googletag.cmd.push(function() { googletag.display('div-gpt-ad-1482431611496-4'); });
Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, October 25, 2023
    10:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 4:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    11:00 am
    [Opening Keynote] Lessons from a CISO: Increasing Your Cybersecurity Footprint Despite Worn Soles
    • session level icon
    speaker photo
    CISO, State of North Dakota
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    In a time of decreasing budgets, CISOs are increasingly faced with the challenge of doing more with less. In this informative keynote, Michael Gregg discusses how he grew his state’s cyber coverage from 25,000 to 250,000 endpoints. Learn how he optimized SOC operations and embraced AI to increase efficiencies and improve response times while reducing costs.
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Threat Intelligence: Industrialization of Cyber Fraud and AI
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    The presentation will cover the Secret Service’s view on current cybercrime trends to include the emergence of AI/ML in the cybercrime world. Investigator Dougherty will frame it in the lens of BEC (Business Email Compromise) and discuss the new and emerging advancements cybercriminals are using to victimize businesses in 2023 and beyond. Investigator Dougherty may even share a a deepfake of himself.

    12:00 pm
    Making Cybersecurity Your Career
    • session level icon
    speaker photo
    Director, Business Strategy and Growth, Raytheon BBN
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Cybersecurity is a field that has more jobs than the workforce to fill them.  Despite that fact, to enter the cybersecurity field is not trivial and when you finally enter, it is hard to know what is next.

    This session will give advice and best practices for how to enter the cybersecurity work space. Additionally, we will discuss how to move from entry level in your career. Lastly, we will discuss how employers can intake new employees without a cybersecurity background to fulfill these open roles.

    12:00 pm
    How the Private Sector Can Get Involved in the New Biden National Cybersecurity Strategy
    • session level icon
    speaker photo
    Director, Integrated Cybersecurity Partners, LLC
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Secure by Default: Evolving Security Expectations
    • session level icon
    speaker photo
    CISO, Automox
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    CISA recently released their paper on “Secure by Design, Secure by Default” software that has support from seven major governments. It is meant to make significant, achievable improvements in software security. We will discuss the Secure by Default concept, why it is important, and what customers and vendors can do about it today.

    1:00 pm
    Transforming Your Policy Stack
    • session level icon
    speaker photo
    Deputy CISO, State of Washington
    speaker photo
    Enterprise IT Policy Manager, State of Washington
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    This session explores lessons from the planning, missteps, and pivot points of a security policy stack transformation. Attendees will journey through the pain-points of an outdated, patchwork policy stack developed with little attention to industry standard. They will learn tactics to engage their community.. Attendees will learn: – How to identify industry frameworks to inform policy development. – How to structure and conduct a policy review working group to validate content. – How to coordinate document vetting at all staging of community and governance review. – How to use the policy stack to transition their organization to a risk-aware mindset.

    1:00 pm
    Why We Are Losing the Cyberwar
    • session level icon
    speaker photo
    CEO, Blue Goat Cyber
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    We are not losing the cyberwar due to a lack of technical skills or a lack of frameworks. We are losing the cyberwar due to a lack of people skills (low EQ) with our highly rationally intelligent (high IQ) cybersecurity staff. Most cybersecurity staff want to feel significant by being “smarter” than others. This inhibits communication and collaboration. I offer a seven-step methodology to fix this challenge, as discussed in my book “The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity” (https://www.amazon.com/Smartest-Person-Room-Solution-Cybersecurity/dp/1544516215), which is based on my 30 years’ experience in cybersecurity, including my own journey with the first cybersecurity company (Alpine Security) that I built and sold in 2020.
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    A Whole Lotta BS (Behavioral Science) About Cybersecurity
    • session level icon
    speaker photo
    Executive Director, National Cybersecurity Alliance
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Let’s be honest: people can frustrate us. They don’t always do the things we’d like, and they often do some things we’d rather they didn’t. New research from the National Cybersecurity Alliance reveals insights about the public’s attitudes and beliefs about security.  We’ll explore the 2022 “Oh Behave! Cybersecurity Attitudes and Behaviors Report,” and some of the findings may surprise you! We’ll also give you practical, actionable advice on how you can better communicate to influence the behavior change you want to see.

     

    2:00 pm
    Cyber Threats, CISA Tools, and Services for Your Consideration
    • session level icon
    speaker photo
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    As the nation’s cyber defense agency, CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. Since the majority of our nation’s critical infrastructure is privately owned, ensuring the nation’s cybersecurity posture requires continued collaboration between government and the private sector. During this fireside chat, CISA will discuss the current cyber threat landscape, the agency’s latest initiatives to help critical infrastructure owners and operators protect and defend their networks, and the catalog of CISA services available to organizations to become more cyber resilient.

    2:00 pm
    The State of the State of U.S. Privacy Laws: Requirements and Enforcement
    • session level icon
    speaker photo
    Senior Counsel, Constangy, Brooks, Smith & Prophete
    speaker photo
    Partner, Buffalo, Constangy, Brooks, Smith & Prophete, LLP
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    With new U.S. state privacy laws coming into effect, evolving federal guidance from the Federal Trade Commission (FTC), and increasingly active EU data regulators, businesses are required to continually evolve and mature their privacy and information security strategies to meet changing requirements. Join Constangy partners Allison Prout and Sarah Rugnetta as they provide updates on key developments both within the U.S. and internationally in data privacy law.

    This presentation will detail:

    • Strategies for businesses to leverage the remaining months in 2023 to continue to develop their privacy regulatory compliance,
    • Creating solutions that can be used to meet new and forthcoming legislative requirements, and
    • Insights into practical privacy and information security solutions when required to meet multiple different regulatory requirements.
    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Exhibitor Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    [Closing Keynote] Cyber Intel Briefing: Government
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 4:45 pm

    Session description to come.

Exhibitors
  • Automox
    Booth:

    Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.

  • CREST
    Booth:

    CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Michael Gregg
    CISO, State of North Dakota

    Michael Gregg is the state of North Dakota’s Chief Information Security Officer. The state CISO is responsible for establishing and leading the strategic direction of cyber security for the state and advising the governor and legislators on key cyber issues.

    With Michael’s cyber experience span being over a period of two decades, he has been a pioneer of helping people interested in becoming IT professionals as well as seasoned IT professionals achieve by sharing knowledge by means of authoring over 25 IT cyber security books. He enjoys contributing his time and talents where there is a need to help others learn and grow by holding board, committee, and advisory positions for non-profit organizations. He holds a Bachelors degree, Masters degree, and many security certifications.

  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Yolanda Reid
    Director, Business Strategy and Growth, Raytheon BBN

    Passionate about addressing the problems related to cybersecurity and technology of the future. People speak about innovation, but Yolanda encourages innovation from workplace entry to developing new tools, solutions, and techniques. As a former U.S. Department of Defense civilian for more than 20 years, she has been "doing cyber" before we had the term, but started "doing innovation" since high school, where she worked at NASA and Exxon USA.

    At Raytheon BBN Technologies, she supports the president with developing strategies to grow how BBN Technologies supports the Intelligence Community needs of today and the needs the IC will have in the near future. At BBN, the workforce is passionate and thrives in producing solutions to hard challenges and developing beyond state-of-the-art research and development. It's a dynamic environment with a constantly evolving portfolio of new projects, always aimed at solving tough problems for our customers. BBN's portfolio consists of these topics: advancing research with DNA, bio-technology, quantum, cybersecurity, AI/ML, acoustics, space, 5G, human language technologies, and secure computer networking devices.

    As an experienced Electrical Engineer from Vanderbilt University, she demonstrated a history of providing strategic leadership to support the Intelligence Community through technology (microelectronics, cellular communications, high speed fiber networks, radio frequencies [RF], SCADA, satellites, cyber security, cloud technologies, and computer software development).

  • speaker photo
    Kurt Sanger
    Director, Integrated Cybersecurity Partners, LLC
  • speaker photo
    Jason Kikta
    CISO, Automox

    Jason Kikta is the Chief Information Security Officer at Automox. He previously served for over 20 years in the United States Marine Corps, which included seven years at U.S. Cyber Command designing and managing the national counter-APT and counter-ransomware missions.

  • speaker photo
    Steven F. Fox
    Deputy CISO, State of Washington

    Steven F. Fox provides security guidance to ensure risk-informed compliance with federal standards and requirements as a Deputy CISO for the State of Washington. He brings a cross-disciplinary, international perspective to the practice of information security, combining his experience as a security consultant, an IT Audit leader, and a systems engineer with principles from behavioral/organizational psychology to address security challenges.

  • speaker photo
    Samantha Zee
    Enterprise IT Policy Manager, State of Washington

    As Washington State’s Enterprise IT Policy Manager, Samantha Zee shepherds the IT policy updates and waiver requests. She previously managed a 24/7 answering service, leveraging the latest technology to encourage human connections serving government, private, and non-profit clients. She earned her MBA while serving as Western Washington University’s Travel Program Specialist, leading a campus-wide effort to replace the electronic travel system. She loves seeing tangible improvements in everyday actions, learning how to use new tools and systems, and feeling chaos resolve into functional organization. In her spare time, she makes art, practices yoga, bikes, and hikes with her family.

  • speaker photo
    Christian Espinosa
    CEO, Blue Goat Cyber

    Christian Espinosa is the CEO & Founder of Blue Goat Cyber and a Cybersecurity Professor at Maryville University. He holds over 25 certifications, including the CISSP, CCISO, and PMP. Christian is a U.S. Air Force veteran with a BS in Engineering from the U.S. Air Force Academy and an MBA from Webster University. He holds multiple patents on cybersecurity attack and defense. Major recent projects include penetration testing and assessments of commercial aircraft, medical device penetration testing, and numerous incident response projects. When Christian isn’t protecting us from cybercriminals, he climbs mountains, travels the world, teaches outdoor wilderness survival, and competes in Ironman triathlons.

  • speaker photo
    Lisa Plaggemier
    Executive Director, National Cybersecurity Alliance

    Lisa Plaggemier is Executive Director at the National Cybersecurity Alliance. She is a recognized thought leader in security awareness and education with a track record of engaging and empowering people to protect themselves, their families, and their organizations. Lisa is a University of Michigan graduate (Go Blue!) and while she wasn’t born in Austin, Texas, she got there as fast as she could.

  • speaker photo
    Stanton Gatewood
    Cyber Security Advisor & Georgia State Coordinator, DHS CISA

    Mr. Stanton Gatewood is the U.S. DHS/CISA - R4 Cyber Security Coordinator - State of Georgia. He is the former Chief Information Security Officer for the State of Georgia and Board of Regents of the University System of Georgia and the University of Georgia.

    Stanton has more than 35 years of experience in cybersecurity program management and strategic planning, executive leadership, including the U.S. military, state, local, federal governments, higher education, and several top 10 global corporations. He has also served as the Vice President for Information Technology and the Chief Information Officer (CIO) for Albany State University. He has built two centers of excellence, one for cryptography and one for cyber awareness and training.

  • speaker photo
    Allison K. Prout, Esq.
    Senior Counsel, Constangy, Brooks, Smith & Prophete

    Allison Prout is Senior Counsel at Constangy, where she represents clients, including SaaS providers, data aggregators, and healthcare-covered entities, in complex technology transactions with a specialized focus on data privacy and security contractual requirements. She develops and implements contracting procedures for clients, including international businesses that span multiple legal jurisdictions. With business goals in mind, Allison also works with clients to develop data security and privacy programs to address compliance with data protection regulations, including the GDPR, CCPA, and other state, federal, and global privacy laws.

  • speaker photo
    Sarah Rugnetta
    Partner, Buffalo, Constangy, Brooks, Smith & Prophete, LLP

    Sarah serves as a vice chair of the Constangy Cyber Team and practices in New York. She leads the provision of compliance advisory services for the Cyber Team, advising clients on strategies to mitigate risk associated with data privacy and security through business-oriented approaches. Sarah has more than 15 years of experience working in the privacy law area. She is a former privacy officer, a former state regulator, and has extensive experience serving as outside counsel for businesses in the fields of health law, data privacy, regulatory compliance, and risk management. She is well-versed in advising clients on the scope and applicability of domestic and international data privacy laws. A former Assistant General Counsel with the Vermont Department of Financial Regulation, Sarah regularly interfaces with state and federal agencies in response to investigations, enforcement actions and compliance audits. Sarah holds the Certified Information Privacy Professional for European law (CIPP/E) credential. She received her J.D. from the University of Buffalo and is admitted to practice in New York and Vermont.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a seasoned technology executive recognized and awarded for innovation, business capability transformation, and thoughtful mentorship. Most recently, VJ is the founding partner at CYFORIX, a global cybersecurity research, advisory, and strategic consulting firm delivering solutions to public and private sectors. He also serves as the CEO at TORQE, a specialized advisory firm focused on analytics, automation, and convergent technologies. VJ is the co-host of ELEVATEINTEL, a podcast series at the nexus of technology, social, and defense.

    With more than 25 years of pioneering enterprise technology, cybersecurity, privacy, and compliance & risk management experience, VJ has a detailed track record of designing, implementing, and leading highly successful programs, products, and services at multinational Fortune 100 brands spanning CPG, telecom, media, supply chain, healthcare, and finance segments. As a strategic thought leader, VJ has delivered the first of its kind "Supply Chain Security" & “Omni-channel Risk Management” frameworks. As a published author and featured keynote speaker at global industry events, he approaches disruptive digital paradigms with innovation, creativity, and active collaboration with his key industry peers, researchers, national & international law enforcement, and defense groups.

    VJ is an active mentor at various incubators and accelerators groups, serves as an advisory board member for growth stage companies. As a strategic adviser to VC & PE firms, he specializes in developing market analysis, competitive product road maps, and guides in opportunity mapping. As a board member and subject matter advisor to CEOs and corporate directors, VJ evaluates and audits enterprise technology and cybersecurity programs for veracity and operational effectiveness.

    VJ is passionate about animal rights and giving back to the technology and security industry. He has created a rescue and foster care group for large breed dogs. He is actively engaged with academic institutions and purpose-driven professional groups like Minorities in Cyber Security, where he serves as a board member and chair of mentorship programs to develop the next generation talent through coaching and facilitating scholarships for technology and cybersecurity education.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes