Date and TimeTitle
Nov 3, 2022
8:30am - 3:00pm (Central)
Exhibitor Hall Open

Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Virtual booths feature demos, resources downloads, and staff ready to answer your questions. Look for participating Dash For Prizes and CyberHunt sponsors to be entered to win prizes.

Nov 3, 2022
9:00am - 9:55am (Central)
[Opening Keynote] BEC Attacks, Crypto, and the Investigative Powers of the Secret Service
Nov 3, 2022
9:45am - 10:00am (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Nov 3, 2022
10:00am - 10:55am (Central)
Addressing Modern-Day Data Breaches
Nov 3, 2022
10:00am - 10:41am (Central)
Modern Threat Detection, Investigation, and Response with Google Cloud's SecOps Suite

To stay secure in today’s growing threat landscape, organizations must uncover and remediate cyber threats at unprecedented speed and scale. This demonstration will showcase how Google Cloud’s Chronicle, Siemplify, and VirusTotal products are coming together to provide a holistic approach to modern threat detection, investigation, and response. Join us and discover how to:

  • Uncover and analyze new and evolving threats at petabyte scale.
  • Decrease alert fatigue and caseload by as much as 80% working threat-centric cases.
  • Automate up to 98% of Tier 1 tasks with custom dynamic playbooks.
  • Reduce mean time to detection (MTTD) and mean time to response (MTTR) with actionable threat intel and context-driven investigations.
  • Hunt for new and advanced threats 90% faster than traditional SOC tools.
Nov 3, 2022
10:00am - 10:43am (Central)
Internal Talent Pipelines: Get Out of Your Own Way
Nov 3, 2022
10:30am - 10:45am (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Nov 3, 2022
11:00am - 11:48am (Central)
1Password Masterclass: Security Tactics vs. Proven Security Theatre

Many password myths and security policies make things less secure for everyone and harder to stay safe online. Learn how to spot and avoid security theatre.

Nov 3, 2022
11:00am - 12:00pm (Central)
Common IAM Challenges Organizations Struggle with and How to Solve Them

Organizations developing their IAM programs are faced with a perplexing set of issues.   During this presentation, we’ll discuss why each of these IAM challenges exists and how we’ve helped organizations overcome them.

  1. Achieving Role-Based Access Control (RBAC): What RBAC really means and strategies for unlocking the efficiency and reduced risk that it offers.
  2. PAM Adoption: Why driving adoption of PAM tools and processes can be so challenging and how to overcome organizational pushback.
  3. IGA Adoption and ROI: Maximizing your IGA investments by integrating with your broader application ecosystem
  4. Integrating PAM & IGA: Why you should consider integrating your PAM and IGA tools, the challenges you might face, and strategies for doing it right.
Nov 3, 2022
11:00am - 11:58am (Central)
The Inadvertent Remote Insider Threat

Threat methods and controls utilized are very comprehensive and effective for those who are typically in the office, but what about the remote workforce of today? Their intent may not be malicious but rather inherent to poor practices.

This presentation is designed to help individuals identify how seemingly “innocent” activity can make them an insider threat, and to help organizations identify existing critical controls needed to develop an Insider Threat Program using a white hat hacking methodology. Through live demonstrations, we will show simple techniques used to bypass various controls.


  • Learn the methodologies utilized by individuals within the organization that would be defined as insider threat activity
  • How to identify system based behavioral indicators
  • Learn which existing or enhanced security layer can provide insider threat profile data
  • Learn how areas of the organization, i.e. Legal, Procurement, and HR, are key stakeholders in assisting to identify insider threat activity

Key Takeaways:

  • How to identify business processes which can contribute to remote work insider threats
  • Enhance current security program on what controls are bypassed by utilizing routine IT procedures
  • Enhance procedures required to identify insider threat exposures
  • Enhance awareness training to include additional methods of insider threat
  • Enhance existing physical and digital security layers to better identify specific insider threat activity
Nov 3, 2022
11:45am - 12:00pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Nov 3, 2022
12:00pm - 12:58pm (Central)
[Fireside Chat] Things I Wish I Had Known About Cybersecurity Before I Got into a Leadership Role
Nov 3, 2022
12:00pm - 12:42pm (Central)
Special film screening of "Made in Beijing: The Plan for Global Market Domination"

This film from the FBI helps the private sector recognize the urgent need to protect their intellectual property against sustained and ongoing industrial espionage by the People’s Republic of China (PRC).

Nov 3, 2022
12:45pm - 1:00pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect in the Networking Lounge.

Nov 3, 2022
1:00pm - 1:25pm (Central)
Zero Trust in a Modern IT World
Nov 3, 2022
1:00pm - 1:54pm (Central)
Incredible Email Hacks You'd Never Expect and How You Can Stop Them

If you think the only way your network and devices can be compromised via email is phishing, think again!

A majority of data breaches are caused by attacks on the human layer, but email hacking is much more than phishing and launching malware. From code execution and clickjacking to password theft and rogue forms, cybercriminals have more than enough email-based tricks that mean trouble for your InfoSec team.

In this webinar Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist and security expert with over 30-years of experience, explores many ways hackers use social engineering and phishing to trick your users into revealing sensitive data or enabling malicious code to run.

Roger will show you how hackers compromise your network. You’ll also see incredible demos including a (pre-filmed) hacking demo by Kevin Mitnick, the World’s Most Famous Hacker and KnowBe4’s Chief Hacking Officer.

Roger will teach you:

  • How remote password hash capture, silent malware launches and rogue rules work
  • Why rogue documents, establishing fake relationships and tricking you into compromising your ethics are so effective
  • The ins and outs of clickjacking
  • Actionable steps on how to defend against them all

Email is still a top attack vector cybercriminals use. Don’t leave your network vulnerable to these attacks.

Nov 3, 2022
1:00pm - 1:50pm (Central)
Transforming Information Security for Businesses of All Sizes

In order to combat cyber threats for organizations of all sizes and the supply chain, how information security is delivered and managed requires transformation. The burden of securing systems and networks has long been placed on the end organization, resulting in a distributed management requirement that does not scale. Requirements placed on the end organization exacerbate the burden, whereas “shift left,” setting requirements on the vendor, can alleviate it. Industry has a unique opportunity to aid a positive transformation to better scale security for solutions, with an aim towards improving the overall security posture and reducing the security professional deficit. Innovation to deploy security following scalable architectural patterns for security management is paramount.

Nov 3, 2022
1:45pm - 2:00pm (Central)
Networking Break

Visit the Exhibitor Hall for vendor displays or connect with attendees in the Networking Lounge.

Nov 3, 2022
2:00pm - 2:54pm (Central)
[Closing Keynote] Ukraine vs. Russia: The Cyber War, 8 Month Update

For a preview of Col. Cedric’s Leighton’s presentation, read the SecureWorld News article, “World’s First Hybrid War in Ukraine Holds Important Cyber Lessons.”