Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, November 13, 2025
    10:30 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    11:00 am
    OPENING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Floor

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Mind Over Malware: Profiling the Human Adversary in Public Sector Attacks
    • session level icon
    speaker photo
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    To stop an adversary, you must first understand them. This session moves beyond traditional cyber defense to explore the human element driving attacks on critical infrastructure. In “Mind Over Malware,” we dissect the “who” and “why” behind today’s most significant threats—from nation-state sabotage to criminal campaigns. By examining the psychological drivers, cultural biases, and cognitive patterns of attackers, we reveal how to anticipate their next move. You will leave with practical strategies for integrating behavioral profiling with technical intelligence, transforming your ability to predict, attribute, and neutralize threats to the systems we all depend on.
    12:00 pm
    Ransomware: How to Stay Off the Front Pages
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm
    12:00 pm
    Cognitive Computing in the New Age of AI
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session description to come.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    The Psychology of Phishing: Designing Human‑Centered Awareness Programs
    • session level icon
    speaker photo
    GRC Officer, Georgia Tech Research Institute
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Phishing is still the most common attack method because it taps into natural human biases. In this session, we’ll break down the key psychological triggers—like authority, urgency, and social proof—that make these attacks work.

    You’ll learn how to build awareness programs that actually connect with employees by focusing on what motivates real behavior. We’ll walk through a practical framework for designing empathy-based simulations, tracking behavior change over time, and improving your training based on what works.

    You’ll walk away with a proven, psychology-based blueprint and ready-to-use templates to build phishing awareness programs that cut click rates by over 30% in just three months.

    1:00 pm
    Securing the Supply Chain
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    A discussion of managing third-party risk and how to manage expectations and contracts with vendors.

    1:00 pm
    [Panel] Securing the Village: A CISO's Playbook for the Modern University
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    A major university isn’t a typical enterprise; it’s a sprawling, dynamic village. It’s a research hub, a healthcare provider, a residential community, and a public venue, all operating under one banner. This complex ecosystem is built on a foundation of academic freedom and open collaboration, principles that often challenge traditional cybersecurity models.
    Join our panel of leading Higher Education CISOs for a candid discussion on navigating this unique landscape. We’ll move beyond generic threats and delve into the specific complexities of their world: from protecting priceless intellectual property from nation-state actors to securing a transient student body and managing the risk of a campus-wide IoT ecosystem. This session is designed for the security professionals on the front lines. You will learn how your leaders balance the mission of openness with the mandate of protection and how collaboration between institutions creates a stronger defense for all. Walk away with a deeper understanding of the “why” behind your work and new strategies for securing the modern academic village.
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Breaking Protocol: Email Subversion in Dark-Net and AI Remediation
    • session level icon
    speaker photo
    Doctoral Researcher, Oakland University
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    The dark web hosts numerous encrypted email providers marketed as privacy-centric platforms. However, many of these services are increasingly subverted by malicious actors—ranging from cybercriminals to extremist groups—who exploit weak authentication protocols, flawed onion routing implementations, and unmonitored registration pipelines. This study identifies and demonstrates key vulnerabilities in these anonymous email infrastructures, including account hijacking, metadata leakage, and bot-based mass account creation. We showcase real-world exploitation tactics used to bypass safeguards and embed persistent backdoors.

    2:00 pm
    Navigating the Privacy Patchwork Quilt of Laws and Regulations
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    The United States has become a patchwork of conflicting and overlapping data privacy regulations as individual states race to protect consumer rights and create comprehensive privacy laws. This presentation will delve into the complex landscape of state privacy laws, examining key provisions, compliance challenges, and potential impacts on businesses. We will explore how these varying regulations create an ever-changing environment for organizations operating across state lines, creating challenges for innovation and consumer trust. Additionally, the presentation will discuss the ways in which the United States is leveraging other laws (consumer protection, tort law, and older federal laws) to create privacy protections where no general state or federal privacy laws currently exist.

     

    2:00 pm
    Starting Your Zero Trust Journey on the Right Foot
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Session description to come.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    [Panel] Beyond the Breach: CISO Playbooks for the Public Sector Pro
    • session level icon
    speaker photo
    CISO, Jefferson County, Colorado
    speaker photo
    CISO, City of Chicago, Department of Technology & Innovation
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

     Forget the typical CISO panel. This isn’t about high-level problems; it’s about practical solutions for the professionals on the front lines. Join a candid conversation with top City, State, and County CISOs as they open their playbooks to reveal the strategies that work in the real world of government. We’ll bypass the buzzwords and get straight to what matters: how to translate technical risks into boardroom wins, what non-technical skills will get you promoted, and how to build a resilient team culture that thrives, even with limited resources. This is your opportunity to learn from the leaders who have been in your shoes. Walk away with actionable insights and proven tactics to elevate your work, advance your career, and make a real impact in your organization.

    3:00 pm
    Developing Strategies and Governance Policies Around AI
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    As AI continues to revolutionize the business landscape, organizations face the critical challenge of harnessing its potential while mitigating associated risks. This panel session brings together experts from varying industries to explore the intricacies of developing comprehensive AI strategies and governance policies.

    Our presenter(s) will delve into:

    • The current state of AI adoption across various industries and its impact on cybersecurity
    • Key components of an effective AI strategy, including alignment with business objectives and ethical considerations
    • Designing governance frameworks that ensure responsible AI use while fostering innovation
    • Addressing AI-specific risks, including bias, privacy concerns, and potential security vulnerabilities
    • Regulatory landscape and compliance requirements for AI implementation
    • Best practices for data management and protection in AI-driven environments
    • Ethical considerations in AI development and deployment
    • Strategies for building AI literacy within organizations
    • Future trends and preparing for the evolving AI landscape

    Gain valuable insights into creating balanced, forward-thinking AI strategies that maximize benefits while maintaining robust security and ethical standards. The session provides practical guidance on navigating the complex intersection of AI, business objectives, and regulatory requirements.

    3:00 pm
    Top 10 Worst Patch Management Practices
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm
    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    You Are Not a CISO, You Are a 'CO IS'
    • session level icon
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

    In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

    4:00 pm
    Cyber Intelligence Briefing: Defending Public Trust and Civic Infrastructure
    • session level icon
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm
    Government agencies at every level are on the front lines of a persistent cyber conflict, entrusted with safeguarding citizen data, delivering essential services, and upholding public trust. This presentation delivers a focused intelligence briefing on the threats facing the public sector. We will dissect recent attacks on civic infrastructure, analyze the tradecraft of nation-states engaged in cyber espionage, and map the emerging trends in criminal campaigns targeting government entities. This session is designed for public sector leaders and technical staff, providing actionable intelligence to harden defenses, ensure the continuity of government, and protect the sensitive data that powers our society.
Exhibitors
  • Proofpoint
    Booth:

    Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.

    Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Cameron H. Malin
    Cyber Behavioral Profiler, FBI (Ret.) and Modus Cyberandi

    Cameron Malin, JD, CISSP, is the founder of Modus Cyberandi, a bespoke Cyber Behavioral Profiling consultancy specializing in the assessment of cyber threat actor decision making, adversary tradecraft, cyber deception, and cognitive vulnerabilities. As a retired Behavioral Profiler with the Federal Bureau of Investigation (FBI), he has more than 22 years of experience investigating, analyzing, and profiling cyber adversaries across the spectrum of criminal to national security attacks.

    During his tenure in the FBI, he was the founder of both the FBI Behavioral Analysis Unit's (BAU) Cyber Behavioral Analysis Center (CBAC), the FBI BAU's methodology and application of science-based behavioral profiling and assessment to national security and criminal cyber offenders—and the BAU’s Deception and Influence Group (DIG), a uniquely trained and experienced cadre of Behavioral Profilers specialized in analyses and countermeasures to adversary cyber deception campaigns and influence operations.

    He is a co-author of the authoritative cyber deception book, "Deception in the Digital Age: Exploiting and Defending Human Targets Through Computer-Mediated Communications" (published by Academic Press, an imprint of Elsevier, Inc.), and co-author of the Malware Forensics book series: "Malware Forensics: Investigating and Analyzing Malicious Code," "Malware Forensics Field Guide for Windows Systems," and "Malware
    Forensics Field Guide for Linux Systems" (all published by Syngress, an imprint of Elsevier, Inc.).

  • speaker photo
    Emmanuel Nwajiaku
    GRC Officer, Georgia Tech Research Institute

    Emmanuel Nwajiaku is a GRC Officer at Georgia Tech Research Institute and an Instructor. He holds CISSP, Security+, and Network+ certifications, along with a Secret clearance. Emmanuel focuses on AI-enhanced security policies and human-centered defense strategies. He has led awareness programs that reduced phishing click rates by 30% and teaches these approaches in both corporate and academic settings.

  • speaker photo
    Panel Discussion
  • speaker photo
    Sarath Shanker
    Doctoral Researcher, Oakland University

    Sarath Shanker is a Ph.D. candidate in Computer Science at Oakland University, specializing in cybersecurity and artificial intelligence. He holds a Master’s degree from Northeastern University, Boston, and has over 10 years of industry experience in software development, cloud infrastructure, and AI systems. His research focuses on adversarial threats in privacy-preserving environments, darknet infrastructure security, and the ethical use of AI in cyber defense.

  • speaker photo
    Ashley Bolton
    CISO, Jefferson County, Colorado
  • speaker photo
    Bruce Coffing
    CISO, City of Chicago, Department of Technology & Innovation

    Bruce Coffing is an information security professional with over twenty-five years industry experience in information technology and cybersecurity. He is currently the Chief Information Security Officer for the City of Chicago. Prior to joining the City of Chicago, Mr. Coffing held Senior Vice President information security positions at Bank of America and was a Senior Manager at consulting firm Accenture. Mr. Coffing holds the Certified Information Systems Security Professional (CISSP) certification.

  • speaker photo
    Panel Discussion
  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

LEARN AND CONNECT VIRTUALLY

Join your InfoSec peers for expert-led sessions on today's pressing security topics. Sign up today!