Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 25, 2023
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 4:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    A Whole Lotta BS (Behavioral Science) About Cybersecurity
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    Let’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security.  We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.

     

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    12:00 pm
    Succeeding in Succession Planning: The Future You Build
    • session level icon
    speaker photo
    CISO, Veterans United Home Loans
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session description to come.

    12:00 pm
    BEC Attacks: The Stealthiest and Most Lucrative Threat
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:00 pm
    [Fireside Chat] Sustainable Cybersecurity and Resiliency
    • session level icon
    speaker photo
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    As the nation’s cyber defense agency, CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. Since the majority of our nation’s critical infrastructure is privately owned, ensuring the nation’s cybersecurity posture requires continued collaboration between government and the private sector. During this fireside chat, CISA will discuss the current cyber threat landscape, the agency’s latest initiatives to help critical infrastructure owners and operators protect and defend their networks, and the catalog of CISA services available to organizations to become more cyber resilient.

    1:00 pm
    Demystifying Zero Trust and Its Role in Cybersecurity
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    1:00 pm
    Protecting Government Organizations from Third-Party Breaches
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    The past year alone has revealed major vulnerabilities in critical infrastructure systems that resulted in immediate action to be taken by the White House. If there’s one lesson to be learned from the Colonial Pipeline attack and similar recent attacks such as the SolarWinds breach, it’s that companies must do everything they can to protect their critical infrastructure, environments, and networks.

    Within the last year, nearly half of organizations were victims of a cyberattack that was caused by a third-party vendor. The effectiveness of hackers using third parties to infiltrate internal networks is still seen in attacks on critical infrastructure systems like water plants and gas pipelines. The only way to really know the threats emerging from sophisticated and advanced hacking methods is by assessing all points of vulnerability.

    In this presentation, learn how government organizations can take action and put the right protocols in place to protect specifically against third-party breaches and provide actionable best practices using real life examples. With 54% of organizations not monitoring the security and privacy practices of third parties that they share sensitive or confidential information with on an ongoing basis, we will touch on why these organizations are so susceptible to attacks in the first place and the underlying issues when it comes to government entities using external vendors.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:00 pm
    Securing Government First: Reducing Risk and Protecting State, Local, Tribal & Territorial (SLTT) from Cyber Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    State, Local, Tribal and Territorial (SLTT) governments face the threat of continuous cyber-attacks from numerous groups with different intentions to disrupt their ability to provide services and support to citizens. Citizens trust an rely on their governments to provide and maintain services that they rely on for essential life sustainment and emergencies. In recent decades research and investments in technology to enhance methods, solutions, and equipment have improved service delivery and emergency response operations provided by governments.
    SLTTs have adopted and embraced advanced technology solutions that increased and improved their capabilities to provide essential and emergency services to their citizens. The effective management and security of these critical services are under constant scrutiny, and even the smallest system failure may be unacceptable to citizens and erode their trust in government. Several studies have shown that cybersecurity programs at the SLTT level receive varying support to ensure security and reduce the risk of compromise. How can budget constrained, understaffed, and low skilled employees of SLTTs establish, maintain and protect the security of their critical information (CI) systems reducing risk and avoiding failures due to cyber-attack? Security professionals, Chief Information Officers (CIO) and Chief Information Security Officers (CISO) are often placed in frustrating positions that limit their options to reduce risk because they are resource constrained. Implementing cybersecurity and risk frameworks that offer foundations to build stakeholder awareness, increase funding, establish needed enforcement authorities can identify gaps, reduce frustration and boost confidence in programs. Combining these basic frameworks with continuous improvement through leadership, information sharing, and partnership building has proven successful in industry cybersecurity programs and can work in SLTTs.

    2:00 pm
    Benchmarking Your Cybersecurity Framework
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Measuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    3:00 pm
    Ransomware: How to Stay Off the Front Pages
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    3:00 pm
    Securing Your Sensitive Assets in a Cloud-First World
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Key take-away: 
    How to rethink database security controls in a cloud-first world.

    For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:

    • Amount of data created, collected, and stored
    • Number of repositories storing sensitive data across clouds
    • Number of users and applications that need access to data
    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    4:00 pm
    Cyber World on Fire: A Look at Internet Security in Today’s Age of Conflict
    • session level icon
    speaker photo
    CNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    This informative session analyses the growing threat of cyberattacks and risks to internet security in today’s world. Col. Leighton explores the various types of attacks and vectors, including how bad actors can impact businesses and individuals. The session also examines the role of governments and international organizations—partnering with public and private businesses—in protecting against cyber threats.

    Col. Leighton describes how nefarious actions are becoming increasingly more sophisticated and widespread, with hackers targeting not just large corporations but also smaller businesses and even individuals. He emphasizes the need for organizations to take proactive measures to protect their networks and data, including investing in advanced security technologies and providing regular training to employees.

    He shares examples of cyber activity—good and bad; offensive and defensive—from Ukraine, China, and around the globe.

    4:00 pm
    A Look into Third-Party Risk Management (TPRM) for FinTechs and Startups
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Key Take-away:
    How to navigate the establishment of a TPRM program for FinTechs and Startups with simplicity.

    You have a great idea, you pitch it and the investors love it, you received your first (or second) round of funding, but now you are left stumped. A sponsor is asking you how are you managing the risk of your third parties. You think, I don’t have any “third parties” then you remember your cloud service provider, you connected APIs, the applications your employees (hopefully) installed via legitimate channels, the open-source software used in the development, and all the unknowns. You are left thinking you may have just opened Pandora’s box. How do you navigate this process, now, tomorrow, and into the future?

    Presentation Level:
    GENERAL (InfoSec best practices, trends, solutions, etc.)

Exhibitors
  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Randy Raw
    CISO, Veterans United Home Loans

    Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.

  • speaker photo
    Stanton Gatewood
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA

    Mr. Stanton Gatewood is the U.S. DHS/CISA - R4 Cyber Security Coordinator - State of Georgia. He is the former Chief Information Security Officer for the State of Georgia and Board of Regents of the University System of Georgia and the University of Georgia.

    Stanton has more than 35 years of experience in cybersecurity program management and strategic planning, executive leadership, including the U.S. military, state, local, federal governments, higher education, and several top 10 global corporations. He has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University. He has built two centers of excellence, one for cryptography and one for cyber awareness and training.

  • speaker photo
    Panel Discussion
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC

    Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.

    Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Learn and connect virtually

Join your InfoSec peers for high-quality training and collaboration. Sign up today!