Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, November 14, 20239:00 am[PLUS Course] Implementing the NIST Cybersecurity FrameworkvCISO, Cyber Risk Opportunities LLCRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmHave you ever wondered how to actually use the NIST Cybersecurity Framework and apply it to your business or organization?
In this course, you will get an inside look at how cybersecurity, information technology (IT), and business professionals use the NIST Cybersecurity Framework (CSF) to understand and actively manage their risk posture.
You will begin by learning the fundamentals of the NIST Cybersecurity Framework, including:
- What are the components of the framework?
- Why is the framework is valuable?
- What type of organizations can use the framework?
Then, you will dive deeper into the framework to fully understand the Framework Core, the Framework Tiers, and the Framework Implementation Profile.
You will also review various case studies from diverse organizations across the globe, including critical infrastructure organizations, technology companies, governmental organizations, and others.
Finally, we will spend the majority of this course walking you through how to implement this framework within your own organization by conducting a Cyber Risk Mapping (CR-MAP). This CR-MAP of your organization will aid you in identifying your weaknesses and creating a remediation plan to achieve higher levels of security by minimizing your cyber risk.
We even include a free bonus digital workbook that helps you conduct a step-by-step Cyber Risk Mapping at the conclusion of the course.
- Wednesday, November 15, 20237:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:50 amParticipating professional associations and details to be announced.
8:00 amChanging Dynamics of CybersecurityExecutive Director, Americas Region, CRESTRegistration Level:Open Sessions
8:00 am - 8:50 amSession description coming soon.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 am[Opening Keynote] Ukraine vs. Russia: The Cyber WarCNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLCRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterSession description coming soon.
9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 am[Panel] Guardians of the Vault: Cybersecurity Strategies from Financial Sector TitansCISO, PinwheelDirector, Cyber Administration, BlackRockFormer VP, Cyber Strategy, BNY MellonRegistration Level:Conference Pass
10:15 am - 11:00 amDelve into the realm of financial cybersecurity as industry titans take the stage in to share their cutting-edge strategies for threat intelligence and best practices employed to safeguard sensitive data, fortify defenses, and stay steps ahead of cyber threats in a modern world.10:15 amSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Conference Pass
10:15 am - 11:00 amKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
10:15 am[SentinelOne] The Future of Cybersecurity Is AutonomousRegistration Level:Open Sessions
10:15 am - 11:00 amSession description coming soon.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
11:10 amLean On Me: Effective Interdepartmental Communication in Modern TimesCybersecurity Director, Gannett FlemingRegistration Level:Conference Pass
11:10 am - 11:55 amIt is now more important than ever for security professionals to communicate effectively with team members and business stakeholders at all levels, both in-person and virtually. Interdepartmental communication and collaboration can increase compliance and maintain a safe and secure organization. This session focuses on fostering effective communication and collaboration across various departments within the organization.11:10 am[Panel] Symphony of Cyber Defense: Confronting the Crescendo of Threats in the Digital OrchestraIdentifying the Current Threat LandscapeField CTO, Aqua SecurityCISO, New York State Department of EducationRegistration Level:Open Sessions
11:10 am - 11:55 amIn the ever-changing symphony of the cyber realm, a cacophony of threats echoes throughout. Ranging from ransomware to data breaches, phishing, and intricate APTs, the orchestra of cyber threats grows in complexity. Emerging risks like IoT, cloud computing’s unpredictability, AI’s deceptiveness, and cryptocurrency add new layers to our musical security tapestry.
Threat actors—wielding exploit kits and Zero-Day vulnerabilities—orchestrate their attacks, preying on human vulnerabilities in perfect synchronization with state-sponsored cyber operations. To counter this threat, collaboration is essential. Proactive security practices, training cadences, and threat intelligence sharing must happen. The interplay of public and private sectors is key to a resilient digital effort.
Let us march to the beat of constant vigilance, adaptability, and investment in a fortified infrastructure. Together, we will compose a symphony of cybersecurity, safeguarding the digital soundscape and ensuring a melodious future.
11:10 amBEC Attacks: The Stealthiest and Most Lucrative ThreatRegistration Level:Open Sessions
11:10 am - 11:55 am12:00 pmLUNCH KEYNOTERegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote Theater12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)CISO, NFLRegistration Level:VIP / Exclusive
12:00 pm - 12:45 pmAdvisory Council – VIP / INVITE ONLY
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pmRansomware: How to Stay Off the Front PagesRegistration Level:Conference Pass
1:15 pm - 2:15 pm1:15 pm[Panel] Navigating the Cybersecurity Symphony in the Age of AIRegistration Level:Open Sessions
1:15 pm - 2:15 pmGenerative AI, such as ChatGPT and Bard, has incredible potential, but it also brings certain negative elements and concerns for everyone. It is important to address these concerns to ensure responsible and ethical use of AI technology, especially within cybersecurity. This panel covers insider threats, lack of accountability, cybersecurity vulnerabilities, fake data and data privacy, human replacement concerns, and ethical misuse.
By understanding these fears and proactively addressing them through responsible development, robust safeguards, and ongoing monitoring, we can harness the potential of generative AI while mitigating its associated risks. Collaboration between AI researchers, policymakers, and industry professionals is essential to ensure that generative AI technology is developed and deployed in a manner that aligns with ethical standards and human values. Hear from experts in the field on how they’re trying to navigate this new song and dance with AI, what we can expect in the near and distant future, and what it takes to provide the support DevOps teams need.
2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pmBack to the Future: Hot Takes and Rediscovering Cybersecurity BasicsCISO, Ascena RetailRegistration Level:Conference Pass
2:30 pm - 3:15 pmWith all the discussion about the future of cybersecurity and the advent of Artificial Intelligence (AI), it’s time to go “Back to the Future” and rediscover our cybersecurity roots. This session will explore the “Top 5 Basics of Cybersecurity” to ensure you cyber-proof your organization. We’ll also chat through why these basics are still important even as AI evolves in both popularity and usage. Live audience Q&A is welcomed to discuss “hot takes” and lead to thoughtful conversation.
2:30 pmA Modern Security Strategy: Tips on Building Policies for Securing DataRegistration Level:Conference Pass
2:30 pm - 3:15 pmThe world has changed, but have your security policies and tools kept up? What does it mean to have a modern security strategy for securing data in the cloud? An SSE tool can help us address the challenges that organizations face. Here’s how to think, adopt, and integrate with existing solutions.
2:30 pmDeriving Insight from Threat Actor InfrastructureRegistration Level:Open Sessions
2:30 pm - 3:15 pmFrom proactively hunting for unknown attacker infrastructure, to placing the exploitation of vulnerabilities on a timeline often obscured by large spikes in activity, this talk will explore ways in which we can enrich our understanding of the threat landscape beyond that which is shared in threat feeds and reports.
3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pm[Closing Keynote] Cybersecurity Fusion: Uniting Forces for Modern Digital DefenseVP, InfoSec & Technology Risk Manager, WWEDeputy CISO, Corporate Security Engineer, NextdoorRegistration Level:Open Sessions
3:45 pm - 4:30 pmLocation / Room: Keynote TheaterHear from local cybersecurity executives in an electrifying panel discussion on how industry leaders collaborate across sectors, academia, and organizations to tackle evolving cyber threats. You’ll gain valuable insights on innovative strategies, emerging technologies, and interdisciplinary approaches to reinforce digital defenses and protect against cyber risks for your organization. Open Q&A following discussion.
- Aqua SecurityBooth: TBD
Aqua Security is the largest pure-play cloud native security company, providing customers the freedom to innovate and run their businesses with minimal friction. The Aqua Cloud Native Security Platform provides prevention, detection, and response automation across the entire application lifecycle to secure the build, secure cloud infrastructure and secure running workloads wherever they are deployed. Aqua customers are among the world’s largest enterprises in financial services, software, media, manufacturing and retail, with implementations across a broad range of cloud providers and modern technology stacks spanning containers, serverless functions, and cloud VMs.
- CRESTBooth: TBD
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- DrataBooth: TBD
Replace manual GRC efforts, reduce costs, and save time preparing for audits and maintaining compliance. Drata is the world’s most advanced security and compliance automation platform with the mission to help companies earn and keep the trust of their users, customers, partners, and prospects. We help thousands of companies streamline compliance for SOC 2, ISO 27001, HIPAA, GDPR, your own custom frameworks, and many more through continuous, automated control monitoring and evidence collection. Drata is backed by ICONIQ Growth, Alkeon, Salesforce Ventures, GGV Capital, Okta Ventures, SVCI (Silicon Valley CISO Investments), Cowboy Ventures, Leaders Fund, Basis Set Ventures, SV Angel, and many key industry leaders. Drata is based in San Diego, CA with team members across the globe.
- EndaceBooth: TBD
Customers choose Endace products for one primary reason: they deliver, where competitor products fail. Whether it is capture accuracy, fidelity of time stamps, write-to-disk performance or speed of traffic retrieval, Endace is famous for delivering the very best performing products. Telcos, broadcasters, governments, defence departments, investment banks and many other large enterprises trust our products to help them manage their critical data networks.
- Envision Technology AdvisorsBooth: TBD
Envision Technology Advisors is a business and technology consultancy specializing in Digital Transformation, Cybersecurity, Business Continuity, Infrastructure Consulting, Web Design and Development, and much more. With offices in Rhode Island and the Boston area, Envision serves clients throughout New England and beyond.
- KeysightBooth: TBD
Keysight’s portfolio of network security solutions simulate threats, eliminate blind spots, taking control of a rapidly-changing attack surface. Be a hero, not a headline by proving your network is secure simulating attacks, exposing gaps early, and course correct with step-by-step fixes.; protecting users and applications with increased the efficiency, performance, and reliability of your security systems.; patrolling every packet eliminating vulnerable blind spots and decrypt threats hiding in SSL traffic.; and practice your cyber skills enhancing your security and attack response skills against real-world threats.
- LogRhythmBooth: TBD
LogRhythm, a leader in security intelligence and analytics, empowers organizations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company’s patented award-winning platform uniquely unifies next-generation SIEM, log management, network and endpoint monitoring, user entity and behavior analytics (UEBA), security automation and orchestration and advanced security analytics. In addition to protecting customers from the risks associated with cyber threats, LogRhythm provides unparalleled compliance automation and assurance, and enhanced IT intelligence.
- LookoutBooth: TBD
Lookout is a cybersecurity company that makes it possible for individuals and enterprises to be both mobile and secure. With 100 million mobile sensors fueling a dataset of virtually all the mobile code in the world, the Lookout Security Cloud can identify connections that would otherwise go unseen—predicting and stopping mobile attacks before they do harm.
- OktaBooth: TBD
Okta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
- One IdentityBooth: TBD
One Identity, a Quest Software business, helps organizations achieve an identity-centric security strategy with a uniquely broad and integrated portfolio of identity management offerings developed with a cloud-first strategy including AD account lifecycle management, identity governance and administration, and privileged access management. One Identity empowers organizations to reach their full potential, unimpeded by security, yet safeguarded against threats without compromise regardless of how they choose to consume the services. One Identity and its approach is trusted by customers worldwide, where more than 7,500 organizations worldwide depend on One Identity solutions to manage more than 125 million identities, enhancing their agility and efficiency while securing access to their systems and data—on-prem, cloud, or hybrid.
- Outshift by CiscoBooth: TBD
Outshift by Cisco is the incubation engine for Cisco’s emerging technologies exploring innovation in cloud native development, AI/ML, API security, observability, network automation, and more.
Backed by Cisco’s unrivaled portfolio of end-to-end security solutions, Panoptica offers a differentiated experience for complete code to cloud security coverage.
Panoptica is Outshift by Cisco’s cloud native application security solution. It secures modern applications and workloads to ensure end-to-end security and compliance in multicloud environments. Utilizing advanced visual contextual insights along attack paths, Panoptica boosts visibility, accurately prioritizes risks, and offers actionable remediation guidance, securing your entire cloud application stack.
- Palo Alto NetworksBooth: TBD
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world’s greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.
- ProbelyBooth: TBD
Probely is the premier cloud-based application security testing solution designed to empower Security and DevOps teams working efficiently together on a DevSecOps approach built to reduce risk across web applications and RESTful APIs.
Probely empowers Security and DevOps or Development teams to work together to secure their web applications and APIs. Our goal is to narrow the gap between development, security, and operations by making security an intrinsic characteristic of web applications development life-cycle.
With over 30,000 vulnerabilities detection capabilities, including SQLi, XSS, Log4j, OS Command Injection, and SSL/TLS issues, Probely reports vulnerabilities that matter, is false-positive free, and includes detailed instructions on fixing them.
- SecureAuthBooth: TBD
SecureAuth enables companies to determine identities with absolute confidence. Whether you’re seeking to continuously secure employee,
customer or partner access, SecureAuth’s flexible and adaptive platform makes everything fast, frictionless and pain-free. Guaranteed. - SentinelOneBooth: TBD
SentinelOne delivers real-time cloud workload protection, to stop runtime threats targeting VMs, containers and Kubernetes clusters. From endpoints to workloads, to data center and public cloud, innovate quickly knowing SentinelOne has you protected. To learn more, visit www.sentinelone.com or follow us at @SentinelOne, or on LinkedIn and Facebook.
- RubrikBooth: TBD
Rubrik, the Zero Trust Data Security Company, delivers data security and operational resilience for enterprises. Rubrik’s big idea is to provide data security and data protection on a single platform, including Zero Trust Data Protection, ransomware investigation, incident containment, sensitive data discovery and orchestrated application recovery. This means data is ready at all times so you can recover the data you need and avoid paying a ransom. Because when you secure your data, you secure your applications, and you secure your business.
- SaviyntBooth: TBD
Saviynt’s Enterprise Identity Cloud helps modern enterprises scale cloud initiatives and solve the toughest security and compliance challenges in record time. The company brings together identity governance (IGA), granular application access, cloud security, and privileged access to secure the entire business ecosystem and provide a frictionless user experience.
- SSH Communications SecurityBooth: TBD
As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks. Over 3,000 customers across the globe trust the company’s encryption, access control and encrypted channel monitoring solutions to meet complex compliance requirements, improve their security posture and save on operational costs. SSH Communications Security is headquartered in Helsinki and has offices in the Americas, Europe and Asia. The company’s shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. For more information, visit www.ssh.com
- SynopsysBooth: TBD
Synopsys helps development teams build secure, high-quality software, minimizing risks while maximizing speed and productivity. Synopsys, a recognized leader in static analysis, software composition analysis, and application security testing, is uniquely positioned to apply best practices across proprietary code, open source, and the runtime environment. With a combination of industry-leading tools, services, and expertise, only Synopsys helps organizations maximize security and quality in DevSecOps and throughout the software development life cycle.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- Team CymruBooth: TBD
Team Cymru’s mission is to save and improve human lives. We are unrivalled across three disciplines; digital business risk platforms, free to use community services and support services to over 143 Government CSIRT teams.
Our business risk and threat intelligence platforms empower global organizations with unmatched Threat Reconnaissance and Attack Surface Management capabilities to meet the challenges of today’s cyber threats.
Community Services equip those who run the internet to defend it from criminals who wish to disrupt and cause harm, and CSIRT enables Governments the tools to outmaneuver nation state threat actors.
Since 2005, our reputation remains unchallenged.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- ZeroFoxBooth: TBD
Using diverse data sources and artificial intelligence-based analysis, the ZeroFox Platform identifies and remediates targeted phishing attacks, credential compromise, data exfiltration, brand hijacking, executive and location threats and more. The patented ZeroFox SaaS technology processes and protects millions of posts, messages and accounts daily across the social and digital landscape, spanning LinkedIn, Facebook, Slack, Twitter, Instagram, Pastebin, YouTube, mobile app stores, the deep & dark web, domains, email and more.
Led by a team of information security and high-growth company veterans, ZeroFox has raised funding from NEA, Highland Capital, Intel Capital, Hercules Capital and others, and has collected top industry awards such as Red Herring Top 100 North America, the SINET16 Champion, Dark Reading’s Top Security Startups to Watch, Tech Council of Maryland’s Technology Company of the Year and the Security Tech Trailblazer of the Year.
- Kip Boyle, InstructorvCISO, Cyber Risk Opportunities LLC
Kip Boyle is the Virtual Chief Information Security Officer of Cyber Risk Opportunities, whose mission is to help executives become more proficient cyber risk managers. He has over 24 years of cybersecurity experience serving as Chief Information Security Officer (CISO) and in other IT risk management roles for organizations in the financial services, technology, telecom, military, civil engineering, and logistics industries.
- Tom BrennanExecutive Director, Americas Region, CREST
Tom Brennan is the CIO of the national law firm Mandelbaum Barrett PC and leads the U.S. arm of CREST International. In this role, he works with government and commercial organizations to optimize the value of CREST as a cybersecurity accreditation body and industry standards advocate, particularly for companies in the Cybersecurity & Infrastructure Security Agency’s 16 critical infrastructure sectors which are vital to U.S. security, national economy, and public health and safety. As CREST USA Chairman, Brennan spearheads strategic plans for CREST USA’s organizational growth while also serving as an industry evangelist and educator on the value of using accredited cybersecurity products and professionals to improve consumer privacy, security, and protection worldwide.
As a proud U.S. Marine veteran, Brennan became involved with CREST International in 2016 while serving the Global Board of Directors for the Open Web Application Security Project (OWASP). Seeing similar goals, he became more active in the CREST organization and was nominated to lead the organization’s U.S. Advisory in 2019. Over his career, Brennan has amassed security expertise across the cybersecurity spectrum, including penetration testing, vulnerability assessment, application security, threat intelligence, and more. In addition to being CREST USA Chairman, he is the Chief Information Officer of the national law firm Mandelbaum Barrett, overseeing critical infrastructure, privacy, and security operations. He is also an Advisory Board Member of the information services advisory Gerson Lehrman Group, a Cyber Fellows Advisory Council Member, a Member of the Information Technology Advisory Committee of the County College of Morris, a Senior Advisor and Industry Advisory Board Member of the New Jersey Institute of Technology, and a Cyber Fellows Advisory Council Member of the NYU Tandon School of Engineering.
- Col. Cedric LeightonCNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC
Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.
Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.
- Jeff HudesmanCISO, Pinwheel
Jeff is the Chief Information Security Officer at Pinwheel. He leads the Information Security function responsible for securing and protecting information and systems while ensuring overall cyber resiliency. Jeff previously held global leadership positions at DailyPay, Sony and PR Newswire. Jeff also advises several startups and nonprofits. Jeff is a graduate from the University at Buffalo with a degree in Informatics.
- Taylor Milligan CrottyDirector, Cyber Administration, BlackRock
Taylor M. Crotty leads BlackRock Information Security’s Cyber Wargames team and is responsible for education, training and process development related to Cyber Incident Response & Recovery, measuring and managing cyber risks across the organization and Third Party Security for BlackRock’s critical service providers.
Taylor is focused on assuring the resiliency of BlackRock and key partners critical to BlackRock’s business operations before, during, and after a cyber event. She coordinates periodic, tabletop-style resilience exercises (“Wargames”) with BlackRock’s most critical provider partners, internal business functions, and at the sector level. Taylor also drives strategic workflow analysis initiatives for Information Security, leveraging deep technical expertise to identify and mitigate security risks across the Firm and optimize our ability to protect information.
Prior to assuming her current role, Taylor led BlackRock's Third Party Security program where she was responsible for assuring the security of outsourced workflows, establishing a stronger baseline level of protection with service providers through contracting and conducting security assessments of critical provider partners to ensure Firm and Client information was protected with the requisite care in accordance with industry best practices.
Taylor first developed a Third Party Security practice while working as a consultant with Security Risk Advisors. She administered Third Party Security programs for a large private healthcare company and a financial services company notable for being the nation’s primary provider of private-label credit cards.
Taylor serves as a board member for the University of Michigan College of Engineering Alumni Board. She has been formally invited to share her experience and thought leadership in the cyber resilience space as a speaker at various events and industry conferences.
- Kamara Watson, Jr.Former VP, Cyber Strategy, BNY Mellon
- Tamika BassCybersecurity Director, Gannett Fleming
Tamika Bass is an Information Security professional with more than 17 years’ experience in information security, including information security governance and risk management. Tamika is passionate about improving communication and understanding of information security in the industry. Tamika is an active speaker, college professor and enjoys spending her time educating technical staff on the importance of communicating effectively in the Information Technology space. Tamika holds the following certifications: CISA,CRISC, HCISPP, CBCP.
- Tsvi KorrenField CTO, Aqua Security
Tsvi Korren, CISSP, has been an IT security professional for over 25 years. In previous positions at DEC and CA Inc., he consulted with various industry verticals on the process and organizational aspects of security. As the Field CTO at Aqua, he is tasked with delivering commercial and open source solutions that make Cloud Native workloads the most secure, compliant and resilient application delivery platform.
- Marlowe Cochran, ModeratorCISO, New York State Department of Education
Marlowe Cochran has been working in the IT field for over 30 years, with 20 plus years in information security roles. He has worked in a multitude of sectors from government to health care. In his current role at the New York State Department of Education, he is the Chief Information Security Officer. Marlowe currently collaborates with internal and external stakeholders in regard to modernizing technology and data sharing; he oversees data risk assessment/management, incident response, the development of policies/procedures, and manages the overall risk posture of the agency.
- Panel Discussion
- Tomás Maldonado, ModeratorCISO, NFL
Tomás Maldonado is the Chief Information Security Officer (CISO) at the National Football League (NFL). He is globally responsible for leading the information security program for the League and its entities. Maldonado has over 23 years of experience in this area, having led global information security teams and programs at several large international organizations.
Prior to Joining the NFL, Maldonado was the CISO at International Flavors & Fragrances where he was globally responsible for establishing and leading the Cybersecurity & Technology Risk Management business unit.
Maldonado was also an executive director and CISO for the corporate sector of JPMorgan Chase, where he established and shaped the future direction of the security program and focus for the line of business. He was also a VP of technology risk management at Goldman Sachs where he worked on several key initiatives namely creating and leading the data loss protection program. He had additional opportunities at Schroders where he was the network security officer, Ernst & Young and Bloomberg LP.
Maldonado serves as an advisory board member to several innovative companies. He has several industry recognizable certifications: he is a CISSP, a CISM, a CDPSE, and a CRISC. He also holds a Bachelor of Science in computer science from Fordham University.
- Okta Representative
- Panel Discussion
- Robyn ReadyCISO, Ascena Retail
With over 17 years’ experience in the cybersecurity field, Robyn has led five organizations in their transformation from no security program or a minimal security program to a mature security organization. Starting with an organization that needed to achieve NIST compliance to survive, moving to a large financial firm, and then into the retail industry Robyn has been instrumental in achieving continuous risk reduction for all these organizations. These risk reductions allowed her to move to her next challenge while leaving a team that was set up to succeed and continue their maturity journey. This includes not only cybersecurity but also the IT risk, IT compliance, and when it came, privacy disciplines. Currently responsible for security, IT risk, IT compliance, and privacy at the Knitwell Group, Robyn has been asked to lead the IT Operations team, as well. This adds the Service Desk, Identity and Access, Major Incident Response, Production Control, and Operations to her responsibilities, which is a little bit of back to the future for her, as she started her journey on the Help Desk and in Professional Services, prior to making the move into the security field.
- Lookout Representative
- Team Cymru Representative
- Robert BlytheVP, InfoSec & Technology Risk Manager, WWE
Robert has over 30 years of Information Technology experience and has been a leader in the cybersecurity space for almost a decade. His areas of expertise are in Cybersecurity Operations and Threat Intelligence, Cybersecurity Engineering, Information Security and Governance, Data Privacy and Compliance, and Technology Risk Management.
- Kristen BeneduceDeputy CISO, Corporate Security Engineer, Nextdoor
- Panel Discussion

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your regional cybersecurity community for learning and professional growth. Sign up today!
