Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Thursday, June 23, 202210:00 amExhibitor Hall openRegistration Level:
Open Sessions
10:00 am - 4:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 am[Opening Keynote] Defending Our Government Agencies and Critical Infrastructure from Cyber ThreatsCNN Military Analyst; USAF (Ret.), CEO, Cedric Leighton AssociatesRegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
12:00 pmTransforming Risk into OpportunityDeputy CISO, State of WashingtonRegistration Level:Open Sessions
12:00 pm - 12:30 pmThis session uses the story of traversing a gorge wall leading to the base of a Central American waterfall to convey the principles of risk management. The story illustrates a practical way to structure risk management to prepare practitioners and managers to identify and create opportunities.
Attendees will learn three risk management principles that enable organizations to recognize business and enterprise opportunities.
12:00 pmComplying with the Federal Government's Control of Unclassified Information (CUI) RequirementRegistration Level:Open Sessions
12:00 pm - 12:30 pmThis session will focus on how organizations that do business with the Federal Government comply with the National Institute of Standards and Technology (NIST) 800-171 Guidance, ‘Protecting Controlled Unclassified (CUI) Information in Nonfederal Systems and Organizations’. What does the organizations CISO need to know, and how to implement and comply with the NIST 800-171 guidance. This session will also focus on downstream organizations that may be supplying goods or services to organizations that do business with the Federal Government.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:00 pmRansomware: #1 with a BulletCyber Security Advisor & Georgia State Coordinator, U.S. CISARegistration Level:Open Sessions
1:00 pm - 1:45 pmAll cyberattacks are evolving, and attacks are getting more and more adaptive and cunning. Recently, ransomware has dominated the headlines, and incidents among the nation’s state, local, tribal, territorial (SLTT) government entities, as well as critical infrastructure organizations, have been growing for years. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. Malicious actors continue to adapt their ransomware tactics over time, and in recent months “ransomware” attacks have outpaced so much so that they’re the #1 cyberattack in 2022 and continue to gain traction.
But don’t fret, there is hope! Come join us on a walkthrough of known countermeasures against ransomware attacks and many other attacks that could be a game changer in your security strategy: Proactivity, Awareness, Preparedness, and Resilience.
1:00 pmA Holistic Cyber Defense StrategyRegistration Level:Open Sessions
1:00 pm - 1:45 pmThe threat landscape is evolving rapidly and so must the defense strategy. This presentation will walk through a holistic cybersecurity strategy for security and business leaders in today’s digital world. Key takeaways will include:
- Understand what is the holistic cybersecurity approach and why it is important
- Technology and technique involved in holistic cyber defense
- Lessons learned and recommendations
1:00 pmTop 4 Reasons Why Privileged Access Management Implementations FailRegistration Level:Open Sessions
1:00 pm - 1:45 pmIt is shocking that, year over year, stealing credentials is still the top tactic used by attackers to breach organizations. Why is this still happening? Hint: It isn’t only because of weak passwords. Organizations have invested heavily into privileged access management (PAM) technologies, but these solutions have struggled to address the problem for five key reasons. In this discussion, we will address the gaps in current access management approaches but, more importantly, show you how to quickly close the gaps and significantly reduce security risks without disrupting your current investments or systems.
Join Remediant in this discussion to:
- Learn the five reasons why privileged access management implementations fail
- Identify areas in your IAM program where you can reduce admin access risk
- Capitalize on existing investments, while improving your risk posture
Presentation level: TECHNICAL (deeper dive including TTPs)
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:00 pm[Lunch Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret ServiceFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:Open Sessions
2:00 pm - 2:45 pm2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
3:00 pmHow Can We Be More Secure in a World of Distractions?CISO, New Jersey CourtsRegistration Level:Open Sessions
3:00 pm - 3:45 pmWe are living in a world of distractions—smartphones, alerting devices at home, metaverse—and we have a job to secure ourselves, our loved ones, and we get paid for doing it at work. How is this supposed to happen when families and staff are texting, exchanging information until they sleep? Control everything or do nothing? What is the appropriate balance? How do I keep sane? Come to this presentation on lessons of leadership and operating in a more secure way within this world of distractions.
3:00 pmGovernment Regulation of AI and Automated ToolsMember, Litigation Team Lead, Beckage LawLitigation Attorney, Beckage LawRegistration Level:Open Sessions
3:00 pm - 3:45 pmA recent wave of state and federal government initiatives directed at the use of artificial intelligence systems and automated tools by businesses shows there is no coherent AI policy in the United States. This presentation will discuss current AI/automated tools regulatory landscape, the wave of new state and city laws, and the need for comprehensive federal regime.
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
4:00 pmFuture of WorkChief Information Security, Data Privacy, and Risk Management Strategist, City of Providence, RIRegistration Level:Open Sessions
4:00 pm - 4:45 pmOver the last few years, the workforce, and the way we work has entirely shifted focus. Between hybrid work models, attracting and retaining diverse talent, forced digital migrations/transformations, cybersecurity succession planning and overall mental fatigue, the future of work has dramatically changed. Hear from Monsurat Ottun who is in the trenches navigating the ‘new normal’ in hybrid government offices, her different key takeaways, and the lessons she’s learned along the way. This discussion is followed by a live (virtual) Q&A, so come prepared to ask your burning workforce questions!
4:00 pm[Panel] The Current Threat LandscapeRegistration Level:Open Sessions
4:00 pm - 4:45 pmIf we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?
It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- Cloud Security Alliance (CSA)Booth:
The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders.
- Cybercrime Support NetworkBooth:
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- RubrikBooth:
Rubrik helps enterprises achieve data control to drive business resiliency, cloud mobility, and regulatory compliance. We are trusted by the world’s leading companies and industry-leading partners. Get Rubrik’s latest news, download the media press kit, and reach out to the press team.
- TechTargetBooth:
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThalesBooth:
As the global leader in cloud and data protection, we help the most trusted brands and largest organizations in the world protect their most sensitive data and software, secure the cloud and achieve compliance through our industry-leading data encryption, access management, and software licensing solutions.
- WiCyS Critical InfrastructureBooth:
Women in CyberSecurity (WiCyS) is a global community that is dedicated to bringing talented women together to celebrate and foster their passion and drive for cybersecurity. WiCyS Critical Infrastructure was formed to empower women in cyber across the critical infrastructure community and create a safe community for women to flourish, explore, and learn. We unite local, national, and international communities across academia, research, and industry to empower women through knowledge, experience, networking, and mentorship.
- Col. Cedric LeightonCNN Military Analyst; USAF (Ret.), CEO, Cedric Leighton Associates
Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.
Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.
- Steven FoxDeputy CISO, State of Washington
- Stanton GatewoodCyber Security Advisor & Georgia State Coordinator, U.S. CISA
Mr. Stanton Gatewood is the U.S. DHS/CISA - R4 Cyber Security Coordinator - State of Georgia. He is the former Chief Information Security Officer for the State of Georgia and Board of Regents of the University System of Georgia and the University of Georgia.
Stanton has more than 35 years of experience in cybersecurity program management and strategic planning, executive leadership, including the U.S. military, state, local, federal governments, higher education, and several top 10 global corporations. He has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University. He has built two centers of excellence, one for cryptography and one for cyber awareness and training.
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Sajed NaseemCISO, New Jersey Courts
Sajed Naseem ("Saj") is the Chief Information Security Officer (CISO) of New Jersey Courts. He has over 20 years of experience with information security and IT across many industries. As the CISO of the New Jersey Courts, he has focused on Cybersecurity Readiness & Performance, Information Governance, and Network Security. Sajed holds Masters degrees from St. John's University and Columbia University. He routinely speaks at cybersecurity conferences nationally, in Europe, and with the New Jersey Bar Association. Sajed is also an Adjunct Professor at St. John's University in Information Security since 2010 and a native of New York City.
- Myriah V. Jaworski, Esq., CIPP/US, CIPP/EMember, Litigation Team Lead, Beckage Law
Myriah Jaworski leads Beckage’s Privacy Litigation Team, where she represents clients in data breach actions, technology disputes, and in the defense of consumer class actions and related regulatory investigations stemming from alleged privacy torts and violations of the TCPA, BIPA, IRPA, and other state and federal privacy laws. Myriah also works with clients to devise and implement privacy and security compliance programs and to evaluate and implement new technologies, including enterprise-wide AI and machine learning tools. She is also been recognized as a Super Lawyer® for her Civil Litigation practice in 2018, 2019, 2020, and 2021.
- Brian Meyers, Esq.Litigation Attorney, Beckage Law
Brian is a seasoned litigation attorney representing clients of all sizes - from sole proprietorships to Fortune 500 companies - in complex litigation matters. He has guided clients through all stages of the litigation process, including trials and arbitrations in both state and federal courts and before multiple administrative agencies throughout the country. Brian has focused experience in cases involving professional liability and breach of contract claims in the design and construction industries and has represented clients in class action proceedings under BIPA, the Fair Debt Collection Practices Act, TCPA, and Fair Housing Act.
- Monsurat OttunChief Information Security, Data Privacy, and Risk Management Strategist, City of Providence, RI
- Panel Discussion

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!
