Top 10 Reasons to Attend SecureWorld
Conference Agenda
Filter by registration level:
  • session level iconOpen Sessions
  • session level iconConference Pass
  • session level iconSecureWorld Plus
  • session level iconVIP / Exclusive
  • Thursday, December 8, 2022
    8:30 am
    Exhibitor Hall open
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    8:30 am - 3:00 pm
    Location / Room: Exhibitor Floor

    Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Booths have staff ready to answer your questions. Look for participating Dash For Prizes sponsors to be entered to win prizes.

    9:00 am
    [Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
    • session level icon
    speaker photo
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service
    Registration Level:
    • session level iconOpen Sessions
    9:00 am - 9:45 am
    9:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    9:45 am - 10:00 am
    Location / Room: Exhibitor Floor

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    10:00 am
    Five Things to Understand About Privacy Law Right Now
    • session level icon
    speaker photo
    Co-Founder & Managing Partner, XPAN Law Partners
    speaker photo
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    This past year we have seen significant changes to privacy laws, states like California, Utah, Virginia, Colorado, and Connecticut have passed sweeping, and sometimes disparate, data privacy laws. In addition, privacy professionals are excited to see movement at the Federal level when the U.S. House of Representatives Subcommittee on Consumer Protection and Commerce passed by voice vote H.R. 8152, the American Data Privacy and Protection Act (“ADPPA”). And yet, privacy law is as misunderstood as the concept of privacy itself. Moreover, businesses face substantial challenges with legal compliance and individuals do not fully understand their rights.

    This session will dispel myths and answer pressing questions about the concept of privacy itself. We will explore the changing domestic legal data privacy obligations and explain the similarities and differences businesses need to know. We will also provide a top 5 of things businesses need to understand about data privacy, what it is and how it applies to data they collect.

    10:00 am
    Modern Threat Detection, Investigation, and Response with Google Cloud's SecOps Suite
    • session level icon
    speaker photo
    Engineer, Google Cloud Security
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    To stay secure in today’s growing threat landscape, organizations must uncover and remediate cyber threats at unprecedented speed and scale. This demonstration will showcase how Google Cloud’s Chronicle, Siemplify, and VirusTotal products are coming together to provide a holistic approach to modern threat detection, investigation, and response. Join us and discover how to:

    • Uncover and analyze new and evolving threats at petabyte scale.
    • Decrease alert fatigue and caseload by as much as 80% working threat-centric cases.
    • Automate up to 98% of Tier 1 tasks with custom dynamic playbooks.
    • Reduce mean time to detection (MTTD) and mean time to response (MTTR) with actionable threat intel and context-driven investigations.
    • Hunt for new and advanced threats 90% faster than traditional SOC tools.
    10:00 am
    5 Steps to Zero Trust
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:00 am - 10:45 am

    Protecting the edge of your network isn’t enough in a world where anyone can access data from anywhere. The principles of Zero Trust turn the traditional perimeter-centric model on its head and focus on securing what matters most: the data.

    See how a data-centric approach to security can help you defend against ransomware, APTs, and insider threats.

    We’ll break down how to get to Zero Trust, covering how to:

    • Identify sensitive data with scalable classification
    • Create an audit trail around sensitive data
    • Architect microperimeters by limiting who has access to data
    • Monitor for potential threats
    • Use automation for remediation and response

    Learn about what Zero Trust means and concrete steps you can take to implement it in practice.

    10:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    10:45 am - 11:00 am

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    11:00 am
    Resiliency to Resistance
    • session level icon
    speaker photo
    Program Manager, Security Learning & Awareness, Meta
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    11:00 am
    Online Consumer Privacy Is Too Complicated for Consumers
    • session level icon
    speaker photo
    Business Information Security Officer (BISO), T-Mobile USA
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am
    Are you using basic tools to protect yourself, your company, and your family? The consumer has no idea what personal information they are sharing or how they’re tracked online. Let’s talk about how our industry can address this challenge to protect the consumer from themselves.
    Presentation Level: GENERAL (InfoSec best practices, trends, solutions, etc.)
    11:00 am
    Ransomware Incident Command and Lessons Learned for Managers
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:00 am - 11:45 am

    This presentation presents a practical approach to incident command for managers at all levels, irrelevant of cyber expertise. Managers of all types are asked to take charge in critical situations and can benefit from leveraging proven crisis management processes during ransomware response.

    11:45 am
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    11:45 am - 12:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    12:00 pm
    [Lunch Keynote] FBI Cybersecurity Briefing
    • session level icon
    With special film screening of "Made in Beijing: The Plan for Global Market Domination"
    Registration Level:
    • session level iconOpen Sessions
    12:00 pm - 12:45 pm

    The FBI’s Office of Private Sector, Counterintelligence Division and Training Division present this 30-minute film entitled “ Made in Beijing: The Plan for Global Market Domination.”  In the world of global adversaries, the People’s Republic of China stands at the forefront with its sustained and brazen campaign of industrial espionage, posing the single greatest threat to our freedom, national security, and economic vitality.  This film sounds the alarm, helping private sector partners recognize the urgent need to protect their crown jewels against industrial espionage.

    12:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    12:45 pm - 1:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    1:00 pm
    [Panel] Prioritizing the Current Threatscape
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm

    Ransomware, business email compromise, cloud misconfigurations, social engineering, insider threats, third-party coding… the list goes on and on. The threats are everywhere. Some are new, but the old ones work just as well. How do you decide which threats are of the most concern to your organization? Do you report all of these to the Board? How do you provide the resources necessary to minimize the risks and still enable the business? Join our experts as they tackle how to identify and prioritize the current threats.

    1:00 pm
    How to Build an Effective Security Awareness Program
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:00 pm - 1:45 pm
    1:45 pm
    Networking Break
    • session level icon
    Registration Level:
    • session level iconOpen Sessions
    1:45 pm - 2:00 pm

    Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

    2:00 pm
    Ukraine vs. Russia: The Cyber War
    • session level icon
    speaker photo
    CNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC
    Registration Level:
    • session level iconOpen Sessions
    2:00 pm - 2:45 pm
Exhibitors
  • 1Password
    Booth:

    1Password is a privacy-focused password manager that keeps you safe online. 1Password is the world’s most-loved password manager. By combining industry-leading security and award-winning design, the company provides private, secure, and user-friendly password management to businesses and consumers globally. More than 80,000 business customers, including IBM, Slack, PagerDuty, and GitLab, trust 1Password as their enterprise password manager.

  • AuditBoard, Inc
    Booth:

    AuditBoard is the leading cloud-based platform transforming how enterprises manage risk. Its integrated suite of easy-to-use audit, risk, and compliance solutions streamlines internal audit, SOX compliance, controls management, risk management, and security compliance. AuditBoard’s clients range from prominent pre-IPO to Fortune 50 companies

    looking to modernize, simplify, and elevate their functions. AuditBoard is the top-rated audit management and GRC software on G2, and was recently ranked for the second year in a row as one of the 100 fastest-growing technology companies in North America by Deloitte.

  • Google Cloud
    Booth:
  • Mimecast
    Booth:

    Mimecast (NASDAQ: MIME) was born in 2003 with a focus on delivering relentless protection. Each day, we take on cyber disruption for our tens of thousands of customers around the globe; always putting them first, and never giving up on tackling their biggest security challenges together. We are the company that built an intentional and scalable design ideology that solves the number one cyberattack vector—email. We continuously invest to thoughtfully integrate brand protection, security awareness training, web security, compliance and other essential capabilities. Mimecast is here to help protect large and small organizations from malicious activity, human error and technology failure; and to lead the movement toward building a more resilient world.

Return to Agenda
Keynote Speakers
Speakers
  • speaker photo
    Stephen Dougherty
    Financial Fraud Investigator, Global Investigative Operations Center, U.S. Secret Service

    Stephen Dougherty has over a decade of investigative experience. His career as a Financial Fraud Investigator in support of the federal government has played a pivotal role in criminal investigations, surrounding cyber-enabled financial crime, money laundering, human trafficking, identity theft, healthcare fraud, embezzlement, tax/government program fraud, dark web crimes, among others. Stephen’s main area of expertise is combatting money laundering in all its forms. Aside from this, Stephen has been proactive in identifying new and future trends in the world of financial crime. Such trends include the cyber security nexus of financial crimes and its ever-growing relationship in major financial crimes such as Business Email Compromise and the rise of the dark web and the use of virtual currency as a vehicle for facilitation of financial crimes. Stephen has been a leader and a mentor to other investigators teaching them how to uncover fraud internally and externally. Stephen is currently an investigator contracted to the U.S. Secret Service’s Global Investigative Operations Center (GIOC) in Washington D.C.

  • speaker photo
    Rebecca Rakoski
    Co-Founder & Managing Partner, XPAN Law Partners

    Rebecca L. Rakoski, Esq., is the managing partner at XPAN Law Partners. Rebecca counsels and defends public and private corporations, and their boards, during data breaches and responds to state/federal regulatory compliance and enforcement actions. She manages the intersection of state, federal, and international regulations that affect the transfer, storage, and collection of data to aggressively mitigate her client's litigation risks. As an experienced litigator, she has handled hundreds of matters in state and federal courts. Rebecca advises her clients on a proactive, multi-jurisdictional approach to identify and address data privacy and cybersecurity compliance gaps and potential liabilities. She works with clients to create and tailor a security and privacy governance program that fits their specific needs in order to limit their regulatory exposure.

    As a thought leader in the area of data privacy and cybersecurity, Rebecca serves on the New Jersey State Bar Association's Cyber Task Force. Rebecca is Vice-Chair Elect for the New Jersey State Bar Association's Bankruptcy Law Section, and also served on the Complex Business Litigation Committee that drafted and revised the Court Rules involving electronic discovery in complex litigation matters. She has been appointed in several litigation matters by the New Jersey Superior Court as a Discovery Special Master.

    Rebecca is on the Board of Governors for Temple University Health Systems, and is an adjunct professor at Drexel University’s Thomas R. Kline School of Law and Rowan University.

  • speaker photo
    Shawn E. Tuma
    Co-Chair of the Data Privacy & Cybersecurity Practice, Spencer Fane LLP

    Shawn Tuma is an internationally recognized cybersecurity, computer fraud and data privacy law attorney, areas in which he has practiced for two decades. He is Co-Chair of Spencer Fane’s Data Privacy & Cybersecurity Practice where he regularly serves as cybersecurity and privacy counsel advising a wide variety of businesses ranging from small and mid-sized companies to Fortune 100 enterprises. Shawn has been named a Cybersecurity Law Trailblazer by the National Law Journal, SuperLawyers Top 100 Lawyers in DFW, and Best Lawyers in Dallas. He serves as the Practitioner Editor for Bloomberg Law’s Texas Privacy & Data Security Law, among many other activities.

  • speaker photo
    Severin Simko
    Engineer, Google Cloud Security

    Severin worked at Siemplify for nearly 3 years, 2.5 years of which were spent at TIP where he was team led for a team that was responsible for all integrations that Siemplify had. Nowadays he is focusing his work on Sales Engineering at Google Cloud Security and has been doing so for nearly half a year. Prior to that, Severin was working for a company in the Czech Republic where he designed, implemented and maintained SOCs mostly for customers from central Europe - banks and insurance companies.

  • speaker photo
    Dominick Frazier
    Program Manager, Security Learning & Awareness, Meta

    Dominick Frazier is a security professional with over 13 years of security experience with his current role being in Information Technology/Cyber-Security. In his current role he serves as the Security Awareness & Communication Manager responsible for the conversation around security between technical and non-technical teams, which extends to both employees and clients. Given his tenure in security, he has robust knowledge of the information technology and physical security sector including applicable regulations and frameworks.

  • speaker photo
    Kevin Murphy
    Business Information Security Officer (BISO), T-Mobile USA

    Kevin has more than 25 years of experience in threat intelligence and information security. He was the VP of cybersecurity operations and governance at IOActive.com, a retired NSA intelligence officer, the former director of Windows security architecture at Microsoft, and shipped Windows 10 (not by myself). He holds the CISM, CISSP, CGEIT security certifications.

  • speaker photo
    Panel Discussion
  • speaker photo
    Col. Cedric Leighton
    CNN Military Analyst; USAF (Ret.), Chairman, Cedric Leighton Associates, LLC

    Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.

    Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.

Conference Microsite!
Registration is quick and easy. Once you get started, use a browser on your phone or tablet to:

• Create a personalized agenda
• View maps of the venue and Exhibit Hall
• Use secure messaging to network with attendees
• View speaker slides after the conference
• Play CyberHunt, the app game, and compete for prizes
Learn and connect virtually

Join your InfoSec peers for high-quality training and collaboration. Sign up today!