Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, September 14, 202212:00 pm[PLUS Course] CIS Top 18 Critical ControlsVP & CISO, HillenbrandRegistration Level:
SecureWorld Plus
12:00 pm - 2:00 pmLocation / Room: Room 240An in-depth review of the top 18 security controls from the Center for Internet Security (CIS): https://www.cisecurity.org/controls
Two-hour course offering two CPE credits. Purchase a PLUS Pass for $400, which includes full conference access (Conference Pass).
Learning Objectives:
- Understanding the CIS Critical Security Controls and Maturity levels
- Understanding how to self-assess your Cybersecurity Maturity Baseline
- Understanding how to define your Cybersecurity Maturity roadmap
- The hidden benefits of Cybersecurity Maturity Metrics
- Thursday, September 15, 20227:00 amRegistration openRegistration Level:
Open Sessions
7:00 am - 3:00 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:00 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
9:00 am[Breakfast Fireside Chat] BEC Attacks, Crypto, and the Investigative Powers of the Secret ServiceFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret ServiceRegistration Level:Open Sessions
9:00 am - 9:45 am9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amHow to Build an Effective Security Awareness ProgramSr. Principal Cybersecurity Engineer, CISSP, Leonardo DRSRegistration Level:Conference Pass
10:15 am - 11:00 am10:15 am[Panel] The Current Threat LandscapeSr. Product Manger, OpenTextDirector, Threat Research & Intelligence, ProofpointRegistration Level:Open Sessions
10:15 am - 11:00 amIf we’ve learned one thing from the pandemic it’s that cybercriminals do not take breaks. They are constantly retooling and trying new approaches. They collaborate—often better than we do. It is time for us to join forces, identify the most likely of risks to our organizations, and strengthen our networks. We’ve got to get our developers on board, as well, as it’s got to be secure before it goes to market. And what about all the careless clicking from employees?
It’s a huge task, but we don’t have to do it alone. Join our panel of experts as they unpack the current threat landscape and offer ideas on how to start making effective changes within your organization.
10:15 amCybereason: Extended Detection and ResponseRegistration Level:Open Sessions
10:15 am - 11:00 amSession description to come.
11:10 amUtilizing Threat Intel Data to Develop a Security StrategyCISO & SVP, First BankRegistration Level:Conference Pass
11:10 am - 11:55 amWhen developing your security strategy, utilizing threat intelligence data for both internal and external threats can help prioritize risk remediation. How much should this data influence your strategy and your budget?11:10 amSentinelOne: Autonomous Security for Endpoint, Cloud, and IdentityRegistration Level:Open Sessions
11:10 am - 11:55 am11:10 amRansomware Incident Command and Lessons Learned for ManagersRegistration Level:Conference Pass
11:10 am - 11:55 amThis presentation presents a practical approach to incident command for managers at all levels, irrelevant of cyber expertise. Managers of all types are asked to take charge in critical situations and can benefit from leveraging proven crisis management processes during ransomware response.
12:00 pm[Lunch Keynote] Demystifying Zero Trust and Its Role in CybersecurityCyber Hero, ThreatLockerRegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote TheaterThe Zero Trust framework is based on the principle of “never trust, always verify.” Join us to learn about Zero Trust, how to adopt it, and the technologies you need to take control of your environment in the fight against ransomware.
12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Reporting to Board from InfoSec POVVP & CISO, HillenbrandRegistration Level:VIP / Exclusive
12:00 pm - 12:45 pmRoundtable moderated by Andrew Wilder.
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pm[Panel] Tales from the Cloud: Doing More with LessSenior Regional Security Principal, InsightRegistration Level:Open Sessions
1:15 pm - 2:15 pmThe cloud saved many businesses when the pandemic hit. Some were already there and found new ways to thrive. For others, it was their first jump. It’s been almost two years now. Our panel will share what we’ve learned in this journey to the cloud—from doing more with less, to the ever-present insider threat risk, to supporting our DevOps teams like never before.
1:15 pm[Panel] Incident Response!Service Sales Manager, BlackBerryRegistration Level:Open Sessions
1:15 pm - 2:15 pmSecurity teams are struggling to keep up with the myriad of attack vectors looming. As we emerge from the pandemic, now is the time to focus and adjust your Incident Response plan. There is a new set of tools and technologies helping squash attacks, but what happens when they fail? What’s in your IR plan that addresses the unknown, and how are your preparing? What has worked and what has not? Join our panel of experts in a valuable discussion focusing on current threats and how your company can be better equipped during these unprecedented times.
2:30 pmEnterprise DefenseAssociate VP, Head of Product & Data Security, HumanaRegistration Level:Conference Pass
2:30 pm - 3:15 pmSession description to come.
2:30 pmHow Cybersecurity Is Helping Solve Business ProblemsCISO, Veterans United Home LoansRegistration Level:Conference Pass
2:30 pm - 3:15 pmBudgets are tight, attackers are plentiful. What’s a cybersecurity professional to do in these challenging times? We will talk about where cybersecurity started and how we got to this point in history. Then we will talk about how cybersecurity professionals are working to solving business problems. When you come to this session, be prepared to share one quick story of how you have helped solve a business problem at your organization. Let’s share and learn from each other!2:30 pmGoing Passwordless: Authentication Fact or Fiction?Registration Level:Open Sessions
2:30 pm - 3:15 pmAre your internal customers tired of passwords? Are you tired of easily breaking their passwords? Well, look no further. Passwordless authentication is upon us and can be achieved for multi-factor authentication (MFA), while making our internal customers happy. How is this possible? Come and listen with your colleagues as I share how we rolled it out, describe the lessons learned, and share who the players are.
Passwords are one of the most loathed controls in the wild. If you can’t beat ’em, join ’em. Learn who the passwordless alphas are and the lessons learned to achieve a win-win strategy within your company.
Presentation level: GENERAL (InfoSec best practices, trends, solutions, etc.)
3:15 pmHappy Hour & CasinoSponsored by AutomoxRegistration Level:Open Sessions
3:15 pm - 4:30 pm3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pm[Closing Panel] Demystifying Cybersecurity in the BoardroomAssociate CISO, Washington University in St. LouisVP & CISO, QuickbaseCISO, Forrest T. Jones & CompanyDirector, IT Security, Caleres, Inc.Registration Level:Conference Pass
3:45 pm - 4:30 pmHave you ever walked into your company’s board room to give an update and feel like you’re speaking a different language? You probably are–to them. Unfortunately, this is a common occurrence many cybersecurity professionals face along with their day-to-day InfoSec tasks and challenges. Join us for a panel discussion where local InfoSec leaders will share their experiences reporting to the board, different tactics they’ve used that have been successful when communicating risk, and tips for making your security team stand out amongst other business units. Open to all levels of professionals.
- Armis, IncBooth:
Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices. Fortune 1000 companies trust Armis’ unique out-of-band sensing technology to discover and analyze all managed and unmanaged devices, analyze endpoint behavior to identify risks and attacks, and protect information and systems.
- AutomoxBooth:
Automox tackles one of today’s biggest cybersecurity challenges: misconfigured and out-of-date systems that can easily be exploited. Legacy tools simply cannot remediate known vulnerabilities as efficiently as modern IT demands. Automox is rewriting those rules with a cloud-native endpoint hardening platform that delivers unprecedented speed, simplicity, and automation—whether it is on-prem, in the cloud, or on the move.
- BlackBerryBooth:
BlackBerry provides intelligent security software and services to enterprises and governments around the world. The company secures more than 500M endpoints including more than 175M cars on the road today. Based in Waterloo, Ontario, the company leverages AI and machine learning to deliver innovative solutions in the areas of cybersecurity, safety and data privacy solutions, and is a leader in the areas of endpoint security management, encryption, and embedded systems. BlackBerry’s vision is clear—to secure a connected future you can trust.
BlackBerry. Intelligent Security. Everywhere.
For more information, visit BlackBerry.com and follow @BlackBerry.
- Code42Booth:
Code42 is the leader in insider risk detection, investigation and response. Native to the cloud, Code42 rapidly detects data loss, leak, theft and sabotage as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. With Code42, security professionals can protect corporate data from insider threats while fostering an open and collaborative culture for employees. Backed by security best practices and control requirements, Code42’s insider threat solution can be configured for GDPR, HIPAA, PCI and other regulatory frameworks.
- Critical StartBooth:
Critical Start is a cybersecurity company with a holistic, customer-focused approach. We work with our customers to understand the impact of IT on their business and determine the associated risks. Using this risk profile, we can offer big-picture guidance on the strategies and controls that will enable them to effectively manage risk and improve security. Critical Start is 100% employee owned by a team of experts who are passionate about security, quality and service. For more information on what sets us apart, visit criticalstart.com.
- Cybercrime Support NetworkBooth: N/A
Cybercrime Support Network (CSN) is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime. CSN’s mission is to improve the plight of Americans facing the ever growing impact of cybercrime by bringing together national partners to support cybercrime victims before, during, and after.
- CybereasonBooth:
Cybereason was founded in 2012 by a team of ex-military cybersecurity experts with the mission of detecting and responding to complex cyber-attacks in real time. Cybereason is the only Endpoint Detection and Response platform deployed in user space that detects both known and unknown attacks and connects isolated indicators of compromise to form a complete, contextual attack story. Cybereason’s behavioral analytics engine continuously hunts for adversaries and reveals the timeline, root cause, adversarial activity, related communication and affected endpoints and users of every attack. Cybereason provides security teams with actionable data, enabling fast decision making and proper response.
- ImpervaBooth:
Imperva is a leading provider of data and application security solutions that protect business-critical information in the cloud and on-premises. Cybercriminals constantly change their tactics. But what they are after, and how they ultimately make money, doesn’t change. They are after data. They make their money through extortion, via DDoS and ransomware, and through theft via data breaches. Today, data and applications are the fundamental assets of any enterprise. Data are the intellectual property and apps are what run the business. Imperva has a singular purpose: protect these critical assets from the ever-changing attacks of the cybercrime industry.
- InsightBooth:
Insight is a comprehensive solutions integrator that helps organizations transform technology, operations, and service delivery to meet challenges and future-proof the business. With a client-focused approach to delivery, we recommend the most appropriate solutions to drive digital transformation and modernization for innovation. As clients look for ways to optimize data for better business, empower speed and scale of service, and drive next-gen security, Insight delivers expertise that is grounded, unbiased, and refreshingly straightforward.
- (ISC)2 St. Louis ChapterBooth:
As a regional chapter of (ISC)2, located in St. Louis and serving the St. Louis Metro area, the mission of the St. Louis Region/Scott AFB (ISC)2 Chapter is to provide members and other security professionals with the opportunity to share knowledge, grow professionally, raise security awareness and advance information security in local communities around the world.
- MimecastBooth:
Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector—email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world.
- OktaBooth:
Okta is the foundation for secure connections between people and technology. Our IT products uniquely use identity information to grant people access to applications on any device at any time, while still enforcing strong security protections. Our platform securely connects companies to their customers and partners. Today, thousands of organizations trust Okta to help them fulfill their missions as quickly as possible.
- OpenTextBooth:
OpenText, The Information Company™, enables organizations to gain insight through market leading information management solutions, powered by OpenText Cloud Editions.
- ProofpointBooth:
Proofpoint protects your people, data, and brand from advanced threats and compliance risks with cybersecurity solutions that work. Built on advanced analytics and a cloud architecture, our platform secures the way your people work today—through email, mobile apps, and social media.
Some attacks get through even the best defenses. That’s why our solutions also proactively safeguard the critical information people create. We reduce your attack surface by managing this data and protecting it as you send, store, and archive it. And when things go wrong, we equip security teams with the right intelligence, insight, and tools to respond quickly.
- Recorded FutureBooth:
Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.
- RiskReconBooth:
RiskRecon, a Mastercard company, provides cybersecurity ratings and insights that make it
easy for enterprises to understand and act on their risks. RiskRecon is the only security rating
solution that delivers risk-prioritized action plans custom-tuned to match customer risk priorities,
enabling organizations to efficiently operate scalable, third-party risk management programs for
dramatically better risk outcomes. Request a demo to learn more about our solution. - SemperisBooth:
Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis solutions are accredited by Microsoft and recognized by Gartner. Semperis is headquartered in New Jersey and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.
- SentinelOneBooth:
SentinelOne is the future of Endpoint Protection. It unifies prevention, detection and response in a single platform driven by sophisticated machine learning and intelligent automation. With SentinelOne, organizations can detect malicious behavior across multiple vectors, rapidly eliminate threats with fully-automated, integrated response capabilities, and adapt their defenses against the most advanced cyber attacks.
- SonatypeBooth:
Every day, developers rely on millions of third party and open source building blocks – known as components – to build the software that runs our world. Sonatype ensures that only the best components are used throughout the software development lifecycle so that organizations don’t have to make the tradeoff between going fast and being secure. More than 120,000 organizations use Sonatype’s Nexus solutions to support agile, Continuous Delivery, and DevOps practices globally
- TechTargetBooth: N/A
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThreatLockerBooth:
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- Women in CyberSecurity (WiCyS)Booth:
Women in CyberSecurity (WiCyS) is the premier nonprofit organization with international reach dedicated to bringing together women in cybersecurity. Founded by Dr. Ambareen Siraj from Tennessee Tech University through a National Science Foundation grant in 2013, WiCyS offers opportunities and resources for its members and collaboration benefits for its sponsors and partners. The organization’s founding partners are Cisco, Facebook and Palo Alto Networks. WiCyS’ strategic partners include Amazon Web Services, Bloomberg, Cisco, Equifax, Facebook, Google, HERE Technologies, IBM, Lockheed Martin, Nike, Optum, Palo Alto Networks, PayPal, SANS Institute, Target, and University of California San Diego. To learn more about WiCyS, visit https://www.wicys.org.
- Andrew WilderVP & CISO, Hillenbrand
- Stephen DoughertyFinancial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.
- Diego MaldonadoSr. Principal Cybersecurity Engineer, CISSP, Leonardo DRS
- Roger BrassardSr. Product Manger, OpenText
Roger is a 22-year veteran product manager who specializes in capturing customer and partner concerns, staying abreast of industry trends including regulatory changes, and translating that information into cross-functional development teams to solve the cybersecurity business problems of today and tomorrow. At OpenText Security Solutions, he and his team are focused on quality and efficacy to continuously evolve our Advanced Email Threat Protection and Email Continuity Service solutions, equipping customers and partners with security solutions that are needed in today's continuously evolving threat landscape.
- Panel Discussion
- Marc AshworthCISO & SVP, First Bank
Marc Ashworth, Senior Vice President and Chief Information Security Officer at First Bank, is a respected professional with over 25 years of experience in cyber and physical security, IT/security architecture, business and departmental strategy, budgeting, project management and is a public speaker. He is a board member of St. Louis Chapter of InfraGard and a Lifetime member of FBI Citizens Academy. Possessing security certifications in CISSP, CISM, CRISC, and Security+, Ashworth currently oversees First Bank’s Information Security Department and the Network Services Department. You may reach him at Marc.Ashworth@fbol.com or Marc@AshworthCorp.com.
- Chad MaskillCyber Hero, ThreatLocker
Chad Maskill has two decades of experience in consultation and client management. In his current role, Chad reaches out to assist businesses in hardening their environment preventing ransomware and malicious attacks. Chad has devoted his career to implementing client driven solutions, working with everyone from Ford Motor Company, Tesla, Infinity Ward, as well as numerous municipalities throughout the U.S. and countless SMBs. Previously, he worked with local government in designing and sourcing emergency apparatus and can still parallel park a Ladder Truck.
- Andrew WilderVP & CISO, Hillenbrand
- Panel Discussion
- Panel Discussion
- James NorbergAssociate VP, Head of Product & Data Security, Humana
James Norberg was formerly the Information Risk Management Director at Express Scripts and has been in the Technology field since 2002. His areas of responsibility include the Security Operations Center, Incident Response, eDiscovery, and Cyber Threat Intel & Hunting. He earned his undergrad from Drury University and MBA from Texas A&M. Currently James and his family reside in the St. Louis area.
- Randy RawCISO, Veterans United Home Loans
Randy Raw is Chief Information Security Officer at Veterans United Home Loans in Columbia, Missouri. He has more than 25 years of experience in both public entities and private industry, having built several Information Security programs from the ground up. He is a proponent of risk-based, layered security measures that utilize both preventative and detective approaches to achieve the right solution for the organization. Randy is a CISSP and is active in the Central Missouri InfoSec community. He has spoken at SecureWorld on many technical topics and turns his focus towards helping others move from the technical trenches to a leadership role.
- Happy Hour
- Kevin HardcastleAssociate CISO, Washington University in St. Louis
Kevin Hardcastle, Chief Information Security Officer (CISO) for Washington University in St. Louis, is a member of the CIO Leadership team and serves a key role in University leadership, working closely with senior administration, academic leaders and the campus community. The CISO is responsible for the development and delivery of a holistic information security strategy to optimize the security posture through collaboration with campus-wide resources, facilitate information security governance, advise senior leadership on security direction and direct program functions of risk and incident management, compliance, information security operations, and information security policy development and education.
- Rebecca HarnessVP & CISO, Quickbase
Rebecca Harness is VP & Chief Information Security Officer for Quickbase and Founder/Principal of Pericuro. Rebecca has an established 20+ year career in information technology with the past ten years specifically focused on information security and compliance. An accomplished entrepreneur, Rebecca has founded and led two successful technology startups over the course of her career, and currently serves as a board member for ISACA St. Louis. Rebecca is an alumnus of Hastings College, holds a number of technology and security certifications, and is currently pursuing a Master's degree from SANS Technology Institute in Information Security Engineering.
- Shawn HeckmasterCISO, Forrest T. Jones & Company
Shawn Heckmaster, Chief Information Security Officer for Forrest T. Jones & Company in Kansas City, MO has over 30 years of progressive information technology and security experience. He has worked across multiple private and government sectors, from the Department of the Army, Department of Defense, Black & Veatch and the Jones family of companies. He is experienced in security program establishment and building, with focuses on ISO, FedRAMP, NIST, Insider Threat Program Management and Third Party Vendor Management.
- Moderator: Tami SpellmanDirector, IT Security, Caleres, Inc.
Experienced Cybersecurity leader with over 20 years serving various industries. Background includes leading teams in Information Assurance, Security Operations, Threat & Vulnerability Management and Cybersecurity Consulting.

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join us for high-quality, affordable cybersecurity training and networking. Sign up today!
