Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Tuesday, October 28, 20259:00 am[PLUS Course] Building a Cybersecurity Program to Safeguard AI Systems and ApplicationsSr. Cybersecurity Consultant, Wilson CyberRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmAI technology enables computers and machines to simulate human learning, comprehension, problem solving, decision making, creativity and autonomy. Applications and devices equipped with AI can see and identify objects, understand, and respond to human language, learn from new information and experience. AI based applications (for example autonomous vehicles) can make detailed recommendations to users and experts, act independently, replacing the need for human intelligence or intervention. This class focuses on how the development of AI capabilities, technologies, and tools impact cybersecurity.
Lesson 1: What is Artificial Intelligence?
Includes an overview of Artificial Intelligence including how AI works, AI architecture components and processes (models, algorithms, workflows). We will cover Generative AI, Large Language Models (LLMs), foundation models and AI agents. In addition, we will discuss today’s top AI use cases across multiple industry sectors.Lesson 2: What are the AI threats?
Includes an overview of MITRE ATLAS (a framework that provides adversary profiles, techniques, and mitigations for securing AI-enabled systems). We will cover AI threats based on FS-ISAC Adversarial AI Framework and NIST AI 100-2: Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. AI Threats include those related to AI models, the data such models are trained and tested on, the third-party components, plug-ins, and libraries utilized in their development, as well as the platform models are hosted on.Lesson 3: What are the AI vulnerabilities?
Includes an overview of AI vulnerabilities including data related vulnerabilities and model related vulnerabilities. We will cover the Top 10 for LLM Applications (2025). We also cover the top vulnerabilities found in AI Agents.Lesson 4: What are AI security controls?
Includes an overview of the Google Secure AI Framework (SAIF), the OWASP AI Security and Privacy Guide, the UK Department for Science, Innovation and Technology’s (DSIT’s) developing AI Cyber Security Code of Practice and Black Duck Blueprint for Generative AI Security.Lesson 5: What is AI risk management?
Includes an overview of NIST-AI-600-1, Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile and companion document AI RMF Playbook. The profile helps organizations identify unique risks posed by generative AI and proposes actions for generative AI risk management that best aligns with their goals and priorities.Lesson 6: What is AI Test, Evaluate, Validate, and Verify (TEVV)
One of the key activities highlighted in the NIST AI Risk Management Framework is TEVV (Test, Evaluation, Verification, and Validation)—tasks that are performed throughout the AI lifecycle to measure and govern risk from non-deterministic AI systems. This lesson includes an overview of AI Threat Modeling, AI Penetration Testing, AI Red Team Exercises, AI Model Cards, and AI Data CardsLesson 7: What are the AI governance, AI compliance, AI audit requirements?
Includes an overview of AI Governance, Compliance and AI Audit requirements. AI governance includes processes, standards and guardrails that help ensure AI systems and tools are safe and ethical. AI compliance refers to the decisions and practices that enable businesses to stay in line with the laws and regulations that govern the use of AI systems. AI audit requirements focus on ensuring transparency, accountability, and compliance in AI systems.Lesson 8: Building an AI security program
Includes a systematic approach to building an AI security program to protect AI systems and applications. Based on best practices covered in the class. The goal is to establish a process, assign resources, establish program requirements and deliverables and design / build / maintain a comprehensive AI system security program.Upon completion of the class, the attendees will have an up-to-date understanding of AI and its impact on cybersecurity as well as what actions an organization should take to benefit from the many advancements available with adopting AI into their security design, development, deployment, operations, and maintenance.
STUDENT TESTIMONIAL:
“Mr. Wilson presented an incredibly complex, emerging topic that includes significant risks in such a way that it left me convinced GenAI is just another piece of software. He walked us through defining the technical components, understanding the risks of and threats to these systems, and the security controls to help mitigate them. He wrapped the class by outlining how we may want to develop a program for managing the risks associated with AI, and did it with a wealth of practical knowledge, relatable personal anecdotes, and a ton of thoughtful research. Best class of SecureWorld Boston 2025!”
— Andrew F. Powell Jr., Information Security Director, Williams College9:00 am[PLUS Course] Master the NIST Cybersecurity Framework v2.0 in Just Six HoursvCISO & Managing Director, Cyber Risk Opportunities LLCRegistration Level:SecureWorld Plus
9:00 am - 3:00 pmThis intensive, live workshop is your shortcut to cyber resilience mastery. In just one power-packed day, you’ll walk away with:
- Complete mastery of NIST CSF 2.0 – Understand every component and why it matters to YOUR business
- Your personalized Cyber Risk Map – Identify your organization’s exact vulnerabilities and blind spots
- A step-by-step action plan – No more guessing what to do next
- Real-world case studies – See how organizations just like yours have successfully implemented the framework
- Expert-level confidence – Finally speak cybersecurity with authority and clarity
What makes this different?
This isn’t another theoretical lecture. You’ll spend most of your time actually BUILDING your organization’s cybersecurity roadmap using the proven Cyber Risk Management Action Plan (CR-MAP) methodology. You’ll leave with tools and know-how you can implement immediately.Perfect for:
- IT Directors and Managers
- Cybersecurity Professionals
- Business Leaders responsible for risk management
- Compliance Officers
- Anyone tasked with “figuring out cybersecurity”
Exclusive Bonus: Every attendee receives our comprehensive digital CR-MAP Online Workbook ($197 value), your step-by-step guide to:
- Getting BUY-IN from your senior decision makers
- Discovering your top five cyber risks
- Creating a prioritized risk mitigation plan with implementation roadmap
- A score card you can use to track progress
Warning: This live, in-person intensive has limited seating. Don’t let another cyber incident catch your organization unprepared.
Your organization’s cybersecurity can’t wait. Register now.
- Wednesday, October 29, 20257:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:15 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amNetworking Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible, as well as association chapters! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
Also, look for “Cyber Connect” discussions on select topics and join the conversation.
8:00 amAdvisory Council Roundtable Breakfast (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:45 amModerated discussion for SecureWorld Advisory Council members. By invite only.
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:45 amParticipating professional associations and details to be announced.
8:00 amBenchmarking Your Cybersecurity FrameworkRegistration Level:Conference Pass
8:00 am - 8:45 amMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
8:45 amNetworking BreakRegistration Level:Open Sessions
8:45 am - 9:00 amLocation / Room: Exhibitor HallVisit the Networking Hall to network with attendees and connect with our vendor sponsors and association partners.
9:00 am[Opening Keynote] Once Upon a Time in the Big Apple: CISOs on the Frontlines of Cyber EvolutionCIO & CISO, OTC Markets Group Inc.Registration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterCybersecurity in New York City is anything but ordinary. As one of the world’s most targeted and interconnected regions, the Big Apple has long been a proving ground for innovation, regulation, and resilience in the face of relentless cyber threats.
In this keynote panel, top CISOs from New York’s diverse industries will share the pivotal moments that shaped their cybersecurity journeys—from navigating legacy risk to embracing AI and zero trust. You’ll hear real-world stories of what worked, what didn’t, and how leadership, collaboration, and adaptation are writing the next chapter of cyber defense in the city that never sleeps.
Whether you’re a practitioner, leader, or building your own cybersecurity story, this session sets the tone for the day, grounded in experience, rich with insight, and driven by the evolving narrative of risk in modern times.
9:45 amNetworking Break & Cyber ConnectAI in Cybersecurity: Game-Changer or Growing Threat?Registration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallArtificial intelligence rapidly redefines how we defend our networks—and how attackers target them. From threat detection to deepfakes, explore the double-edged nature of AI in cybersecurity and how it’s impacting your daily work.
Please join us in the Networking Hall to connect with peers over coffee and snacks and share real-world experiences, strategies, and concerns around AI’s growing role in security.
10:15 amRewriting the Security Story: Empowering Agility in a Digital-First WorldGlobal CISO, OPKO HealthRegistration Level:Conference Pass
10:15 am - 10:50 amCybersecurity has long been cast as the cautious guardian—protecting the kingdom but often slowing the quest for innovation. But the modern tale is changing. In this insightful session, Afzal Khan, Global CISO at OPKO Health, will explore how forward-thinking organizations are transforming security from a restrictive legacy function into a flexible force for business agility.Attendees will follow the arc of cybersecurity’s evolving role, uncovering how to embed security into fast-paced development cycles, enable secure-by-design principles, and align risk management with business momentum. With lessons from the past and a vision for what’s next, this session offers a roadmap to help you turn the page—and make cybersecurity a trusted partner in your organization’s growth story.10:15 amInvesting in Your Application Security ProgramsRegistration Level:Conference Pass
10:15 am - 10:50 pmSession description to come.
10:15 amTabletop Exercises: The Fun KindRegistration Level:Open Sessions
10:15 am - 10:50 amTabletops are not new in incident response training. But oftentimes, they’re pretty dull or ridden with anxiety. But, what if we applied gamification and game-based learning techniques? By transforming tabletop exercises into interactive, engaging scenarios, with Dungeons & Dragons-style play, we can make them more memorable and effective!
This approach allows participants to practice critical skills, with a structure that encourages more balanced team involvement and participation, and dice-rolling to determine success and failure (that does a remarkable job in simulating a real-world experience). Enter HackBack Gaming! Why not build incident response “muscle” memory in a fun way? This session provides a foundation for you to start conducting exercises like this yourself right away.
10:50 amNetworking Break & Cyber ConnectThe Human Element in CybersecurityRegistration Level:Open Sessions
10:50 am - 11:10 amLocation / Room: Exhibitor HallDespite all the tools and technology, people remain the most unpredictable variable in security. Whether insider threats, awareness training, or culture-building, human behavior is central to your cyber strategy.
Please join us in the Networking Hall to connect with peers over coffee and snacks and discuss how organizations are tackling the people side of cybersecurity.
11:10 amCyber Risk by the Numbers from a Cyber Insurance PerspectiveRegistration Level:Conference Pass
11:10 am - 11:45 amYou’ve experienced a cyber incident. Does cyber insurance really pay? What’s actually a recoverable expense? How can insurance help? And when the insurance does pay, how do you balance the amount of insurance with cybersecurity priorities? In this session, we’ll evaluate the data and dig into recent real-world examples of how cyber insurance pays claims, what’s covered, the role of insurance in incident preparation and response, and how organizations are using analytics in decision-making.
11:10 am[Panel] The Evolving Cyber Threat Landscape: Tales of Villains, Heroes, and ResilienceRegistration Level:Open Sessions
11:10 am - 11:45 amToday’s professionals face challenges reminiscent of classic fairy tales: shadowy villains, unexpected allies, and battles for safety and survival. This panel will delve into the current threat landscape, from ransomware dragons to insider trolls. It will offer insights into the strategies and tools organizations need to craft their own happily ever after in cybersecurity.
12:00 pm[Lunch Keynote] You Are Not a CISO, You Are a 'CO IS'Cybersecurity Expert; Author of “Cyber Crisis”Registration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThe term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.
In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!
12:00 pmAdvisory Council Roundtable Lunch (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmModerated discussion for SecureWorld Advisory Council members. By invite only.
12:45 pmNetworking Break & Cyber ConnectProactive by Design: Anticipating Threats Before They StrikeRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallThe days of reacting to alerts are over. From continuous monitoring to threat hunting, organizations are shifting to proactive security models that anticipate and prevent incidents before they happen.
Please join us in the Networking Hall to connect with peers over coffee and snacks and explore how to make proactive security a reality in your environment.
1:15 pmStretching Your Envelope to Supercharge Your CareerDistinguished Fellow, ISSA Hall of FameRegistration Level:Conference Pass
1:15 pm - 1:50 pmCorporate culture in America is fraught with the stifling of creativity. The fear of failure is preventing many from reaching their full potential. It is time for all of us to embrace stretching the envelope and getting uncomfortable. We all have so much to offer, that will lead to innovation and better ways to solve problems, if only our culture would stop judging and beating down good ideas that just happen to fail. We will learn more from failure than success, and until we can get past that fear of failure, we will never realize our full potentials.
1:15 pmAddressing the Cybersecurity Skill Shortage Internally and ExternallyRegistration Level:Conference Pass
1:15 pm - 1:50 pmThis presentation will cover accelerating skill development and cross-department collaboration efficiently and economically. Key takeaway: How to build a cyber guild and utilize it for expanded upskilling and role development.
1:15 pmProactive Security: Building Digital Fortresses Against Modern DragonsDirector, Solutions Architecture, CohesityRegistration Level:Open Sessions
1:15 pm - 1:50 pmSession details to come.
1:50 pmNetworking Break & Cyber ConnectCyber Talent Crisis: Recruiting, Retaining, and Reskilling Your TeamRegistration Level:Open Sessions
1:50 pm - 2:10 pmLocation / Room: Exhibitor HallThe cybersecurity workforce shortage is real—and growing. From finding skilled talent to reducing burnout and investing in upskilling, leaders are rethinking how to build resilient teams for the future.
Please join us in the Networking Hall to connect with peers over coffee and snacks and exchange ideas for navigating one of the industry’s most significant ongoing challenges.
2:10 pm[Panel] Mental Health vs. Mental Wellbeing: How to Cultivate Resilient Security TeamsRegistration Level:Conference Pass
2:10 pm - 2:45 pmThis panel discussion confronts the challenge of building InfoSec teams with the skills to manage stress under pressure. Cybersecurity executive leaders explore how to create team cultures, practices, and processes for proactively building mental well-being instead of addressing mental health from a reactive position. Much like building a security program, the group looks at the role mindfulness can play in helping defenders increase job satisfaction, improve focus, and lower the risk of burnout. Attendees can expect to gain actionable insights and practical steps that can be implemented within their organizations to cultivate this type of resilience.
2:10 pmSecuring Enterprise AI: Practical Data Protection Strategies for AI AdoptionHead of Enterprise Security, BoxRegistration Level:Conference Pass
2:10 pm - 2:45 pm2:10 pm[Panel] The Sorcerer's Apprentice: Taming AI in CybersecurityCISO, Bank of China USARegistration Level:Open Sessions
2:10 pm - 2:45 pmAI can be both a powerful ally and a mischievous force if left unchecked. This panel will explore how organizations can harness the magic of AI for cybersecurity—automating defenses, detecting threats, and enhancing decision-making—while addressing the risks of bias, over-reliance, and adversarial AI. Use this transformative technology wisely to write your cybersecurity success story.
2:45 pmNetworking Break & Cyber ConnectFinal Entries for Dash for Prizes and PassportRegistration Level:Open Sessions
2:45 pm - 3:00 pmLocation / Room: Exhibitor HallThis is your final chance to visit the Networking Hall and get scanned by our participating partners for our Dash for Prizes. You can also turn in your Passport cards at the Registration Desk before we announce our winner!
3:00 pm[Closing Keynote] Ask a CISO: Challenges, Lessons, and the Future of CybersecurityChief Cybersecurity Risk Officer, The Depository Trust & Clearing Corporation (DTCC)Registration Level:Open Sessions
3:00 pm - 3:45 pmLocation / Room: Keynote TheaterEver wondered what keeps CISOs up at night? In this interactive panel session to put a bow on the conference day, seasoned CISOs share their unfiltered perspectives on the evolving cybersecurity landscape. From navigating boardroom conversations and managing security incidents to balancing business needs with risk management, they’ll discuss the realities of the role, lessons learned from the front lines, and how they see security evolving in the years ahead.Expect candid insights on topics such as:-
The toughest decisions CISOs face daily
-
Emerging threats and how security leaders are preparing
-
The future of security operations, compliance, and resilience
-
Strategies for bridging the gap between security teams and executive leadership
-
Advice for aspiring security leaders and practitioners
This is your chance to ask burning questions, gain strategic insights, and walk away with a deeper understanding of what it really means to be a CISO in today’s high-stakes environment.3:45 pmHappy Hour & Dash for PrizesRegistration Level:Open Sessions
3:45 pm - 4:45 pmLocation / Room: Exhibitor HallJoin your peers for conversation and complimentary beverages. This is a great opportunity to network with other security professionals from the area and discuss the hot topics from the day.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.

- Blink Ops, IncBooth: TBD
Automate all things security in the Blink of AI.
BlinkOps is a security workflow automation platform designed to make building, collaborating, and scaling all things security & beyond effortless.
Whether you prefer code, low-code, or no-code, BlinkOps has you covered. Easily drag and drop the actions you want into a workflow, leveraging the over 30,000 actions available in the automation library, or use Blink Copilot™ to generate a workflow with a natural language prompt.
Use BlinkOps as an automation hub, where security teams go to quickly develop, collaborate, and automate their security ideas. Leverage the platform’s 8,000+ workflows that come out-of-the-box to quickly build workflows for real-time remediation. Generate automation workflows for standalone use cases or build an end-to-end proactive automation strategy, streamlining security responses across your entire organization.
- Cohesity, IncBooth: TBD
We believe that simplicity is the foundation of modern data management. Our mission is to radically simplify how organizations manage their data and unlock limitless value. The company develops software that allows IT professionals to backup, manage, and gain insights from their data across multiple systems or cloud providers.
- HackNoticeBooth: TBD
HackNotice not only unifies your threat intel needs in one place, but optimizes and maximizes your threat defenses in ways that no other platform can.
Whether that’s searching for any term you need, tracking the full range of compromised PII, getting real-time alerts for every hack and leak, or any of our other advantages, HackNotice is the industry standard for threat intel.
- HPEBooth: TBD
Hewlett Packard Enterprise (HPE) is a global technology company that focuses on developing intelligent solutions for capturing, analyzing, and acting upon data. They operate in areas like networking, hybrid cloud, and AI, helping customers create new business models and improve operational performance.
- InfraGardBooth: TBD
InfraGard is an information sharing and analysis effort serving the interests and combining the knowledge base of a wide range of members. At its most basic level, InfraGard is a partnership between the FBI and the private sector. InfraGard is an association of individuals, academic institutions, state and local law enforcement agencies, and other participants dedicated to sharing information and intelligence to prevent hostile acts against the United States. InfraGard Chapters are geographically linked with FBI Field Office territories.
The FBI retained InfraGard as an FBI sponsored program, and will work with DHS in support of its CIP mission, facilitate InfraGard’s continuing role in CIP activities, and further develop InfraGard’s ability to support the FBI’s investigative mission, especially as it pertains to counterterrorism and cyber crimes.
- JitBooth: TBD
Jit enables you to automate product security by quickly enabling full-stack scanning coverage, prioritizing the real risks, and empowering developers to deliver secure code faster.
- Legato SecurityBooth: TBD
Our mission is to provide comprehensive, customer-centric managed cyber security services that effectively manage and mitigate cyber risks on behalf of our customers. We continually adapt and innovate our services to stay ahead of emerging threats and evolving technologies, delivering peace of mind and enabling our customers to focus on their core business objectives. With a team of dedicated experts and cutting-edge technologies, we strive to build trusted partnerships, deliver exceptional value, and safeguard our customers’ digital assets with unwavering commitment.
- Seceon Inc.Booth: TBD
Seceon delivers a next-generation cybersecurity platform that empowers enterprises, MSPs, and MSSPs to detect, respond, and remediate threats in real-time, eliminating the need for 20+ security tools. What Sets Seceon Apart: * Unified Platform: Combines SIEM, SOAR, UEBA, EDR, NDR, Threat Intelligence, Vulnerability Management, and Compliance into one AI-powered solution. * AI-Powered Threat Detection & Auto-Response: Leverages ML, AI, and Dynamic Threat Models for real-time threat identification and automated remediation. * Scalable & Multi-Tenant: Supports massive scale, processing 10M+ events per second, across enterprises and MSSPs from a single dashboard. * Continuous Compliance: Streamlines security analytics and regulatory compliance (NIST, ISO, HIPAA, PCI-DSS, CMMC, NIS2) with aiSecurity360. Why Organizations Choose Seceon: * Cut cybersecurity costs by 60% by replacing siloed tools * Stop threats faster with AI-powered detection and automated response. * Achieve full visibility by correlating real-time logs, flows, identities, for situational awareness and historical threat intelligence. Faster protection, full visibility, and lower costs. Seceon powers the future of cybersecurity.
- Tevora + ProcessUnityBooth: TBD
Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats. For more information visit https://www.tevora.com.
ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Our highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation. As a software-as-a-service technology, ProcessUnity deploys quickly with minimal effort from customers and their IT resources. For more information, visit https://www.processunity.com.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- Women in CyberSecurity (WiCyS)Booth: TBD
Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.
- Larry Wilson, CISSP, CISA, InstructorSr. Cybersecurity Consultant, Wilson Cyber
Larry Wilson was formerly the Chief Information Security Officer for Sumitomo Pharma Americas, Inc., Worcester Polytechnic Institute, and the University of Massachusetts (UMass) President's Office. In the CISO role, Larry was responsible for developing, implementing, and overseeing compliance with the SMPA / WPI / UMass Information Security Policy and Written Information Security Plan (WISP). In addition to designing and deploying the respective cybersecurity programs, Larry has developed and delivered cybersecurity training at multiple industry events, workshops, training venues, etc. Courses include Designing and Building a Cybersecurity Program, Designing and Building a Ransomware Program, and Designing and Building a Third-Party Risk Program. Larry has also worked with multiple companies in multiple industries to help design, build, and maintain their Cybersecurity Programs, Ransomware Program, and Third-Party Risk Programs.
- Glen Sorensen, InstructorvCISO & Managing Director, Cyber Risk Opportunities LLC
Glen Sorensen is a Virtual Chief Information Security Officer (vCISO) with Cyber Risk Opportunities. He has worn numerous hats in his career, in areas such as security engineering and architecture, security operations, GRC, and leadership. He has held a variety of roles as an analyst, engineer, consultant, auditor, regulator, and information security officer for a financial institution.
Glen approaches problems with practical solutions that bring good business value and has worked across many sectors, including financial services, healthcare, manufacturing, and others. He has served as a consulting expert in a large legal case involving healthcare and cyber attack detection technology. He has been in IT and security for 15+ years, longer if you count years of misspent youth bending technology and countless hours of roleplaying games. He is a sucker for a good tabletop exercise and serves as an Incident Master for HackBack Gaming, the fun kind of TTX.
- Vlad BrodskyCIO & CISO, OTC Markets Group Inc.
Vlad Brodsky serves as the Senior Vice President, Chief Information Officer, and Chief Information Security Officer at OTC Markets Group, a regulated publicly traded financial institution that operates the world’s largest OTC equity electronic marketplace. In this role, Vlad leads the firm's information security strategy, program, and processes, while also overseeing IT operations and infrastructure. With expertise in Information Security, Risk Management, IT Infrastructure Management, and Financial Services, Vlad brings a wealth of knowledge to the organization. Additionally, Vlad is an Advisor at Pellonium, a continuous and comprehensive Risk Management Platform.
- Afzal KhanGlobal CISO, OPKO Health
Afzal Khan is a distinguished leader in the field of technology security and risk management, bringing over 26 years of expertise to his role. Currently serving at OPKO, he provides strategic direction and guidance on technology risk management, IT, OT, and cybersecurity, ensuring compliance with IT regulatory standards across domestic and international entities. Afzal's extensive experience includes notable positions such as the Global Head of IT Security, Risk Management & Compliance at Everest Reinsurance, where he led critical projects and built robust organizational teams. He holds 7 security and risk management certifications, including CISSP, CISA, and CRISC, underscoring his deep knowledge in the field. Afzal is renowned for his visionary approach, aiming to establish a secure technology platform aligned with business objectives, emphasizing a business-focused and risk-based approach to security decisions. His dedication to operational excellence and adaptability in the face of disruptive technologies have made him a trusted leader in the industry.
- Panel Discussion
- Dr. Eric Cole, DPSCybersecurity Expert; Author of “Cyber Crisis”
Dr. Eric Cole, DPS is a cybersecurity expert, entrepreneur, public figure, and best-selling author. Dr. Cole has built a solid reputation in the cybersecurity industry over the last three decades. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's com-missioner on cyber security to currently advising companies and teaching professionals on how to implement security measures that serve as a business enabler. His accomplishments have earned him an in-duction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Se-cure Anchor Consulting is his fourth cyber security business venture. Aside from his seasoned technical expertise, Dr. Cole is a well-known public figure and author of various publications. He recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole is currently focusing on fulfilling his purpose of being on this planet to end suffering in cyber-space and his mission to secure cyberspace, by making cyberspace a safe place to live, work and raise a family.
- Richard GreenbergDistinguished Fellow, ISSA Hall of Fame
Richard Greenberg, a well-known Cyber Security leader, evangelist, advisor, and speaker, has over 30 years of management experience, including 15 years as a CISO. He is an ISSA International Distinguished Fellow and has been inducted into their Hall of Fame. He is president of the ISSA LA Chapter. You may have heard Richard’s interview as a Cyber Security expert on Will Ferrell’s Ron Burgundy podcast: https://www.iheart.com/podcast/the-ron-burgundy-podcast-30270227/episode/cyber-security-47951911/. Richard is the Founder and CEO of Security Advisors LLC, offering security risk assessments, software security testing, and penetration testing, allowing organizations to continuously assess their cyber risk posture and meet compliance requirements.
- Stephen GyarmatiDirector, Solutions Architecture, Cohesity
Stephen Gyarmati is a Director of Solutions Architecture at Cohesity responsible for the eastern United States and Canada. In his current role, he interfaces with large enterprise industry professionals to accelerate their adoption of the Cohesity data security and management platform. Stephen has worked in Systems Engineering roles in the New York City metro area, including at both Cohesity and Commvault. Stephen has 13 years of experience in data protection and storage technologies, and he holds an MS in Information Systems degree from Drexel University.
- Panel Discussion
- Panel Discussion
- Akhila NamaHead of Enterprise Security, Box
Akhila Nama leads the Enterprise Security organization at Box where she oversees security design, strategy, architecture and risk management, with a focus on securing modern enterprise environments while driving business growth. With more than a decade of experience, Akhila has worked through multiple roles and domains, helping organizations navigate complex threats while building security programs and teams that scale.
- Rod Aday, ModeratorCISO, Bank of China USA
Rod Aday is an experienced security professional with many years of experience in information security/cybersecurity, business continuity, operational risk and information technology. As a CISO in the financial services sector, Rod has built Information Security and Business Continuity Programs from the ground up at three different financial institutions, bringing their cybersecurity maturity to the level appropriate for each institution’s risk profile and in-line with regulatory guidance. He was formerly the CISO, Head of Operational Risk and Information Security, for Dexia Credit Local, NY Branch. Rod holds a CISSP certification as well as the concentrations CISSP-ISSAP and CISSP-ISSMP. He is currently pursuing his Masters in Information Security with the University of London, International program.
- Panel Discussion
- Panel Discussion
- Yonesy NúñezChief Cybersecurity Risk Officer, The Depository Trust & Clearing Corporation (DTCC)
Yonesy Núñez serves as Managing Director and Chief Cybersecurity Risk Officer at The Depository Trust & Clearing Corporation (DTCC), reporting into the Group Chief Risk Office (GCRO). In this role, Yonesy leads the second line of defense for cybersecurity oversight, responsible for cybersecurity policies, standards, risk assessments, monitoring, and independent validation across the enterprise. His team provides independent challenge to cybersecurity controls, enhances cyber risk management effectiveness, and supports a proactive security posture aligned to DTCC’s regulatory and operational resiliency objectives.
Prior to assuming his current role, Yonesy served as DTCC’s Chief Information Security Officer, leading the firm’s Information Security and Technology Risk Management efforts as it advanced its modernization strategy. Before joining DTCC, he was CISO at Jack Henry & Associates and held senior cyber roles at Wells Fargo, Citi, and PricewaterhouseCoopers.
He is President Emeritus and co-founder of the InfraGard Chapter of Long Island, New York. He currently serves on the Boards of Directors for Pentegra Retirement Services, Chain Bridge Bancorp, Chain Bridge Bank N.A., the STEM Advisory Board for Mercy College, and the Hispanic Security Executive Council (Hi-SEC). He is also a member of the Latino Corporate Directors Association and the Black Board Initiative and holds numerous industry certifications.
Yonesy earned a Doctorate in Computing from Pace University, a Master of Science in Information Systems Engineering from NYU Tandon School of Engineering, and a Bachelor of Science in Finance and Computer Information Systems from Manhattan College. He has been recognized on the Hispanic IT Executives Council’s list of the Top 100 Most Influential Hispanic Leaders in Technology.
- Happy Hour

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Hone your skills and connect with your regional peers in InfoSec.
