Agenda

Date and TimeTitle
Feb 27, 2025
10:30am - 5:00pm (Eastern)
Exhibitor Hall open

Your opportunity to visit our solution vendor and association partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.

Feb 27, 2025
11:00am - 11:45am (Eastern)
[Opening Keynote] Demystifying AI Security & Defending the Future:

The fireside chat will explore AI security concepts, AI adoption trends, strategies for securing AI systems, and future organizational steps. Key topics include “Shadow AI,” governance frameworks, securing AI, and upskilling the workforce for AI. The presenters will also discuss the confusion surrounding AI and security, highlighting the three main areas: securing AI, AI for security, and defending against AI-armed attackers. They will address the issue of AI being adopted by employees before company-wide policies are in place. Finally, presenters will share their predictions for the future of AI in the realm of security.

Feb 27, 2025
12:00pm - 12:53pm (Eastern)
[Panel] Achieving Continuous Compliance: How to Make IT Work for Your Organization

In today’s rapidly evolving regulatory landscape, maintaining continuous compliance is no longer a choice, but a necessity. This panel discussion brings together leading experts to explore how organizations can leverage IT to streamline compliance efforts, reduce risk, and achieve sustainable growth.

Discussion Points:

  • The Evolving Compliance Landscape: Navigating the complexities of GDPR, CCPA, HIPAA, and other industry-specific regulations.
  • Automation and Orchestration: Utilizing IT tools and technologies to automate compliance tasks, monitor systems, and ensure adherence to policies.
  • Building a Culture of Compliance: Integrating compliance into organizational DNA through training, communication, and accountability.
  • The Role of IT in Risk Management: Leveraging IT infrastructure and security protocols to identify, assess, and mitigate compliance risks.
  • Best Practices for Continuous Compliance: Practical strategies and real-world examples of successful IT-driven compliance programs.

Join us for an engaging discussion on how to transform IT from a compliance burden to a strategic enabler.

Feb 27, 2025
12:00pm - 12:41pm (Eastern)
Cyber Playbook: How to Train Your Business to Secure Code

Attendees will learn how to integrate security into the development process while encouraging a security-driven mindset within the business. The session will explore strategies for training business teams to adopt security best practices and aligning security goals with business objectives.

The focus will be on STRIDE, a threat modeling methodology, and Threat Dragon, an OWASP tool that helps developers identify vulnerabilities and security risks early. These tools offer a cost-effective way to promote secure thinking across the business. Attendees will leave with practical knowledge on how to advocate for secure coding practices, collaborate effectively with developers, and meet project deadlines while ensuring robust security.

Feb 27, 2025
12:00pm - 12:48pm (Eastern)
Cyber Behavioral Profiling: Assessing Cyber Adversary Deception Tactics in FinServ Attacks

Financial services remain prime targets for sophisticated cyber adversaries who leverage deception tactics to evade detection, manipulate trust, and exploit cognitive vulnerabilities. This session explores the intersection of cyber threat intelligence and behavioral profiling to dissect adversaries’ modus operandi in FinServ attacks. Attendees will gain insights into how psychological manipulation and adversarial adaptation shape modern cyber threats—equipping security teams with proactive strategies to detect, disrupt, and mitigate deceptive cyber campaigns.

Feb 27, 2025
1:00pm - 1:43pm (Eastern)
Prevent Emerging Threats in Financial Services with Proactive Data Security

2024 plagued financial services firms with some major breaches. Insider threats, third party risks, and typical threat actors all had hands in high-profile stories like the incidents at LoanDepot, SRP Federal Credit Union, and Navy Federal Credit Union.

In this session, you’ll get a quick overview of this emerging threat landscape and how data security solutions such as data loss prevention, data security posture management, and data detection and response can address the primary risks to your data (insider, third party, threat actors). You’ll come away from this session with the knowledge of how to use these solutions to achieve proactive data security that fits in a zero trust architecture and enables compliance for regulations like PCI DSS 4.0, ISO-27001, GDR, and more.

Feb 27, 2025
1:00pm - 1:35pm (Eastern)
Securing Financial Services through Attack Surface Management

Join Censys as we discuss securing your FinTech and explore what’s really happening on the internet. See how it’s impacting security professionals, particularly Financial Services organizations, and see tangible examples of exposures that are impacting the data that we protect, and what you can do about it.

Feb 27, 2025
1:00pm - 1:27pm (Eastern)
AI and Security Awareness: Building a Future-Ready Culture

In the era of rapid technological change, the intersection of artificial intelligence (AI) and cybersecurity presents both tremendous opportunities and complex challenges. This presentation will explore how AI is transforming security awareness programs and shaping security culture within organizations. Attendees will learn how to leverage AI to build a more resilient and proactive security culture that empowers individuals to become active participants in the fight against cyber threats. We’ll discuss the importance of human behavior in security, practical tools for implementing AI-driven training, and how to create a dynamic culture where employees continuously adapt to emerging threats.

Feb 27, 2025
2:00pm - 2:41pm (Eastern)
Email Security Is Not Enough: Preparing for Deepfakes and AI-Powered Cyber Threats

Learn more about how AI is supercharging spear phishing campaigns. Automated OSINT collection, deepfake video and audio, and low-cost datasets with employee mobile phone numbers and social media profiles are taking social engineering threats to new heights. In this session, we’ll walk through some numbers on the risk of highly personalized phishing, compare traditional open-source intelligence to AI-powered spears, and highlight some recent attacks indicative of the next-generation of social engineering.

Feb 27, 2025
2:00pm - 2:54pm (Eastern)
The Current Threat Landscape in FinServ

Join us as we dive into several of the top concerns in Financial Services. From Deep web cards to BECs, Ransomware, and more! Bring your questions for the panel.

Feb 27, 2025
2:00pm - 2:45pm (Eastern)
Cybersecurity Reset: Navigating the FFIEC Cybersecurity Assessment Tool Sunset

As the FFIEC Cybersecurity Assessment Tool (CAT) approaches its retirement in 2025, financial institutions are looking for guidance to fill the void it leaves with a practical and modern approach. This presents an opportunity for the use of a more robust and flexible framework. In this session, we will explore the implications of this change and why the NIST Cybersecurity Framework (CSF) Version 2.0 is an ideal replacement. Attendees will gain insights into the history and limitations of the FFIEC CAT, the background and core components of the NIST CSF, and how its risk-based, adaptable approach can enhance cybersecurity resilience. The session will include practical strategies for conducting a gap analysis, developing a tailored implementation plan, and integrating NIST CSF into existing programs.

Feb 27, 2025
2:00pm - 2:52pm (Eastern)
Threat Intelligence Concerns for FinServ: Clever Adversary Strategies and Tactics

Most financial organizations understand their strengths, weaknesses, critical assets, and gaps in their defenses. The problem is, so do their adversaries. Adversaries use sophisticated intelligence strategies to attack large and small organizations. These strategies include using insiders, cyberattacks, physical breaches, and social engineering tactics.  

In this session, you will hear about real-life examples of adversarial plots that both entertain and surprise you. This presentation is thought-provoking and will create an awareness of what to look for and how you can defend against these clever plots. I will include a case study of how our client used threat intelligence to anticipate and prevent attacks to their network, foiling a nation-state attack seven times, so far! Sometimes the truth is stranger than fiction.

Feb 27, 2025
3:00pm - 3:48pm (Eastern)
Protecting the Bottom Line: Data Security Essentials for Financial Services

In the financial services sector, protecting sensitive data is critical to maintaining customer trust and regulatory compliance. Yet, financial and insurance industry experiences more data breaches than most other industries. According to 2024 Verizon DBIR report, financial services organizations were plagued by system intrusion attacks resulting from stolen credentials and human errors such as mis-delivery and misconfigurations.

Join us to hear our experts discuss the unique challenges of protecting information in the financial services industry and how Proofpoint Data Security helps organizations to:

  • Prevent sensitive data exfiltration such as customer information
  • Strengthen data posture to safeguard valuable data such as financial records
  • Comply with strict regulations, such as PCI DSS
  • Build insider threat programs

Bring your questions!

Feb 27, 2025
3:00pm - 3:36pm (Eastern)
Responsible AI: Balancing Innovation and Ethics in Cybersecurity

This presentation will draw on real-world examples and case studies to illustrate the challenges and opportunities in this rapidly evolving field. We will also discuss emerging trends such as federated learning and homomorphic encryption, which are reshaping the landscape of AI in cybersecurity.

  1. The role of AI in enhancing cybersecurity measures
  2. Ethical considerations in AI-driven cybersecurity solutions
  3. Implementing privacy-preserving AI techniques in threat detection
  4. Addressing bias and fairness in AI-powered security systems
  5. Regulatory compliance and AI governance in cybersecurity
Feb 27, 2025
3:00pm - 3:50pm (Eastern)
Navigating Third-Party Risk and Vendor Resilience
Feb 27, 2025
4:00pm - 5:07pm (Eastern)
Cyber Intel Briefing: FinServ
Feb 27, 2025
4:00pm - 4:50pm (Eastern)
Reading the Tea Leaves: What to Expect from Your 2025 Cyber Insurance Renewal

The claims environment remains fraught with cyber threats, particularly ransomware. At the same time, privacy concerns continue to escalate, with a heightened focus on data protection, biometric security, and non-breach privacy claims. Regulatory scrutiny from the FTC and State Privacy Regulators further emphasizes the need for robust cybersecurity measures.

To effectively mitigate risks, organizations must prioritize controls such as EDR, DLP, privileged account management, and technology product risk management. A proactive approach to third-party risk management and supply chain resilience is also essential. Culture and awareness training play a pivotal role in fostering a security-conscious workforce.

Maximizing cyber insurance efforts requires collaboration across departments. CISOs should engage with risk managers and legal teams to ensure alignment in coverage discussions and budget allocation. Cyber underwriting exercises can provide valuable insights for business impact assessments and audit committee reviews, fostering a shared understanding of risk and mitigation strategies.

Feb 27, 2025
4:00pm - 4:58pm (Eastern)
Preventing, Detecting, Responding, and Recovering from a Ransomware Attack