Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, June 23, 2022
    10:00 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 4:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Opening Keynote] Ukraine vs. Russia: The Cyber War
    • session level icon
    speaker photo
    CNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    12:00 pm
    Demystifying the Partnership with the FBI – InfraGard Chapter Meeting
    • session level icon
    Open to all attendees
    speaker photo
    Special Agent, FBI
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm
    12:00 pm
    Transforming Risk into Opportunity
    • session level icon
    speaker photo
    Deputy CISO, State of Washington
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:30 pm

    This session uses the story of traversing a gorge wall leading to the base of a Central American waterfall to convey the principles of risk management.  The story illustrates a practical way to structure risk management to prepare practitioners and managers to identify and create opportunities.

    Attendees will learn three risk management principles that enable organizations to recognize business and enterprise opportunities.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:00 pm
    Government Regulation of AI and Automated Tools
    • session level icon
    speaker photo
    Litigation Attorney, Octillo Law
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    A recent wave of state and federal government initiatives directed at the use of artificial intelligence systems and automated tools by businesses shows there is no coherent AI policy in the United States.  This presentation will discuss current AI/automated tools regulatory landscape, the wave of new state and city laws, and the need for comprehensive federal regime.

    1:00 pm
    Leveraging CISA Shields Up Guidance
    • session level icon
    To Improve Your Cybersecurity Readiness & Protect Organizational Assets
    speaker photo
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:00 pm
    [Lunch Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    3:00 pm
    How Can We Be More Secure in a World of Distractions?
    • session level icon
    speaker photo
    CISO, New Jersey Courts
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    We are living in a world of distractions—smartphones, alerting devices at home, metaverse—and we have a job to secure ourselves, our loved ones, and we get paid for doing it at work. How is this supposed to happen when families and staff are texting, exchanging information until they sleep? Control everything or do nothing? What is the appropriate balance? How do I keep sane? Come to this presentation on lessons of leadership and operating in a more secure way within this world of distractions.

    3:00 pm
    Ransomware: #1 with a Bullet
    • session level icon
    speaker photo
    Cyber Security Advisor & Georgia State Coordinator, U.S. CISA
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    All cyberattacks are evolving, and attacks are getting more and more adaptive and cunning. Recently, ransomware has dominated the headlines, and incidents among the nation’s state, local, tribal, territorial (SLTT) government entities, as well as critical infrastructure organizations, have been growing for years. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. Malicious actors continue to adapt their ransomware tactics over time, and in recent months “ransomware” attacks have outpaced so much so that they’re the #1 cyberattack in 2022 and continue to gain traction.

    But don’t fret, there is hope! Come join us on a walkthrough of known countermeasures against ransomware attacks and many other attacks that could be a game changer in your security strategy: Proactivity, Awareness, Preparedness, and Resilience.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    4:00 pm
    The Future of Work
    • session level icon
    speaker photo
    Chief Information Security, Data Privacy, and Risk Management Strategist, City of Providence, RI
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Over the last few years, the workforce, and the way we work, has entirely shifted focus. Between hybrid work models, attracting and retaining diverse talent, forced digital migrations/transformations, cybersecurity succession planning, and overall mental fatigue, the future of work has dramatically changed. Hear from Monsurat Ottun who is in the trenches navigating the “new normal” in hybrid government offices as she shares key takeaways and the lessons she’s learned along the way. This discussion is followed by a live (virtual) Q&A, so come prepared to ask your burning workforce questions!

    4:00 pm
    Lessons Learned from the Front Lines of Ransomware Data Recovery
    • session level icon
    speaker photo
    Director, Strategy & GTM, Rubrik
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    The “business” of ransomware has grown and it has become harder to combat the attacks. In 2019, one study showed that ransomware potentially cost the U.S government, health care providers, and schools approximately $7.5 billion, and according to Gartner, by 2025, at least 75% of IT organizations will face one or more attacks. When ransomware strikes, you either pay the ransom or attempt to recover. In this session, join us for a front row seat to hear what really happens during a ransomware attack and get insight from lessons learned from the “front lines” of recovering from an incident.

Exhibitors
  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • Cloud Security Alliance (CSA)
    Booth:

    The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.

  • Cybercrime Support Network
    Booth:

    Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.

  • Rubrik
    Booth:

    Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance. We are trusted by the world’s leading companies and industry-leading partners. Get Rubrik’s latest news, download the media press kit, and reach out to the press team.

  • TechTarget
    Booth:

    TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.

  • Thales
    Booth:

    As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.

  • WiCyS Critical Infrastructure
    Booth:

    Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Critical Infrastructure was formed to empower women in cyber across the critical infrastructure community and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC

    Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.

    Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.

  • speaker photo
    Cerena Coughlin
    Special Agent, FBI
  • speaker photo
    Steven Fox
    Deputy CISO, State of Washington
  • speaker photo
    Brian Myers, Esq.
    Litigation Attorney, Octillo Law

    Brian is a seasoned litigation attorney representing clients of all sizes - from sole proprietorships to Fortune 500 companies - in complex litigation matters. He has guided clients through all stages of the litigation process, including trials and arbitrations in both state and federal courts and before multiple administrative agencies throughout the country. Brian has focused experience in cases involving professional liability and breach of contract claims in the design and construction industries and has represented clients in class action proceedings under BIPA, the Fair Debt Collection Practices Act, TCPA, and Fair Housing Act.

  • speaker photo
    David Ortega
    Principal Solution Architect, Digital Identity and Security, Thales Cloud Security

    David Ortega been a cybersecurity professional for more than 20 years with deep expertise in digital innovation utilizing modern cloud, data, and security solutions. David has had the pleasure of working with various industry leaders in finance, healthcare, government, higher education, and manufacturing services. His highly sought-after expertise is in security advisory services, architecture and solutions engineering, and digital transformation data-centric solutions that drives business value and manages risks.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Sajed Naseem
    CISO, New Jersey Courts

    Sajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters degrees from St. John's University and Columbia University. He routinely speaks at cybersecurity conferences nationally, in Europe, and with the New Jersey Bar Association. Sajed is also an Adjunct Professor at St. John's University in Information Security since 2010 and a native of New York City.

  • speaker photo
    Stanton Gatewood
    Cyber Security Advisor & Georgia State Coordinator, U.S. CISA

    Mr. Stanton Gatewood is the U.S. DHS/CISA - R4 Cyber Security Coordinator - State of Georgia. He is the former Chief Information Security Officer for the State of Georgia and Board of Regents of the University System of Georgia and the University of Georgia.

    Stanton has more than 35 years of experience in cybersecurity program management and strategic planning, executive leadership, including the U.S. military, state, local, federal governments, higher education, and several top 10 global corporations. He has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University. He has built two centers of excellence, one for cryptography and one for cyber awareness and training.

  • speaker photo
    Monsurat Ottun
    Chief Information Security, Data Privacy, and Risk Management Strategist, City of Providence, RI
  • speaker photo
    Joe Dabrowski
    Director, Strategy & GTM, Rubrik

    Joe leads America's Sales Strategy at Rubrik, working with enterprise customers and federal agencies on leveraging the Rubrik Data Security platform to drive cyber resiliency. Joe is an accomplished technology executive with 20 years’ experience. Previously, he served in sales and leadership positions at NetApp, Splunk, and EMC. Joe resides in McLean, VA.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes