Agenda

Date and TimeTitle
Sep 25, 2025
10:30am - 5:00pm (Eastern)
Exhibitor Hall open

Your opportunity to visit our solution vendor partners, whose sponsorship makes SecureWorld possible! Peruse the many downloadable resources each booth has to offer.

Sep 25, 2025
11:00am - 11:36am (Eastern)
[Opening Keynote] Post-Quantum Cryptography on Google Cloud

At Google, we take post-quantum computing risks seriously, and we are taking proactive steps to secure customer’s data against the potential threats of future quantum computers. In this session, we will be discussing our PQC journey on Google Cloud.

The goals of this session are to:

  • Understand the proactive steps Google is taking to secure customer data against post-quantum computing threats

  • Gain insight into Google’s journey and implementation of Post-Quantum Cryptography (PQC) on Google Cloud

  • Learn best practices for organizations to prepare their infrastructure and PKI for the transition to PQC

Sep 25, 2025
12:00pm - 12:56pm (Eastern)
Zero Trust in Action: A Practical Roadmap for Security Transformation

Zero Trust is more than a buzzword—it’s a mindset shift that reshapes how organizations protect assets. In this session, digital transformation and cybersecurity expert Amy Yee presents a clear, actionable roadmap for adopting Zero Trust. You’ll explore foundational principles and organizational drivers, learn how to assess maturity and identify quick wins, and understand common pitfalls—like fragmented identity policies—before they derail your progress.

Amy dives into key ingredients: identity security, supply chain resilience, essential cross-team conversations, and navigating blockers/enablers. Packed with real-world examples and practical exercises, this talk will leave CISOs, IT leaders, and security teams equipped to design, implement, and sustain a Zero Trust strategy that scales with business needs.

Sep 25, 2025
12:00pm - 12:29pm (Eastern)
Automation with PowerShell and dbatools: Streamlining SQL Server Management

Managing SQL Server environments can be time-consuming, error-prone, and difficult to scale—especially when juggling backups, migrations, security audits, and performance checks. In this session, we’ll explore how to supercharge your workflow with PowerShell and the dbatools module to automate and simplify routine DBA tasks.

Through practical demos, you’ll see how to effortlessly migrate databases between servers, manage permissions, validate backups, and inventory your entire SQL estate with just a few lines of PowerShell. We’ll cover best practices for creating reusable scripts, integrating automation into CI/CD pipelines, and scheduling jobs for proactive maintenance.

Whether you’re managing a single instance or hundreds of servers, you’ll learn how dbatools can save time, improve consistency, and reduce human error—letting you focus on higher-value tasks like performance tuning and architecture.

Sep 25, 2025
12:00pm - 12:38pm (Eastern)
Cyber Behavioral Profiling: Assessing Cyber Adversary Deception Tactics in FinServ Attacks

Financial services remain prime targets for sophisticated cyber adversaries who leverage deception tactics to evade detection, manipulate trust, and exploit cognitive vulnerabilities. This session explores the intersection of cyber threat intelligence and behavioral profiling to dissect adversaries’ modus operandi in FinServ attacks. Attendees will gain insights into how psychological manipulation and adversarial adaptation shape modern cyber threats—equipping security teams with proactive strategies to detect, disrupt, and mitigate deceptive cyber campaigns.

Sep 25, 2025
1:00pm - 1:35pm (Eastern)
The Dissonance Test: What Can't Be Faked?
In 2024 alone, the U.S. Treasury Department linked over $6.8 million in earnings from fake freelance IT work to the North Korean regime, representing a growing national security and cybersecurity concern. These operatives pass identity checks, video interviews, and even technical screenings by mimicking genuine applicants, targeting almost every Fortune 500 company. But beneath the surface, they carry buried truths that create invisible strain.
 
This session introduces a novel behavioral screening tool, called the Dissonance Test, that aims to detect deception before damage is done. By triggering cognitive dissonance between a liar’s persona and their suppressed identity, this test provokes micro-reactions, like flinching, freezing, tone shifts, even defensiveness and bailing, that truth-tellers glide through. We’ll explore how this can be applied in hiring and vetting processes to expose nation-state operatives like North Korean operatives, scammers, and social engineers, long before they can do damage.
Sep 25, 2025
1:00pm - 1:38pm (Eastern)
Locking the Future: Why Data Security Is the Key to Trustworthy AI

As AI becomes a cornerstone of innovation across industries, the importance of robust data security has never been more critical. This presentation will explore the essential role of data security in enabling the widespread adoption of AI technologies. Attendees will gain insights into how safeguarding sensitive data builds trust, ensures compliance, and mitigates risks in AI systems. We’ll discuss real-world challenges that encompass data breaches, privacy concerns, and ethical considerations while highlighting strategies to secure data pipelines that promote trustworthy AI deployment.

Sep 25, 2025
1:00pm - 1:37pm (Eastern)
Security Awareness Reimagined: Marketing Tactics for Real Impact

Cybersecurity isn’t just a tech problem—it’s a people problem. Too many awareness programs are forgettable checkboxes.

This session shows you how to change that by applying proven marketing strategies to drive real behavior change. You’ll learn to:

  • Craft targeted, emotionally resonant messages that stick
  • Build a security brand employees trust and remember
  • Use data and segmentation to deliver the right message to the right person
Whether you lead Security Awareness & Training or partner with HR and communications teams, you’ll walk away ready to drive engagement, reduce risky behaviors, and embed security into your organization’s culture.
Sep 25, 2025
2:00pm - 2:49pm (Eastern)
[Panel] The Current Threat Landscape in FinServ

Join us as we dive into several of the top concerns in Financial Services. From deep web cards to BECs, ransomware, and more! Bring your questions for the panel.

Sep 25, 2025
2:00pm - 2:49pm (Eastern)
Enhancing Security, Easing Compliance: PCI DSS for Multi-Payment Channel Organizations

Navigating PCI DSS compliance can be daunting for multi-payment channel merchants and service providers handling diverse transaction environments. This presentation explores practical strategies to reduce compliance burden while bolstering security. Attendees will learn how simple process changes, such as tokenization and point-to-point encryption, can minimize sensitive data exposure. We’ll also examine the benefits of outsourcing specific PCI DSS responsibilities to trusted third-party providers, enabling organizations to focus on core operations without compromising security. Drawing on real-world examples, the session will highlight how these approaches streamline compliance efforts, reduce costs, and enhance protection across online, in-store, and mobile payment channels. Ideal for merchants and service providers, this talk offers actionable insights to achieve PCI DSS compliance efficiently.

Sep 25, 2025
2:00pm - 2:39pm (Eastern)
Assumption of Risk or the Risks of Assumption? Examining the Impact of Thoughtful Communication
Security is a growth strategy, but are we delivering that message effectively? Risk assumption is the mainstay of the security professional, but let’s look at assumption through a different lens. What beliefs do you presume about other initiatives, teams, leaders in your organization? How might these be stymying your effectiveness or decelerating growth and innovation?
 
This presentation explores what words and actions purport and examines how accurate (or inaccurate) our hasty conclusions about others can be. Participants will learn how abandoning assumptions in favor of objective alignment can multiply security program impact and efficacy, accelerating innovation and business growth.
Sep 25, 2025
3:00pm - 3:55pm (Eastern)
Cyber Intel Briefing: FinServ
In an increasingly volatile world, this session provides a crucial debrief on the most pressing global security issues and their direct impact on cybersecurity and business resilience. The talk will cover geopolitical flashpoints, including recent developments in China, Russia, Ukraine, and the European Union, examining how these international power shifts influence the digital landscape. It will also explore the dramatic changes in data privacy regulations in the age of AI, highlighting the new responsibilities for corporations.
 
Finally, the presentation will provide actionable insights for building resilience against a backdrop of sophisticated cyber threats, from financially motivated groups targeting the financial sector to state-sponsored attacks. Attendees will leave with a clear understanding of the evolving threat landscape and a strategic framework to protect their organizations in 2025 and beyond.
Sep 25, 2025
3:00pm - 3:53pm (Eastern)
You Are Not a CISO, You Are a 'CO IS'

The term Chief Information Security Officer, or CISO, is one that is often defined incorrectly. Many people assume that a CISO is part of the career step, or stop, toward becoming a world-class security engineer. It’s often said the way you become a CISO is to be a security engineer for 10 years and get promoted—but that is all wrong. It is a broken model and why many companies struggle with defining the role of the CISO. A CISO is, by all definitions, a Chief Officer (CO) with a focus and obsession for Information Security (IS). Thus, a true CISO is a CO with an emphasis on IS.

In this talk, Dr. Eric Cole breaks down how we got here, why the old CISO model is broken, what we can do, and what you can do to become a better CO IS for yourself and your organization. Whatever your title, you will come away invigorated to rethink your role in security leadership!

Sep 25, 2025
3:00pm - 3:48pm (Eastern)
Cyber on the Brink: Inside the Relentless Threat Surge Facing Financial Institutions

As someone working in the finance sector every day, I see firsthand how rapidly the threat landscape is evolving, from AI-generated deepfakes and impersonation scams to advanced persistent threats and the looming risks posed by quantum computing. This talk will explore the whole cyber frontier that financial institutions are now navigating, with a focus on the real-world challenges CISOs are facing as they enter 2026.

Sep 25, 2025
4:00pm - 4:30pm (Eastern)
[Closing Keynote] Zero Trust: Cutting Cyber Risks, Lowering Claims, and Unlocking Better Cyber Insurance!

Breaches, ransomware, and AI-driven attacks are exposing the flaws of outdated perimeter defenses. Discover how Zero Trust Architecture can transform your cybersecurity strategy while unlocking better insurance outcomes! Marsh & McLennan’s recent report reveals that nearly $500 billion in annual cyber losses could be prevented with Zero Trust and robust cyber hygiene.

This session will empower you to:

  • Minimize the impact of CVE’s and prevent breaches, while leveraging Zero Trust
  • Reduce cyber insurance claims and losses with proactive defense
  • Deductive analysis to secure more favorable cyber insurance policies

Attendees will learn how adopting zero trust network access enhances security posture and results in more favorable cyber insurance policies including:

  • Preventing one third of cyber incidents
  • Cutting breach costs by over 20%
  • Reducing insured loss by up to 31%