Tuesday, February 11, 2025
10:00-10:45am
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Cybersecurity 2025: The State of Cyber Threats ECE-01
AVP, IT & Security
365 Data Centers
Chief of Emerging Tech
Impactifi
CSO
Florida Crystals
In this opening discussion, industry experts will provide a comprehensive overview of the current cybersecurity landscape. Attendees will gain insights into emerging threats, attack vectors, and the latest trends in cybercrime. The session will discuss the impact of these threats on organizations of all sizes and explore the challenges faced by security professionals in mitigating risks. REGISTER ME
|
Enterprise Cybersecurity |
11:00-11:45am
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Leveraging Threat Intelligence for Proactive Defense ECE-02
Partner
Fortium Partners
CEO
Red Sentry
Head of Product Strategy, Cybersecurity and Fraud Prevention
Digital Element
Threat intelligence plays a crucial role in preventing and responding to cyberattacks. This session will delve into the importance of collecting, analyzing, and sharing threat intelligence data. Attendees will learn how to leverage threat intelligence to identify potential threats, prioritize risks, and develop effective defense strategies. REGISTER ME
|
Enterprise Cybersecurity |
12:00-12:30pm
Tuesday - 2/11/25
1:30-1:55pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Secure AI: The Promise of AI for SMBs: Security, Privacy, and Ethics ECE-04
Managing Director
Cyber Guard Pro LLC
The rapid growth of artificial intelligence (AI) is reshaping industries, creating opportunities for businesses of all sizes to innovate and improve. For small and medium-sized businesses (SMBs), AI offers tools that can enhance efficiency, reduce costs, and improve customer experiences. The advent of generative AI has further amplified these opportunities by enabling businesses to create personalized content, enhance customer interactions, and streamline operations. However, the adoption of AI, especially generative AI, also brings challenges, particularly in the areas of security, privacy, and ethics. This session aims to provide SMB leaders with actionable insights to navigate these challenges, enabling them to deploy AI successfully and responsibly. REGISTER ME
|
Enterprise Cybersecurity |
2:00-2:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
WARNING: This Talk Exposes the Darkest Realities of Cybercrime, Audience Discretion Advised ECE-05
Founder, President, Threat Researcher
AP2T Labs
Co-founder, Chief Hacking Officer, Threat Specialist
AP2T Labs
Cyber threats are evolving beyond basic phishing into sophisticated, multi-stage attacks that exploit dark web leaks, social media footprints, and everyday online behaviors. This talk sheds light on emerging threats through real-world stories of individuals and organizations that have been targeted—some losing their identities, finances, and even jeopardizing their businesses. But the true cost of these threats goes far beyond financial loss. We will expose the devastating human toll—how cybercriminals exploit technology to facilitate human trafficking, ritual sacrifice, and the psychological manipulation that drives victims to suicide. From grey market companies to stalkerware and beyond, we’ll reveal how modern attacks unfold and why traditional defenses are no longer enough. By sharing these harrowing realities, we aim to raise awareness, challenge assumptions, and empower individuals and organizations to better protect themselves in an increasingly hostile digital landscape. REGISTER ME
|
Enterprise Cybersecurity |
3:00-3:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
API Security: Protecting Web APIs ECE-06
Partner
Fortium Partners
CEO
Red Sentry
Head of Cloud Services
Radware
APIs have become an integral part of modern applications, but they also introduce new security vulnerabilities. This session will focus on the importance of API security and discuss common vulnerabilities, such as injection attacks, unauthorized access, and data breaches. Attendees will learn about best practices for securing APIs, including authentication, authorization, and rate limiting. REGISTER ME
|
Enterprise Cybersecurity |
4:00-4:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Best Practices for Securing Your Remote and Mobile Workforce ECE-07
Senior Director of IT and Systems
Social Mobile
CEO
eSilo
Editor
TMC
CEO
Forthright Technologies
President, Technology Services
James Moore and Co.
The increasing adoption of remote and mobile work has created new challenges for security teams. This session will explore the unique security risks associated with remote and mobile workforces. Attendees will learn about best practices for securing devices, networks, and data, as well as implementing effective access controls and data protection measures. REGISTER ME
|
Enterprise Cybersecurity |
Wednesday, February 12, 2025
9:00-9:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
Identity Management: The First Line of Defense ECE-08
Partner
Fortium Partners
Managing Director
Cyber Guard Pro LLC
CEO and Next-Generation MFA Evangelist
Token
President
Titan Rock
CEO
White Swan Security
Identity management is a fundamental component of a robust security strategy. This session will discuss the importance of effective identity management practices and explore common challenges such as credential theft, privilege escalation, and insider threats. Attendees will learn about best practices for identity governance, authentication, and authorization. REGISTER ME
|
Enterprise Cybersecurity |
10:00-10:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
Digital Disaster Recovery: From Chaos to Control ECE-09
Founder & CEO
PJC Services
Threats in cyberspace have skyrocketed in recent years. Brute force attacks from automated hacking attempts, keyloggers, ransomware, viruses, malware, email phishing attempts and social engineering attacks are problems that today’s companies must fight back against. With so much corporate and personal information moving online and into the “cloud” there is a very real threat that our data can be stolen, exploited and leveraged against us. Best case, you recover. Worst case, you go out of business. The fact is that many businesses still do not have a comprehensive cybersecurity plan, and those responsible for business continuity and data security are stressed out, not sure how to start, what threats to look for, or how it will impact their business. Not only that, the risk of non-compliance for certain industries is a critical component to having a recovery plan. This session will provide business owners, data professionals, and entrepreneurs a proven 7-step formula for develop a cybersecurity incident response plan without getting stressed out or overwhelmed. They will know what information they will need, how to value assets and assess threats; how to react and recover from a cyberattack; and they will have a blueprint for creating their own cybersecurity plan. REGISTER ME
|
Enterprise Cybersecurity |
11:00-11:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
How to Create a Resilient Incident Response and Recovery Plan ECE-10
Senior Manager of Cybersecurity
CITY Furniture
Founder & CEO
PJC Services
CEO
Vijilan Security
VP Cybersecurity Consulting
PDI Technologies
Tech Advisory Board Member
Accure.AI
It's not a question of if, but when, a cyber attack will impact your business. A well-crafted incident response and recovery plan is essential for minimizing the impact of any cyberattacks. This session will discuss the key components of an effective incident response plan, including incident detection, containment, eradication, recovery, and lessons learned. Attendees will learn about testing incident response plans and ensuring that organizations are prepared to respond to a variety of cyber threats. REGISTER ME
|
Enterprise Cybersecurity |
12:00-12:45pm
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
The Human Element: Building a Security Culture to Combat Phishing and Social Engineering Threats ECE-11
Vice President of Information Security
C3 Complete
President
On Technology Partners
CEO
Marma Security
Tech Advisory Board Member
Accure.AI
Phishing and social engineering attacks continue to be a significant threat to organizations, and they are only becoming more complex and harder to identify. This session will explore the human element of security and discuss the importance of building a strong security culture. Attendees will learn about strategies for raising awareness, training employees, and fostering a security-conscious mindset, with the goal of understanding how to effecetivly mitigate social engineering and phishing risks. REGISTER ME
|
Enterprise Cybersecurity |
Thursday, February 13, 2025
12:00-12:45pm
Thursday - 2/13/25
Enterprise Cybersecurity (Grand A)
Defending Tomorrow: The Convergence of Cybersecurity and Artificial Intelligence ECE-12
Executive Director
Woodside Capital Partners
Chief Security Officer
PDI Technologies
CTO
Itaca Technologies
VP of Engineering
IKIN
Tech Advisory Board Member
Accure.AI
Artificial intelligence has the potential to revolutionize cybersecurity. This session will explore the intersection of cybersecurity and AI, discussing the benefits and challenges of using AI for threat detection, prevention, and response. Attendees will learn about AI-powered security tools and techniques, as well as the ethical implications of using AI in cybersecurity. REGISTER ME
|
Enterprise Cybersecurity |
1:00-1:45pm
Thursday - 2/13/25
Enterprise Cybersecurity (Grand A)
Quantum Cybersecurity: Preparing Businesses for the Next Evolution ECE-13
Founder, President, Threat Researcher
AP2T Labs
Founder & CEO
ODE, L3C
As quantum computing advances, industries face unprecedented challenges to digital security. This presentation explores the role of quantum-safe technologies and standards in addressing these challenges, with a focus on the finance sector. Dr. Keeper L. Sharkey, a leader in quantum technologies and cybersecurity, will highlight key insights from the IEEE SA 1947 Quantum Cybersecurity Framework and the InfraGard Quantum Technologies & Cybersecurity (QT&SC) Cross-Sector Council. Drawing on findings from the Quantum Economic Development Consortium (QED-C) publication on Quantum Key Distribution (QKD) in finance, this talk will delve into practical use cases and actionable strategies for adopting quantum-safe measures. Attendees will gain an understanding of emerging threats, industry trends, and how to future-proof their organizations in the quantum era. The session will be presented by Dr. Keeper L. Sharkey, a renowned quantum chemist, entrepreneur, and thought leader in advanced quantum technologies. With an introduction from Reese Bess Tuttle, Co-founder of AP2T Labs. Both Dr. Sharkey and Reese contribute to the advancement of quantum cybersecurity standards, with Dr. Keeper L Sharkey serving as Chair and Reese Bess Tuttle as Secretary for IEEE SA P1947: Standards for Quantum Cybersecurity Framework. REGISTER ME
|
Enterprise Cybersecurity |