Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, June 21, 202310:30 amExhibitor Hall openRegistration Level:
Open Sessions
10:30 am - 4:00 pmLocation / Room: Exhibitor FloorYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
11:00 amOPENING KEYNOTERegistration Level:Open Sessions
11:00 am - 11:45 am11:45 amNetworking BreakRegistration Level:Open Sessions
11:45 am - 12:00 pmLocation / Room: Exhibitor FloorVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
12:00 pmReducing Complexity While Increasing Data Protection in Financial ServicesRegistration Level:Open Sessions
12:00 pm - 12:30 pmFinancial service firms have a responsibility to provide fool-proof security to instill faith in customers, and send a strong message that combating threats is a prime objective. They cannot afford to be complacent, especially when the majority of information produced or utilized in financial services is private and sensitive, not to mention highly regulated. All this adds up to make cybersecurity vital to business.
Building sustainable ongoing security starts with all-inclusive optics into the sensitivity of data and automated organization-wide control of it. Organizations can assemble all this with multiple solutions, but doing so is time-consuming, expensive, and can be fraught with integration woes.
There’s a better way. This session takes a deep dive into reducing complexity in sensitive and private data protection, including:
- How to dig deep across the enterprise into every place sensitive data may be stored, from data lakes to endpoint devices
- The benefit of automatic policy-specific remediation, including masking, redaction, deletion, and encryption
- How to scale data protection and compliance as data volumes increase
12:00 pmBEC Attacks: The Stealthiest and Most Lucrative ThreatRegistration Level:Open Sessions
12:00 pm - 12:30 pm12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:00 pmDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Open Sessions
1:00 pm - 1:45 pm1:00 pmProtecting Government Organizations from Third-Party BreachesRegistration Level:Open Sessions
1:00 pm - 1:45 pmThe past year alone has revealed major vulnerabilities in critical infrastructure systems that resulted in immediate action to be taken by the White House. If there’s one lesson to be learned from the Colonial Pipeline attack and similar recent attacks such as the SolarWinds breach, it’s that companies must do everything they can to protect their critical infrastructure, environments, and networks.
Within the last year, nearly half of organizations were victims of a cyberattack that was caused by a third-party vendor. The effectiveness of hackers using third parties to infiltrate internal networks is still seen in attacks on critical infrastructure systems like water plants and gas pipelines. The only way to really know the threats emerging from sophisticated and advanced hacking methods is by assessing all points of vulnerability.
In this presentation, learn how government organizations can take action and put the right protocols in place to protect specifically against third-party breaches and provide actionable best practices using real life examples. With 54% of organizations not monitoring the security and privacy practices of third parties that they share sensitive or confidential information with on an ongoing basis, we will touch on why these organizations are so susceptible to attacks in the first place and the underlying issues when it comes to government entities using external vendors.
1:45 pmNetworking BreakRegistration Level:Open Sessions
1:45 pm - 2:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:00 pmSecuring Government First: Reducing Risk and Protecting State, Local, Tribal & Territorial (SLTT) from Cyber ThreatsRegistration Level:Open Sessions
2:00 pm - 2:45 pmState, Local, Tribal and Territorial (SLTT) governments face the threat of continuous cyber-attacks from numerous groups with different intentions to disrupt their ability to provide services and support to citizens. Citizens trust an rely on their governments to provide and maintain services that they rely on for essential life sustainment and emergencies. In recent decades research and investments in technology to enhance methods, solutions, and equipment have improved service delivery and emergency response operations provided by governments.
SLTTs have adopted and embraced advanced technology solutions that increased and improved their capabilities to provide essential and emergency services to their citizens. The effective management and security of these critical services are under constant scrutiny, and even the smallest system failure may be unacceptable to citizens and erode their trust in government. Several studies have shown that cybersecurity programs at the SLTT level receive varying support to ensure security and reduce the risk of compromise. How can budget constrained, understaffed, and low skilled employees of SLTTs establish, maintain and protect the security of their critical information (CI) systems reducing risk and avoiding failures due to cyber-attack? Security professionals, Chief Information Officers (CIO) and Chief Information Security Officers (CISO) are often placed in frustrating positions that limit their options to reduce risk because they are resource constrained. Implementing cybersecurity and risk frameworks that offer foundations to build stakeholder awareness, increase funding, establish needed enforcement authorities can identify gaps, reduce frustration and boost confidence in programs. Combining these basic frameworks with continuous improvement through leadership, information sharing, and partnership building has proven successful in industry cybersecurity programs and can work in SLTTs.2:00 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
2:00 pm - 2:45 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
2:45 pmNetworking BreakRegistration Level:Open Sessions
2:45 pm - 3:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
3:00 pmRansomware: How to Stay out off the Front PagesRegistration Level:Open Sessions
3:00 pm - 3:45 pm3:00 pmSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Open Sessions
3:00 pm - 3:45 pmKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
3:45 pmNetworking BreakRegistration Level:Open Sessions
3:45 pm - 4:00 pmVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
4:00 pmDeveloping a Crisis Management PlaybookRegistration Level:Open Sessions
4:00 pm - 4:45 pmWhen a data breach or other cyber incident happens, having a plan in place can mean the difference between a quick recovery and unwanted headlines and irreparable harm to stakeholder trust.
4:00 pmA Look into Third-Party Risk Management (TPRM) for FinTechs and StartupsRegistration Level:Open Sessions
4:00 pm - 4:45 pmKey Take-away:
How to navigate the establishment of a TPRM program for FinTechs and Startups with simplicity.You have a great idea, you pitch it and the investors love it, you received your first (or second) round of funding, but now you are left stumped. A sponsor is asking you how are you managing the risk of your third parties. You think, I don’t have any “third parties” then you remember your cloud service provider, you connected APIs, the applications your employees (hopefully) installed via legitimate channels, the open-source software used in the development, and all the unknowns. You are left thinking you may have just opened Pandora’s box. How do you navigate this process, now, tomorrow, and into the future?
Presentation Level:
GENERAL (InfoSec best practices, trends, solutions, etc.)
- Panel Discussion

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your InfoSec peers for high-quality training and collaboration. Sign up today!
