Date and Time | Title | |
---|---|---|
Feb 27, 2025 10:30am - 5:00pm (Eastern) | Exhibitor Hall open Your opportunity to visit our solution vendor and association partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer. | ![]() |
Feb 27, 2025 11:00am - 11:45am (Eastern) | [Opening Keynote] Demystifying AI Security & Defending the Future: The fireside chat will explore AI security concepts, AI adoption trends, strategies for securing AI systems, and future organizational steps. Key topics include “Shadow AI,” governance frameworks, securing AI, and upskilling the workforce for AI. The presenters will also discuss the confusion surrounding AI and security, highlighting the three main areas: securing AI, AI for security, and defending against AI-armed attackers. They will address the issue of AI being adopted by employees before company-wide policies are in place. Finally, presenters will share their predictions for the future of AI in the realm of security. | ![]() |
Feb 27, 2025 12:00pm - 12:53pm (Eastern) | [Panel] Achieving Continuous Compliance: How to Make IT Work for Your Organization In today’s rapidly evolving regulatory landscape, maintaining continuous compliance is no longer a choice, but a necessity. This panel discussion brings together leading experts to explore how organizations can leverage IT to streamline compliance efforts, reduce risk, and achieve sustainable growth. Discussion Points:
Join us for an engaging discussion on how to transform IT from a compliance burden to a strategic enabler. | ![]() |
Feb 27, 2025 12:00pm - 12:41pm (Eastern) | Cyber Playbook: How to Train Your Business to Secure Code Attendees will learn how to integrate security into the development process while encouraging a security-driven mindset within the business. The session will explore strategies for training business teams to adopt security best practices and aligning security goals with business objectives. The focus will be on STRIDE, a threat modeling methodology, and Threat Dragon, an OWASP tool that helps developers identify vulnerabilities and security risks early. These tools offer a cost-effective way to promote secure thinking across the business. Attendees will leave with practical knowledge on how to advocate for secure coding practices, collaborate effectively with developers, and meet project deadlines while ensuring robust security. | ![]() |
Feb 27, 2025 12:00pm - 12:48pm (Eastern) | Cyber Behavioral Profiling: Assessing Cyber Adversary Deception Tactics in FinServ Attacks Financial services remain prime targets for sophisticated cyber adversaries who leverage deception tactics to evade detection, manipulate trust, and exploit cognitive vulnerabilities. This session explores the intersection of cyber threat intelligence and behavioral profiling to dissect adversaries’ modus operandi in FinServ attacks. Attendees will gain insights into how psychological manipulation and adversarial adaptation shape modern cyber threats—equipping security teams with proactive strategies to detect, disrupt, and mitigate deceptive cyber campaigns. | ![]() |
Feb 27, 2025 1:00pm - 1:43pm (Eastern) | Prevent Emerging Threats in Financial Services with Proactive Data Security 2024 plagued financial services firms with some major breaches. Insider threats, third party risks, and typical threat actors all had hands in high-profile stories like the incidents at LoanDepot, SRP Federal Credit Union, and Navy Federal Credit Union. In this session, you’ll get a quick overview of this emerging threat landscape and how data security solutions such as data loss prevention, data security posture management, and data detection and response can address the primary risks to your data (insider, third party, threat actors). You’ll come away from this session with the knowledge of how to use these solutions to achieve proactive data security that fits in a zero trust architecture and enables compliance for regulations like PCI DSS 4.0, ISO-27001, GDR, and more. | ![]() |
Feb 27, 2025 1:00pm - 1:35pm (Eastern) | Securing Financial Services through Attack Surface Management Join Censys as we discuss securing your FinTech and explore what’s really happening on the internet. See how it’s impacting security professionals, particularly Financial Services organizations, and see tangible examples of exposures that are impacting the data that we protect, and what you can do about it. | ![]() |
Feb 27, 2025 1:00pm - 1:27pm (Eastern) | AI and Security Awareness: Building a Future-Ready Culture In the era of rapid technological change, the intersection of artificial intelligence (AI) and cybersecurity presents both tremendous opportunities and complex challenges. This presentation will explore how AI is transforming security awareness programs and shaping security culture within organizations. Attendees will learn how to leverage AI to build a more resilient and proactive security culture that empowers individuals to become active participants in the fight against cyber threats. We’ll discuss the importance of human behavior in security, practical tools for implementing AI-driven training, and how to create a dynamic culture where employees continuously adapt to emerging threats. | ![]() |
Feb 27, 2025 2:00pm - 2:41pm (Eastern) | Email Security Is Not Enough: Preparing for Deepfakes and AI-Powered Cyber Threats Learn more about how AI is supercharging spear phishing campaigns. Automated OSINT collection, deepfake video and audio, and low-cost datasets with employee mobile phone numbers and social media profiles are taking social engineering threats to new heights. In this session, we’ll walk through some numbers on the risk of highly personalized phishing, compare traditional open-source intelligence to AI-powered spears, and highlight some recent attacks indicative of the next-generation of social engineering. | ![]() |
Feb 27, 2025 2:00pm - 2:54pm (Eastern) | The Current Threat Landscape in FinServ Join us as we dive into several of the top concerns in Financial Services. From Deep web cards to BECs, Ransomware, and more! Bring your questions for the panel. | ![]() |
Feb 27, 2025 2:00pm - 2:45pm (Eastern) | Cybersecurity Reset: Navigating the FFIEC Cybersecurity Assessment Tool Sunset As the FFIEC Cybersecurity Assessment Tool (CAT) approaches its retirement in 2025, financial institutions are looking for guidance to fill the void it leaves with a practical and modern approach. This presents an opportunity for the use of a more robust and flexible framework. In this session, we will explore the implications of this change and why the NIST Cybersecurity Framework (CSF) Version 2.0 is an ideal replacement. Attendees will gain insights into the history and limitations of the FFIEC CAT, the background and core components of the NIST CSF, and how its risk-based, adaptable approach can enhance cybersecurity resilience. The session will include practical strategies for conducting a gap analysis, developing a tailored implementation plan, and integrating NIST CSF into existing programs. | ![]() |
Feb 27, 2025 2:00pm - 2:52pm (Eastern) | Threat Intelligence Concerns for FinServ: Clever Adversary Strategies and Tactics Most financial organizations understand their strengths, weaknesses, critical assets, and gaps in their defenses. The problem is, so do their adversaries. Adversaries use sophisticated intelligence strategies to attack large and small organizations. These strategies include using insiders, cyberattacks, physical breaches, and social engineering tactics. In this session, you will hear about real-life examples of adversarial plots that both entertain and surprise you. This presentation is thought-provoking and will create an awareness of what to look for and how you can defend against these clever plots. I will include a case study of how our client used threat intelligence to anticipate and prevent attacks to their network, foiling a nation-state attack seven times, so far! Sometimes the truth is stranger than fiction. | ![]() |
Feb 27, 2025 3:00pm - 3:48pm (Eastern) | Protecting the Bottom Line: Data Security Essentials for Financial Services In the financial services sector, protecting sensitive data is critical to maintaining customer trust and regulatory compliance. Yet, financial and insurance industry experiences more data breaches than most other industries. According to 2024 Verizon DBIR report, financial services organizations were plagued by system intrusion attacks resulting from stolen credentials and human errors such as mis-delivery and misconfigurations. Join us to hear our experts discuss the unique challenges of protecting information in the financial services industry and how Proofpoint Data Security helps organizations to:
Bring your questions! | ![]() |
Feb 27, 2025 3:00pm - 3:36pm (Eastern) | Responsible AI: Balancing Innovation and Ethics in Cybersecurity This presentation will draw on real-world examples and case studies to illustrate the challenges and opportunities in this rapidly evolving field. We will also discuss emerging trends such as federated learning and homomorphic encryption, which are reshaping the landscape of AI in cybersecurity.
| ![]() |
Feb 27, 2025 3:00pm - 3:50pm (Eastern) | Navigating Third-Party Risk and Vendor Resilience | ![]() |
Feb 27, 2025 4:00pm - 5:07pm (Eastern) | Cyber Intel Briefing: FinServ | ![]() |
Feb 27, 2025 4:00pm - 4:50pm (Eastern) | Reading the Tea Leaves: What to Expect from Your 2025 Cyber Insurance Renewal The claims environment remains fraught with cyber threats, particularly ransomware. At the same time, privacy concerns continue to escalate, with a heightened focus on data protection, biometric security, and non-breach privacy claims. Regulatory scrutiny from the FTC and State Privacy Regulators further emphasizes the need for robust cybersecurity measures. To effectively mitigate risks, organizations must prioritize controls such as EDR, DLP, privileged account management, and technology product risk management. A proactive approach to third-party risk management and supply chain resilience is also essential. Culture and awareness training play a pivotal role in fostering a security-conscious workforce. Maximizing cyber insurance efforts requires collaboration across departments. CISOs should engage with risk managers and legal teams to ensure alignment in coverage discussions and budget allocation. Cyber underwriting exercises can provide valuable insights for business impact assessments and audit committee reviews, fostering a shared understanding of risk and mitigation strategies. | ![]() |
Feb 27, 2025 4:00pm - 4:58pm (Eastern) | Preventing, Detecting, Responding, and Recovering from a Ransomware Attack | ![]() |