AGENDA

Days


Tracks

Tuesday, February 11, 2025
10:00-10:45am
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Cybersecurity 2025: The State of Cyber Threats
ECE-01
AVP, IT & Security 365 Data Centers Chief of Emerging Tech Impactifi CSO Florida Crystals
In this opening discussion, industry experts will provide a comprehensive overview of the current cybersecurity landscape. Attendees will gain insights into emerging threats, attack vectors, and the latest trends in cybercrime. The session will discuss the impact of these threats on organizations of all sizes and explore the challenges faced by security professionals in mitigating risks.
REGISTER ME
  Enterprise Cybersecurity
11:00-11:45am
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Leveraging Threat Intelligence for Proactive Defense
ECE-02
Partner Fortium Partners CEO Red Sentry Head of Product Strategy, Cybersecurity and Fraud Prevention Digital Element
Threat intelligence plays a crucial role in preventing and responding to cyberattacks. This session will delve into the importance of collecting, analyzing, and sharing threat intelligence data. Attendees will learn how to leverage threat intelligence to identify potential threats, prioritize risks, and develop effective defense strategies.
REGISTER ME
  Enterprise Cybersecurity
12:00-12:30pm
Tuesday - 2/11/25
  Enterprise Cybersecurity
1:30-1:55pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Secure AI: The Promise of AI for SMBs: Security, Privacy, and Ethics
ECE-04
Managing Director Cyber Guard Pro LLC
The rapid growth of artificial intelligence (AI) is reshaping industries, creating opportunities for businesses of all sizes to innovate and improve. For small and medium-sized businesses (SMBs), AI offers tools that can enhance efficiency, reduce costs, and improve customer experiences. The advent of generative AI has further amplified these opportunities by enabling businesses to create personalized content, enhance customer interactions, and streamline operations. However, the adoption of AI, especially generative AI, also brings challenges, particularly in the areas of security, privacy, and ethics. This session aims to provide SMB leaders with actionable insights to navigate these challenges, enabling them to deploy AI successfully and responsibly.
REGISTER ME
  Enterprise Cybersecurity
2:00-2:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
WARNING: This Talk Exposes the Darkest Realities of Cybercrime, Audience Discretion Advised
ECE-05
Founder, President, Threat Researcher AP2T Labs Co-founder, Chief Hacking Officer, Threat Specialist AP2T Labs
Cyber threats are evolving beyond basic phishing into sophisticated, multi-stage attacks that exploit dark web leaks, social media footprints, and everyday online behaviors. This talk sheds light on emerging threats through real-world stories of individuals and organizations that have been targeted—some losing their identities, finances, and even jeopardizing their businesses. But the true cost of these threats goes far beyond financial loss. We will expose the devastating human toll—how cybercriminals exploit technology to facilitate human trafficking, ritual sacrifice, and the psychological manipulation that drives victims to suicide. From grey market companies to stalkerware and beyond, we’ll reveal how modern attacks unfold and why traditional defenses are no longer enough. By sharing these harrowing realities, we aim to raise awareness, challenge assumptions, and empower individuals and organizations to better protect themselves in an increasingly hostile digital landscape.
REGISTER ME
  Enterprise Cybersecurity
3:00-3:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
API Security: Protecting Web APIs
ECE-06
Partner Fortium Partners CEO Red Sentry Head of Cloud Services Radware
APIs have become an integral part of modern applications, but they also introduce new security vulnerabilities. This session will focus on the importance of API security and discuss common vulnerabilities, such as injection attacks, unauthorized access, and data breaches. Attendees will learn about best practices for securing APIs, including authentication, authorization, and rate limiting.
REGISTER ME
  Enterprise Cybersecurity
4:00-4:45pm
Tuesday - 2/11/25
Enterprise Cybersecurity (Grand A)
Best Practices for Securing Your Remote and Mobile Workforce
ECE-07
Senior Director of IT and Systems Social Mobile CEO eSilo Editor TMC CEO Forthright Technologies President, Technology Services James Moore and Co.
The increasing adoption of remote and mobile work has created new challenges for security teams. This session will explore the unique security risks associated with remote and mobile workforces. Attendees will learn about best practices for securing devices, networks, and data, as well as implementing effective access controls and data protection measures.
REGISTER ME
  Enterprise Cybersecurity
Wednesday, February 12, 2025
9:00-9:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
Identity Management: The First Line of Defense
ECE-08
Partner Fortium Partners Managing Director Cyber Guard Pro LLC CEO and Next-Generation MFA Evangelist Token President Titan Rock CEO White Swan Security
Identity management is a fundamental component of a robust security strategy. This session will discuss the importance of effective identity management practices and explore common challenges such as credential theft, privilege escalation, and insider threats. Attendees will learn about best practices for identity governance, authentication, and authorization.
REGISTER ME
  Enterprise Cybersecurity
10:00-10:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
Digital Disaster Recovery: From Chaos to Control
ECE-09
Founder & CEO PJC Services
Threats in cyberspace have skyrocketed in recent years. Brute force attacks from automated hacking attempts, keyloggers, ransomware, viruses, malware, email phishing attempts and social engineering attacks are problems that today’s companies must fight back against. With so much corporate and personal information moving online and into the “cloud” there is a very real threat that our data can be stolen, exploited and leveraged against us. Best case, you recover. Worst case, you go out of business. The fact is that many businesses still do not have a comprehensive cybersecurity plan, and those responsible for business continuity and data security are stressed out, not sure how to start, what threats to look for, or how it will impact their business. Not only that, the risk of non-compliance for certain industries is a critical component to having a recovery plan. This session will provide business owners, data professionals, and entrepreneurs a proven 7-step formula for develop a cybersecurity incident response plan without getting stressed out or overwhelmed. They will know what information they will need, how to value assets and assess threats; how to react and recover from a cyberattack; and they will have a blueprint for creating their own cybersecurity plan.
REGISTER ME
  Enterprise Cybersecurity
11:00-11:45am
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
How to Create a Resilient Incident Response and Recovery Plan
ECE-10
Senior Manager of Cybersecurity CITY Furniture Founder & CEO PJC Services CEO Vijilan Security VP Cybersecurity Consulting PDI Technologies Tech Advisory Board Member Accure.AI
It's not a question of if, but when, a cyber attack will impact your business. A well-crafted incident response and recovery plan is essential for minimizing the impact of any cyberattacks. This session will discuss the key components of an effective incident response plan, including incident detection, containment, eradication, recovery, and lessons learned. Attendees will learn about testing incident response plans and ensuring that organizations are prepared to respond to a variety of cyber threats.
REGISTER ME
  Enterprise Cybersecurity
12:00-12:45pm
Wednesday - 2/12/25
Enterprise Cybersecurity (Grand A)
The Human Element: Building a Security Culture to Combat Phishing and Social Engineering Threats
ECE-11
Vice President of Information Security C3 Complete President On Technology Partners CEO Marma Security Tech Advisory Board Member Accure.AI
Phishing and social engineering attacks continue to be a significant threat to organizations, and they are only becoming more complex and harder to identify. This session will explore the human element of security and discuss the importance of building a strong security culture. Attendees will learn about strategies for raising awareness, training employees, and fostering a security-conscious mindset, with the goal of understanding how to effecetivly mitigate social engineering and phishing risks.
REGISTER ME
  Enterprise Cybersecurity
Thursday, February 13, 2025
12:00-12:45pm
Thursday - 2/13/25
Enterprise Cybersecurity (Grand A)
Defending Tomorrow: The Convergence of Cybersecurity and Artificial Intelligence
ECE-12
Executive Director Woodside Capital Partners Chief Security Officer PDI Technologies CTO Itaca Technologies VP of Engineering IKIN Tech Advisory Board Member Accure.AI
Artificial intelligence has the potential to revolutionize cybersecurity. This session will explore the intersection of cybersecurity and AI, discussing the benefits and challenges of using AI for threat detection, prevention, and response. Attendees will learn about AI-powered security tools and techniques, as well as the ethical implications of using AI in cybersecurity.
REGISTER ME
  Enterprise Cybersecurity
1:00-1:45pm
Thursday - 2/13/25
Enterprise Cybersecurity (Grand A)
Quantum Cybersecurity: Preparing Businesses for the Next Evolution
ECE-13
Founder, President, Threat Researcher AP2T Labs Founder & CEO ODE, L3C
As quantum computing advances, industries face unprecedented challenges to digital security. This presentation explores the role of quantum-safe technologies and standards in addressing these challenges, with a focus on the finance sector. Dr. Keeper L. Sharkey, a leader in quantum technologies and cybersecurity, will highlight key insights from the IEEE SA 1947 Quantum Cybersecurity Framework and the InfraGard Quantum Technologies & Cybersecurity (QT&SC) Cross-Sector Council. Drawing on findings from the Quantum Economic Development Consortium (QED-C) publication on Quantum Key Distribution (QKD) in finance, this talk will delve into practical use cases and actionable strategies for adopting quantum-safe measures. Attendees will gain an understanding of emerging threats, industry trends, and how to future-proof their organizations in the quantum era. The session will be presented by Dr. Keeper L. Sharkey, a renowned quantum chemist, entrepreneur, and thought leader in advanced quantum technologies. With an introduction from Reese Bess Tuttle, Co-founder of AP2T Labs. Both Dr. Sharkey and Reese contribute to the advancement of quantum cybersecurity standards, with Dr. Keeper L Sharkey serving as Chair and Reese Bess Tuttle as Secretary for IEEE SA P1947: Standards for Quantum Cybersecurity Framework.
REGISTER ME
  Enterprise Cybersecurity

PLATINUM Sponsors

GOLD SPONSORS

Silver Sponsors

SPONSORS

ASSOCIATION PARTNERS

#TECHSUPERSHOW MEDIA SPONSORS