Open Sessions
Conference Pass
SecureWorld Plus
VIP / Exclusive
- Wednesday, October 18, 20239:00 am[PLUS Course] Succession PlanningRegistration Level:
SecureWorld Plus
9:00 am - 3:00 pmTopic(s) and instructor to be announced.
Our PLUS courses provide 6 hours of in-depth training onsite the day before the conference. Learn in a small group of your peers from an instructor with subject matter expertise on a critical, timely security issue.
Includes a Conference Pass; earn 12 CPE credits total!
- Thursday, October 19, 20237:30 amRegistration openRegistration Level:
Open Sessions
7:30 am - 4:30 pmLocation / Room: Registration DeskCome to the Registration desk in the lobby to check-in and get your badge. SecureWorld staff will be available throughout the day if you have any questions.
8:00 amExhibitor Hall openRegistration Level:Open Sessions
8:00 am - 4:30 pmLocation / Room: Exhibitor HallYour opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.
8:00 amYour Career in CybersecurityAuthor, "Break In Cyber," vCISORegistration Level:Open Sessions
8:00 am - 8:50 amWhether you are aspiring to break into cybersecurity or you are on your journey to becoming a CISO, this session is designed to help you “level up” in your career. This sessions will cover:
- Best ways to achieve career growth
- Education (certifications or on-the-job experience?)
- Short-term career planning
- Long-term career planning
- Different paths in cybersecurity (Red Team, Blue Team, GRC, and more)
Even if you are satisfied in your current role, learn how to make yourself “recession proof.”
8:00 amAssociation Chapter MeetingsRegistration Level:Open Sessions
8:00 am - 8:50 amParticipating professional associations and details to be announced.
8:00 amAdvisory Council Roundtable Breakfast – (VIP / Invite only)Registration Level:VIP / Exclusive
8:00 am - 8:50 amThis roundtable discussion is for our Advisory Council members only.
9:00 am[Executive Panel] Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec LandscapeRegistration Level:Open Sessions
9:00 am - 9:45 amLocation / Room: Keynote TheaterOver the last few years, the workforce and the way we work has entirely shifted and evolved. Much like conducting a grand orchestra, cybersecurity executives are now called upon to more than just conduct procedures and make “good music.” Listen to local cybersecurity executives who are in the trenches navigating the “new normal,” the threats impacting the industry, and their different key takeaways and lessons learned along the way. This discussion is followed by a live Q&A, so come prepared to ask your local executives your burning workforce questions!9:45 amNetworking BreakRegistration Level:Open Sessions
9:45 am - 10:15 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
10:15 amSecuring Your Sensitive Assets in a Cloud-First WorldRegistration Level:Conference Pass
10:15 am - 11:00 amKey take-away:
How to rethink database security controls in a cloud-first world.For most organizations, data repositories hold our most sensitive, mission critical assets. As enterprises continue their digital transformation journeys, data repositories and the sensitive assets within are more exposed than ever before for several reasons, including a dramatic rise in the:
- Amount of data created, collected, and stored
- Number of repositories storing sensitive data across clouds
- Number of users and applications that need access to data
10:15 amThe Future of WorkRegistration Level:Conference Pass
10:15 am - 11:00 amOver the last few years, the workforce, and the way we work, has entirely shifted focus. Between hybrid work models, attracting and retaining diverse talent, forced digital migrations/transformations, cybersecurity succession planning, and overall mental fatigue, the future of work has dramatically changed. We will discuss how to navigate the “new normal” and lessons learned along the way. This discussion is followed by a Q&A, so come prepared to ask your burning workforce questions!
10:15 am[Exabeam] Goodbye SIEM Effectiveness GapRegistration Level:Open Sessions
10:15 am - 11:00 amSession description coming soon.
11:00 amNetworking BreakRegistration Level:Open Sessions
11:00 am - 11:10 amLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
11:10 amSOC Essentials: Assembling Your First Response TeamTeam Leader of Information Security, GarminRegistration Level:Conference Pass
11:10 am - 11:55 amSession description coming soon.
11:10 amSymphony of Cyber Defense: Confronting the Crescendo of Threats in the Digital OrchestraIdentifying the Current Threat LandscapeRegistration Level:Open Sessions
11:10 am - 11:55 amIn the ever-changing symphony of the cyber realm, a cacophony of threats echoes through the digital landscape. Ranging from ransomware to data breaches, phishing, and intricate APTs, the orchestra of cyber threats grows in complexity. Emerging risks like IoT, cloud computing’s unpredictability, AI’s deceptiveness, and cryptocurrency add new layers to our musical security tapestry.
Threat actors – wielding exploit kits and zero-day vulnerabilities – orchestrate their attacks, preying on human vulnerabilities in perfect synchronization with state-sponsored cyber operations.
To counter this threat, collaboration is essential. Proactive security practices, training cadences, and threat intelligence sharing must happen. The interplay of public and private sectors is key to a resilient digital effort.
Let us march to the beat of constant vigilance, adaptability, and investment in a fortified infrastructure. Together, we shall compose a symphony of cybersecurity, safeguarding the digital soundscape, and ensuring a melodious future.
11:10 amBEC Attacks: The Stealthiest and Most Lucrative ThreatRegistration Level:Open Sessions
11:10 am - 11:55 am12:00 pmLUNCH KEYNOTERegistration Level:Open Sessions
12:00 pm - 12:45 pmLocation / Room: Keynote Theater12:00 pmAdvisory Council Lunch Roundtable – (VIP / Invite Only)Registration Level:VIP / Exclusive
12:00 pm - 12:45 pmAdvisory Council – VIP / INVITE ONLY
12:45 pmNetworking BreakRegistration Level:Open Sessions
12:45 pm - 1:15 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
1:15 pmRansomware: How to Stay Off the Front PagesRegistration Level:Conference Pass
1:15 pm - 2:15 pm1:15 pm[Panel] Navigating the Cybersecurity Symphony in the Age of AIUnderstanding and Theorizing the Future of Generative AIRegistration Level:Open Sessions
1:15 pm - 2:15 pmGenerative AI, like ChatGPT, and Bard, has incredible potential, but it also brings certain negative elements and concerns for everyone. It’s important to address these concerns to ensure responsible and ethical use of AI technology, especially within cybersecurity. This panel covers insider threats, lack of accountability, cybersecurity vulnerabilities, fake data and data privacy, human replacement concerns and ethical misuse.
By understanding these fears and proactively addressing them through responsible development, robust safeguards, and ongoing monitoring, we can harness the potential of generative AI while mitigating its associated risks. Collaboration between AI researchers, policymakers, and industry professionals is essential to ensure that generative AI technology is developed and deployed in a manner that aligns with ethical standards and human values. Hear from experts in the field on how they’re trying to navigate this new song and dance with AI and what we can expect in the near and distant future. what it takes to provide the support DevOps teams need.
2:15 pmNetworking BreakRegistration Level:Open Sessions
2:15 pm - 2:30 pmLocation / Room: Exhibitor HallVisit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.
2:30 pmImportant Human Skills in a Cyber WorldChief Information Security Officer, HoneywellRegistration Level:Conference Pass
2:30 pm - 3:15 pmSession description coming soon.
2:30 pmDemystifying Zero Trust and Its Role in CybersecurityRegistration Level:Conference Pass
2:30 pm - 3:15 pm2:30 pmBenchmarking Your Cybersecurity FrameworkRegistration Level:Open Sessions
2:30 pm - 3:15 pmMeasuring one’s cybersecurity framework against others in the same industry, or even outside of their vertical, can provide valuable insights into areas to improve or adjust.
3:15 pmNetworking Break and Dash for PrizesRegistration Level:Open Sessions
3:15 pm - 3:45 pmLocation / Room: Exhibitor HallVisit the solution sponsor booths in the Exhibitor Hall and connect with other attendees.
Participating sponsors will announce their Dash for Prizes winners. Must be present to win.
3:45 pmCLOSING KEYNOTERegistration Level:Open Sessions
3:45 pm - 4:30 pmLocation / Room: Keynote Theater
- CRESTBooth: TBD
CREST is an international not-for-profit accreditation and certification body that represents and supports the technical information security market. CREST provides internationally recognised accreditations for organisations and professional level certifications for individuals providing penetration testing, cyber incident response, threat intelligence, and Security Operations Centre (SOC) services.
- Critical StartBooth: TBD
Critical Start simplifies breach prevention by delivering the most effective managed detection and incident response services. Powered by our Zero Trust Analytics Platform, the industry’s only Trusted Behavior Registry, and MOBILESOC, our 24x7x365 expert security analysts and Cyber Research Unit monitors, investigates, and remediates alerts swiftly and effectively.
- ExabeamBooth: TBD
Exabeam is a global cybersecurity leader that adds intelligence to every IT and security stack. The leader in Next-gen SIEM and XDR, Exabeam is reinventing the way security teams use analytics and automation to solve Threat Detection, Investigation, and Response (TDIR), from common security threats to the most critical that are difficult to identify. Exabeam offers a comprehensive cloud-delivered solution that leverages machine learning and automation using a prescriptive, outcomes-based approach to TDIR. We design and build products to help security teams detect external threats, compromised users and malicious adversaries, minimize false positives and best protect their organizations.
- Mandiant, now part of Google CloudBooth: TBD
- Recorded FutureBooth: TBD
Recorded Future arms security teams with threat intelligence powered by machine learning to lower risk. Our technology automatically collects and analyzes information from an unrivaled breadth of sources. We provide invaluable context that’s delivered in real time and packaged for human analysis or instant integration with your existing security technology.
- TechTargetBooth: n/a
TechTarget (NASDAQ: TTGT) is the online intersection of serious technology buyers, targeted technical content and technology providers worldwide. Our media, powered by TechTarget’s Activity Intelligence platform, redefines how technology buyers are viewed and engaged based on their active projects, specific technical priorities and business needs. With more than 100 technology specific websites, we provide technology marketers innovative media that delivers unmatched reach via custom advertising, branding and lead generation solutions all built on our extensive network of online and social media. TechTarget is based in Boston and has locations in Atlanta, Beijing, Cincinnati, London, Paris, San Francisco, Singapore, and Sydney.
- ThreatLockerBooth: TBD
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control, and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities. To learn more about ThreatLocker visit: www.threatlocker.com
- Mike MillerAuthor, "Break In Cyber," vCISO
Mike Miller is a Chief Information Security Officer for Appalachia Technologies. For over 25 years, Mike has specialized in both offensive and defensive cybersecurity, and GRC (Governance, Risk, and Compliance). He has served as an effective liaison between technology and stakeholders, for organizations of all sizes. Mike continues to follow his passion by helping organizations understand business risk and strategically aligning a company’s security posture to protect it.
- Panel Discussion
- Reanna SchultzTeam Leader of Information Security, Garmin
Reanna Schultz is from Kansas City, MO, and attended the University of Central Missouri (UCM). She graduated in 2018 with her Bachelor of Science in Cybersecurity: Secure Software Development and in 2020 for Master of Science in Cybersecurity: Information Assurance. While being in the industry, Reanna has been exposed to numerous SANS hosted classes. Reanna volunteers as a National Cyber League coach and provides her industry expertise by doing guest speaker talks for numerous colleges and high schools across the Midwest to STEM students. Reanna currently works as a Team Lead at Garmin and directly reports out of their SOC.
- Panel Discussion
- Panel Discussion
- Shawn GeibChief Information Security Officer, Honeywell

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Join your regional cybersecurity community for learning and professional growth. Sign up today!
