technical channels, blogs, and publications, focusing on technology adoption in cloud architectures and cybersecurity operations.
Dr. Eric Cole, DPSCybersecurity Expert; Author of "Cyber Crisis" and "Online Danger"Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
Charles HartleyLead Information Security Analyst, TIAACharles Hartley is a lead information security analyst with TIAA. His focus is on researching and creating compelling AI/cybersecurity content. He has a master's degree in business administration and journalism, and he has 30-plus years in the high-tech industry.
Jordan FischerFounding Partner & Owner, Fischer Law, LLCJordan L. Fischer, founding partner and owner of Fischer Law, LLC, is a self-proclaimed privacy and technology legal nerd and entrepreneur. With her background in owning and operating businesses, and her experience working across the globe, Jordan brings extensive experience and practical knowledge to the global intersection of law and technology. Jordan understands the many demands on businesses, and works to create a balanced approach to privacy and data security compliance.
Jordan works with businesses to continually evaluate and assess legal and business opportunities and risks to provide public and private sector clients with practical data privacy and cybersecurity counsel and business strategic advice. Jordan’s goal is to understand your business, your approach, your risks, and then work with you to create effective, long-lasting solutions to your data privacy and technology legal challenges.
With more than ten years of experience in data privacy, cybersecurity, and technology law, Jordan advises clients on a variety of regulations, including but not limited to the General Data Protection Regulation (GDPR), the California Consumer Privacy Act (CCPA)/California Privacy Rights Act (CPRA), the Fair Credit Reporting Act (FCRA), and the Driver’s Privacy Protection Act (DPPA). Additionally, she provides counsel on biometric data laws, global data breach standards, and federal and state unfair business practices acts and privacy frameworks such as International Standards Organization (ISO) 27001 and 27701, the National Institute of Standards and Technology (NIST), and the Payment Credit Card Industry Data Security Standard (PCI DSS).
Jordan regularly represents clients in contractual negotiations pertaining to technology, data management, security, and privacy, and she assists in the development of customized, right-sized compliance programs to address numerous regulatory requirements and industry best practices. She also advises clients on cross-border data management and information governance, developing business-oriented and cost-effective strategies for information security, data privacy, and technology compliance.
Jordan’s experience provides her the opportunity to represent clients in a wide range of industries, gaining valuable insight into sectors including agriculture, adtech, emerging technologies (blockchain, Internet of Things (IoT), and Artificial Intelligence (AI), gaming, healthcare, manufacturing, and pharmaceutical. She advises clients on third-party management, addressing the privacy and security of their supply chain. She also collaborates with clients to develop business solutions that incorporate privacy-by-design and security-by-design principles, fusing regulatory requirements with practical, real-world solutions.
In addition to her private practice, Jordan is a Cybersecurity Lecturer at the University of California, Berkeley. Her academic research investigates the convergence of law and technology, as well as the practical implications of regional data protection regulations in the context of the global economy.
Jordan is a globally recognized speaker on a wide range of technology and privacy law topics. In addition, she hosts the podcast Cybersecurity and Data Privacy: The New Frontier for the American Bar Association, which concentrates on data security, privacy, and related legal topics. On the podcast, Jordan discusses a variety of topics focused on law, technology, privacy, and cybersecurity from the perspective of various industries.
Jordan is a Certified Information Privacy Professional for Europe (CIPP/E) and a Certified Information Privacy Professional for the United States (CIPP/US), as well as a Certified Information Privacy Manager (CIPM), as certified by the International Association of Privacy Professionals. She is a certified trainer for the International Association of Privacy Professionals.
HONORS & RECOGNITIONS
Lawyer on the Fast Track, The Legal Intelligencer (2023)
Pennsylvania Super Lawyers® Rising Star honoree (2019-2022)
Main Line Today – Top Lawyers – Cybersecurity (2021, 2022)
ABA ‘On the Rise – Top 40 Young Lawyers’, 2022 Honoree
SC Media – 2022 Women In IT Security, Honoree in the Advocate Category
Exeleon Magazine – 30 Most Transformational Leaders to Follow in 2022
Host, American Bar Association’s ‘Cybersecurity and Data Privacy: The New Frontier’ Podcast
European Union ERASMUS Grant Recipient, 2020ASSOCIATIONS & MEMBERSHIPS
American Bar Association, Business Law Fellow, 2020-2022
American Bar Association, Vice Chair of the Big Data Committee, 2022-2023
Pennsylvania Bar Association, Chair of the Cybersecurity and Data Privacy Committee
California Bar Association
New Jersey Bar Association
Forbes Business Council Member, 2022
International Association of Privacy Professionals (IAPP), Member
University of California, Berkeley, Cybersecurity Lecturer
former Thomas R. Kline School of Law, Drexel University, Law Professor
former Chestnut Hill College, Adjunct Professor
West Chester Friends School, Board Member
Appointed Fulbright Specialist in Cybersecurity and Data PrivacyCERTIFICATIONS
Certified Information Privacy Professional (CIPP) for United States law (US) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Professional (CIPP) for European law (E) through the International Association of Privacy Professionals (IAPP)
Certified Information Privacy Manager (CIPM) through the International Association of Privacy Professionals (IAPP)
Tom Bechtold, ModeratorDigital Event Director, SecureWorldTom has been part of the SecureWorld team for more than 14 years, having launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the "Remote Sessions" webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.
Tom GrimesSr. Director, Global Cybersecurity Engineering, InfobloxTom Grimes is the Senior Director of Global Security Engineering for Infoblox. Tom brings over 25 years of networking and security experience. Previously, Tom has worked as a networking/security specialist for Cisco, Proofpoint, Carbon Black and Forsythe. Tom has a Masters in Cybersecurity with a concentration in Malware Analysis. With over 25 years of experience in developing security solutions for Service Providers, Public Sector and Enterprise customers, Tom helps customers not only understand the technical, but also the business impacts of cyber-attacks and how to help mitigate those threats, specifically with a focus on DNS.
Col. Cedric LeightonCNN Military Analyst; U.S. Air Force (Ret.); Founder & President, Cedric Leighton Associates, LLCCedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.
VJ ViswanathanFounding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.
Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.
Kip BoylevCISO, Cyber Risk Opportunities LLCKip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
James WheelerFormer CFO; Founder of kept.proJames Wheeler is a fractional CFO and the founder of kept.pro, which provides an outsourced accounting department model for growing companies with $2M–$50M in annual revenue. He brings 15+ years of executive finance leadership across services and technology businesses and was twice a finalist for the San Diego Business Journal’s CFO of the Year. James holds a BA in Economics and an MBA from UC San Diego, completed executive education at MIT Sloan, and has served on nonprofit and for-profit boards.
Stephanie AcevesGlobal Head of Sales Engineering, DoppelStephanie Aceves is a cybersecurity executive and international keynote speaker focused on AI-driven threat disruption, executive impersonation defense, and digital risk protection. As Global Head of Sales Engineering at Doppel, she leads the worldwide presales organization helping global enterprises detect and disrupt deepfakes, brand abuse, and social engineering attacks. Steph began her career in red team operations leading adversary simulations across financial services, retail, and insurance, and has spoken at Gartner Risk & Security Conference, Mandiant mWISE, AISA Australian Cyber Conference, and ANDICOM Cartagena.
Yan BelleroseCloud Security Architect, Google CloudWhat happens when you let a tech architect loose on ambitious business goals for more than 20 years? You get Yan Bellerose, Cyber Security Architect at Google! He has been turning ambitious business strategies into technical realities (and ensuring they don't become IT nightmares). His playground is cloud computing, cybersecurity, telecom and AI, where he crafts future-proof solutions that are as elegant as they are secure. As a leader, Yan fosters a culture of innovation, empowering his teams to not just fix today's problems, but to predict and neutralize tomorrow's digital bogeymen. He's a passionate believer in automation—because the best security is the kind that works tirelessly while the humans are out getting coffee.
Tim MorrisChief Security Advisor, TaniumTim is a visionary leader and an IT and cybersecurity expert, with decades of experience across industries. He joined Tanium after retiring from Wells Fargo, where he was an SVP and led several teams in cyber operations, engineering, and research. He holds 24 U.S. patents and has written many articles on cybersecurity topics. He is also a trusted source of insights and opinions for major publications and web shows, where he shares his knowledge and passion for the field.
Tim started his IT career as a developer and sysadmin in manufacturing, then moved to banking, where he did software packaging, scripting, active directory administration, and M&A projects. He has been dedicated to cybersecurity since 2009, specializing in areas such as detection and response, systems and patch management, vulnerability assessment, web-content filtering, malware analysis, red-teaming, and digital forensics.
Alex OrleansHead of Threat Intelligence, Sublime SecurityAlex Orleans is the Head of Threat Intelligence at Sublime Security. With more than a decade of experience in cyber threat intelligence, including senior roles at CrowdStrike—where he managed the company's Targeted Intrusion mission—and FireEye, his work has included tracking state-nexus cyber espionage and supply chain compromises targeting financial sector entities. He is a frequent presenter at cybersecurity conferences, lectures as an adjunct at Johns Hopkins SAIS, and was recently published in CIA's Studies in Intelligence.
Shwetha Babu PrasadSr. Information Security Engineer, Reinsurance Group of AmericaShwetha Babu Prasad is a data security and privacy professional, speaker, and author with nearly a decade of experience in information security. Her work focuses on advancing practical, engineering-driven approaches to protect sensitive data and reduce systemic data exposure risks. She has experience implementing data protection controls across enterprise systems to mitigate the risk of sensitive data exposure. She is the author of "Why Websites Fail at Data Protection" and "Privacy and Data Security in the Age of AI."
An active member of ISC2 and the Information Systems Security Association (ISSA), she contributes to industry initiatives aligned with National Institute of Standards and Technology frameworks through the ISSA Resilience Special Interest Group. Her work advances practical, engineering-driven data protection and privacy capabilities, strengthening cyber resilience across enterprise and critical infrastructure environments.
Piyali DasDirector, Technology Risks and Controls - US Card and International Business and Payments, CapitalOnePiyali Das is a highly-accomplished cyber risk leader with two decades of experience driving enterprise-wide technology and cyber risk initiatives. Certified with CRISC, CCSK, CCAK, and PMP, she aligns risk management with strategic business objectives. Her expertise covers information security risk and compliance frameworks, cloud security, third-party risk, and AI/ML risk assessment. Piyali holds an MS in IT and Cybersecurity, specializing in data protection and risk management, complemented by a BTech in Computer Science and Engineering, which provides a strong foundation in algorithms and system architecture.
Sam MasielloChief Information Security and Privacy Officer, The Anschutz CorporationSam Masiello has been working with email, messaging, and fighting internet pollution for over 25 years. Prior to The Anschutz Corporation, he served as the CISO at Gates Corporation, where he was responsible for the company's data security, risk, and global compliance initiatives. Before that, he was CISO at TeleTech, where he oversaw the protection of employee, consumer, and customer data for all of the organization's clients, which included many Fortune 500 companies.
Sam has also been the Chief Security Officer, Head of Application Security, and Head of Security Research at companies such as Groupon, Return Path, and McAfee. He currently serves as Director-at-Large of The Coalition Against Unsolicited Commercial Email (CAUCE), National Advisory Board Member for SecureWorld, and is an Executive Board Member of Colorado Cyber. He has previously served as a member of the Board of Directors for the Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG), the Steering Committee of the Online Trust Alliance (OTA), and a member of the Anti-Phishing Working Group (APWG).
Panel Discussion
Cameron H. MalinCyber Behavioral Profiler, FBI (Ret.) and Modus CyberandiCameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.
During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.
He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).
Mike MuscatellSr. Director, Cyber Security, Acumatica, Inc.Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.
Dylan DeAndaField CTO, DoppelDylan DeAnda is the Field CTO at Doppel, where he works with enterprise and federal organizations to defend against modern social engineering threats. A former U.S. Army Military Intelligence Signals Intelligence Analyst and Korean Linguist, Dylan combines deep cybersecurity expertise with applied AI to help organizations combat phishing, deepfakes, and executive impersonation attacks. He focuses on building and deploying LLM and agentic AI systems that help security teams detect and disrupt multi-channel social engineering campaigns targeting global brands and their executives.
Hone your skills and earn 6 CPE credits learning from industry experts.

