Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Wednesday, February 25, 2026
    10:30 am
    Networking Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:30 am - 5:00 pm
    Location / Room: Exhibitor Hall

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    Also, look for “Cyber Connect” discussions on select topics and join the conversation.

    11:00 am
    OPENING KEYNOTE
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    12:00 pm
    Your Internal AI Empowering Innovation While Reducing Inadvertent Insider Threats
    • session level icon
    Focus Areas: Generative AI / LLMs, Insider Threat, Data Privacy & Protection, Enterprise Security, Risk Management
    speaker photo
    Sr. Director, Cyber Security, Acumatica, Inc.
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    The explosive adoption of generative AI and large language models (LLMs) has transformed how organizations work, enabling employees at all levels to accelerate tasks, generate insights, and drive innovation. Yet this democratization of AI potentially introduces a significant and often overlooked risk: inadvertent insider threats. This presentation, titled “Your Internal AI”, examines how the convenience of “unsubscribed” mainstream AI tools has dramatically increased the attack surface for data exfiltration through non-malicious insider actions. We will explore real-world consequences, regulatory implications, and the growing awareness gap that leaves even sophisticated organizations vulnerable.

    The core message is one of empowerment rather than restriction: organizations can and should provide their teams with the full power of state-of-the-art LLMs without compromising security. “Your Internal AI” introduces a secure, enterprise-ready alternative that enables seamless use of mainstream models while automatically safeguarding sensitive information. Through intelligent pre-processing, redaction, anonymization, and policy enforcement, sensitive data is protected before it ever leaves the organization’s control, ensuring compliance and preserving privacy. Attendees will see this solution in action through a live demonstration, illustrating how users can interact naturally with powerful LLMs in everyday business related activities, while the system transparently secures confidential content in real-time.

    By the end of the session, participants will understand not only the risks posed by unchecked AI usage but also how to deploy “Your Internal AI” as a strategic enabler: delivering the productivity gains of cutting-edge AI to every employee, securely and responsibly.

    12:00 pm
    Medical Device Cybersecurity
    • session level icon
    Practical information on the evolving medical device cybersecurity ecosystem
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    The recent escalation of cyber-attacks and the potential for combined cyber and physical attacks means the healthcare industry must better secure itself. We’ll describe “whole of community” approaches to medical device vulnerability management and proactively developing regional plans that integrate cyber into overall emergency preparedness and response.

    12:00 pm
    Securing the Supply Chain
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    A discussion of managing third-party risk and how to manage expectations and contracts with vendors.

    12:00 pm
    AI Governance in Healthcare
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    Session description to come.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm
    Location / Room: Exhibitor Hall

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    1:00 pm
    Pick Your Poison: The Healthcare Leadership Face-Off
    • session level icon
    Focus Areas: Healthcare Security, Leadership & Strategy, Risk Management, Incident Response, IoT / Medical Device Security
    speaker photo
    Deputy CISO, Collective Health
    speaker photo
    Digital Event Director, SecureWorld
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    In the high-stakes world of healthcare cybersecurity, there are rarely perfect solutions—only difficult trade-offs. Join us for an unscripted, high-energy session where top Health Sector leaders face off on the industry’s toughest hypothetical scenarios.

    Moderated in a rapid-fire game show format, our panelists will be presented with difficult “Would You Rather” choices ranging from ransomware dilemmas and legacy IoT risks to budget constraints and insider threats. They won’t just pick a side; they have to defend it.
    Attendees will gain a unique window into the minds of security leaders, understanding how they weigh patient safety against data privacy, and operational uptime against regulatory compliance. Come ready to vote on who makes the best case for the worst situations.

    1:00 pm
    [Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security Teams
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    This panel discussion will confront the challenge of building infosec teams with the skills to manage stress under pressure. Three cybersecurity executive leaders will explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group will look at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.
    1:00 pm
    Healthcare's Data War Has Begun
    • session level icon
    Focus Areas: Healthcare Security, Cloud Security, Artificial Intelligence, Data Governance, Leadership & Strategy
    speaker photo
    Cybersecurity Expert; Author of “Cyber Crisis”
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Healthcare is living through the greatest digital convergence in history—where AI, cloud computing, and cybersecurity are no longer separate disciplines, but interdependent forces shaping how patient care is delivered and how Protected Health Information (PHI) is managed. In this new era, your most valuable asset—patient trust and data—is under constant threat, not just from cybercriminals targeting hospitals, but from the rapid digitization of your own clinical infrastructure.

    In this high-impact session, Dr. Eric Cole, former CIA hacker and trusted advisor to Fortune 100 CEOs, exposes the critical blind spots healthcare organizations face as they race to adopt clinical AI and migrate to the cloud—often without a coherent data protection strategy. You’ll discover how attackers are exploiting this convergence to bypass traditional hospital defenses, how AI is both a weapon against privacy and a shield for defense, and why the cloud isn’t inherently secure for medical data—unless you make it so.
    Whether you’re a CEO, CISO, or healthcare leader, this session will empower you with actionable frameworks to:
    The convergence is already here. The question is, are you leading with confidence, or leaving your patient data on life support?
    1:00 pm
    Mapping Healthcare Risks: Medical Device Exposures Trends
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    This session will provide an in-depth analysis of the current landscape of medical device exposures, leveraging insights from global scans and data trends. Attendees will explore the evolving attack surface in the healthcare sector, gain visibility into prevalent vulnerability trends, and uncover actionable strategies to enhance their cybersecurity posture. Designed for healthcare security executives, this session equips organizations to identify and prioritize exposure risks, ensuring patient safety and organizational resilience in the face of emerging threats.

    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    2:00 pm
    Healthcare Cyber Debrief
    • session level icon
    Focus Areas: Healthcare Security, Geopolitics & Cyber Warfare, Critical Infrastructure, Nation-State Threats, Operational Resilience
    speaker photo
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC
    speaker photo
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Healthcare is no longer on the sidelines of global conflict; it is a primary target. This session connects the dots between global geopolitical volatility and the immediate risks to hospital operations and patient safety. We will examine how conflicts involving major players like Russia, China, and the EU are reshaping the cyber threat landscape, specifically targeting medical research, critical infrastructure, and the healthcare supply chain.

    The discussion will pivot to the “internal” threat, analyzing the rapid evolution of AI in diagnostics and administration, and the resulting privacy minefield. From financially motivated ransomware gangs to state-aligned actors seeking to disrupt care, we will profile the adversaries threatening the sector. Join us for a 2026 outlook that moves beyond compliance, offering a battle-tested framework for maintaining resilience in the face of global instability.

    2:00 pm
    Secure and Explainable AI in Healthcare
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Healthcare technology organizations are quickly adopting AI solutions to enhance clinical processes, patient engagement, and operational efficiency. Technology and cybersecurity leaders must embrace the challenge of securing AI solutions while maintaining ethical integrity and regulatory compliance. This session offers a step-by-step blueprint for designing, deploying, and sustaining AI systems in a secure, ethical, explainable, and compliant manner. Drawing on case studies, you will learn about proven strategies for integrating cybersecurity, privacy, and regulatory controls for ethical and explainable implementation of AI solutions in the healthcare industry.

    2:00 pm
    Defend and Recover: How MHXDR Shields Healthcare from Its Most Visible Threats
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Healthcare is under siege—not only from ransomware, but from the systemic complexity that undermines fast, effective cyber defense. Traditional detection tools leave healthcare systems blind to gaps, siloed in response, and slow to adapt. It’s time for a shift. Join Blackwell Security for a strategic dive into Healthcare-Specific XDR (MHXDR) and how tailored threat operations create speed, precision, and resilience in the face of relentless threats.

    This session will explore how our Helix threat operations team and Blackwell Pulse platform work together to unify telemetry, automate triage, and leverage both internal and external threat intelligence—including dark web monitoring—for real-time enrichment and contextual response. We’ll walk through how our Managed Detection & Response (MDR) offering ensures that every alert is relevant, every response is decisive, and every client benefits from collective intelligence. More importantly, we’ll cover how our ransomware resilience layer (Blackwell Aegis) enables near-immediate recovery from attacks that evade traditional EDR, with automated isolation, recovery, and response—because in healthcare, delays cost lives.

    Whether you’re a CISO or security architect, this session will offer a pragmatic view of how to prevent what you can, respond faster when it counts, and recover without the chaos.

    2:00 pm
    [Panel] The Current Threat Landscape in Healthcare
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm

    Join us as we dive into several of the top concerns in Healthcare. From deep web cards to BECs, ransomware, and more! Bring your questions for the panel.

    2:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    2:45 pm - 3:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    3:00 pm
    Inside the Digital Mind: How Cyberpsychology Shapes Behavior, Risk, and the Cyber Landscape
    • session level icon
    Focus Areas: Social Engineering, Security Awareness & Culture, Human-Centric Security, Cyber Psychology, Risk Management
    speaker photo
    Associate CISO, St. Luke's University Health Network
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    This session explores how human behavior in digital environments directly shapes modern cyber risk. Drawing from the research of forensic cyberpsychologist and author Mary Aiken, this talk reveals why people think, react, trust, click, overshare, and make decisions differently online — and how attackers exploit those predictable patterns. Participants will learn how digital psychology influences threat exposure, identity compromise, misinformation, social engineering, and organizational security culture. Attendees will walk away with practical, human-centered strategies for building safer digital environments and strengthening security programs by aligning controls with real human behavior.

    3:00 pm
    [Panel] Challenges in Healthcare Leadership
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Healthcare information security leadership faces a dynamic and intensifying threat landscape. This panel of experts will address critical challenges, including escalating ransomware attacks, stringent privacy regulations, and the complexities of managing insider threats. Discussions will explore strategies for mitigating risks associated with third-party vendors, addressing staffing shortages in cybersecurity, and finding downtime to recharge. Panelists will share insights on balancing patient safety with data protection, navigating compliance requirements, and building resilient security programs in an increasingly interconnected healthcare environment.

    3:00 pm
    Exploiting the Human Side: Phishing, Social Engineering, and Con Artists
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:00 pm - 3:45 pm

    Session description to come.

    3:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    3:45 pm - 4:00 pm

    Visit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.

    4:00 pm
    [Closing Keynote] Critical Condition: The Health-ISAC Global Threat Report
    • session level icon
    Focus Areas: Healthcare Security, Cyber Threat Intelligence (CTI), Supply Chain Security, Patient Safety, Operational Resilience
    speaker photo
    Strategic Threat Analyst, Health-ISAC
    Registration Level:
    • session level iconOpen Sessions
    4:00 pm - 4:45 pm

    Healthcare is no longer just a target for data theft; it is a battleground for patient safety and operational resilience. In this exclusive session, the Health-ISAC (Health Information Sharing and Analysis Center) unpacks their Annual Global Threat Report, revealing the most dangerous trends facing the sector today. From the evolution of “patient extortion” tactics and supply chain vulnerabilities to the weaponization of AI, we will dissect the adversaries’ new playbook. Join us to move beyond the headlines and get the vital intelligence needed to immunize your digital estate against the next generation of cyber threats.

Exhibitors
  • Health-ISAC
    Booth: n/a

    Health-ISAC (Health Information Sharing and Analysis Center) plays an essential role providing situational awareness around cyber and physical security threats to the Health Sector so that companies can detect, mitigate, and respond to ensure operational resilience.

    The non-profit, private sector organization connects thousands of health security professionals globally to share peer insights, real-time alerts, and best practices in a trusted, collaborative environment.

    As the go-to source for timely, actionable, and relevant information, Health-ISAC is a force-multiplier that enables global health organizations of all sizes to enhance situation awareness, develop effective mitigation strategies, and proactively defend against threats every single day.

  • Ping Identity
    Booth: n/a

    Ping Identity delivers intelligent identity solutions for the enterprise. We enable companies to achieve Zero Trust identity-defined security and more personalized, streamlined user experiences.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Mike Muscatell
    Sr. Director, Cyber Security, Acumatica, Inc.

    Mike Muscatell is a seasoned IT veteran with more than 21 years in the Information Security field. He is a certified ethical hacker (CEH). Was honored as top 100 professionals in the Information Security field by Strathmore's for 2014. Member of a number of security organizations, including InfraGard and the U.S. Chamber of Commerce Cyber Committee.

  • speaker photo
    Arpine Long
    Deputy CISO, Collective Health
  • speaker photo
    Tom Bechtold, Moderator
    Digital Event Director, SecureWorld

    Tom has been part of the SecureWorld team for more than 14 years, having launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the "Remote Sessions" webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.

  • speaker photo
    Panel Discussion
  • speaker photo
    Dr. Eric Cole, DPS
    Cybersecurity Expert; Author of “Cyber Crisis”

    Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.

  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; U.S. Air Force (Ret.); Chairman, Cedric Leighton Associates, LLC

    Cedric Leighton is a CNN Military Analyst and a retired United States Air Force Colonel. On CNN, he has provided incisive commentaries on the Israel-Hamas War, the War in Ukraine, the U.S. withdrawal from Afghanistan, and numerous other conflicts around the world. His analysis has been seen by millions of viewers around the world and provided much needed context to some of the most pressing national security issues of our time. As a U.S. Air Force officer, Colonel Leighton served at U.S. Special Operations Command, the Joint Staff, and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star. After serving 26 years as a U.S. Air Force Intelligence Officer, Col. Leighton founded a strategic risk consultancy and became the co-founder of CYFORIX, where he advises multinational businesses on developing better cyber strategies designed to reduce risk and unpredictability.

  • speaker photo
    VJ Viswanathan
    Founding Partner, CYFORIX (Former CISO & Sr. Executive at Keurig Dr Pepper, Comcast, HD Supply, and GE)

    VJ Viswanathan is a global technology and security executive with more than 25 years of experience spanning AI, cloud and enterprise platforms, cybersecurity, privacy, and technology risk. He has held senior executive roles at large enterprises, including Keurig Dr Pepper, Comcast, HD Supply, and GE, where he led technology, cybersecurity, privacy, and risk programs across highly complex and distributed environments.

    Today, VJ works with boards and executive teams on the security challenges created by AI, automation, and digital sprawl—helping leaders understand where traditional security models fall short and how to adapt. He currently serves as Founding Partner of CYFORIX and CEO of TORQE, focused on strategic defense and enterprise transformation.

  • speaker photo
    Krista Arndt
    Associate CISO, St. Luke's University Health Network

    Krista Arndt is the Associate CISO at SLUHN. As the Associate CISO, Krista is responsible for managing the security program's day to day operational effectiveness. Krista has been working in information security in various capacities for more than 15 years. In her previous roles, Krista assisted with developing and leading security programs in national healthcare, crypto, finance, and the Department of Defense. She currently holds her CISM and CRISC certifications and NHRA competition driver's license.

    Krista is an active member of ISACA, serves as InfraGard Philadelphia Chapter’s Healthcare Sector Chief, serves on Neumann University's Business Advisory Council, and is Marketing Committee Chair for Women in CyberSecurity (WiCyS) Delaware Valley Affiliate. Through this service, Krista's mission is to give back to her community by providing mentorship and support for aspiring cybersecurity professionals, especially for women who wish to enter the field.

    When off the clock, Krista takes her affinity for overcoming challenges to the garage and the race track, where she enjoys building and improving her own race car, competing as a driver in national drag racing events with her family, and using her racing as a forum to advocate for neurodiversity awareness and inclusion.

  • speaker photo
    Ethan Muntz
    Strategic Threat Analyst, Health-ISAC

    Ethan Muntz is a Strategic Threat Analyst at Health-ISAC, where he specializes in identifying emerging threats to the global health sector and developing proactive risk mitigation strategies. With a strong background in Open Source Intelligence (OSINT) and dark web investigations, Ethan previously served as a task force member for the Anti-Human Trafficking Intelligence Initiative and led cybercrime operations at the Center for International Cyber Intelligence.
    He holds a Master of Science in Cyber Security and Privacy from the University of Central Florida and a B.S. in Global Security and Intelligence Studies. His expertise spans machine learning, incident handling, and geopolitical analysis, supported by his specialization in Chinese and Asian studies.

Learn and earn 6 CPE credits!

Hear from cybersecurity leaders on strategies and best practices for defending healthcare.