CruiseCon 2025

The Flagship of Cybersecurity

 

8-13 February 2025
DEPARTING PORT CANAVERAL, FLORIDA

# Keynote Session

The State of the Cybersecurity (Sea)scape

After being the Director of NSA and Commander of US Cyber Command for more than 4 years, and now advising executives on cybersecurity issues, Admiral Rogers has a very unique insight into the worldwide cybersecurity landscape and the threats government and commercial organizations face from the most advanced cyber threats in the world. In this presentation, Admiral Rogers will provide an overview of what cybersecurity leaders are facing from the threats allowing leaders to take knowing action to secure their organizations.

Why Attend Event

CruiseCon was created to give all cybersecurity professionals the education and experiences typically reserved for Fortune 200 security security executives. We intentionally created an agenda that has timely subjects in both personal and professional development in an environment tailored to learning and networking. Not only will attendees come away with world class information on critical topics, they will learn to further their careers and develop professional connections for life. Even better, this is at an all-inclusive cost that is on par with, or less, than other cybersecurity events.

Networking

including the “non-conference” days, CruiseCon 2025 provides incredible networking opportunities well beyond what other conferences can offer



World-Class Speakers

For our first conference, we wanted to proverbially hit it out of the park, and ensure the quality of the content, with a curated team of world class speakers, who are industry experts on topics that are timely to security executives.

One fee covers all expenses

CruiseCon 2025 cost includes all cruise fees for 1 or 2 guests in a cabin and one conference registration fee*



#Thought leadership

Join Top Cybersecurity Leaders at CruiseCon 2025

agenda

1st Day

February 8, 2025

Registration and hospitality room

01:00 PM - 04:00 PM Room 206

Group seating for dinner

5:30 PM Room 204

2nd Day

February 9, 2025

The State of the Cybersecurity (Sea)scape

After being the Director of NSA and Commander of US Cyber Command for more than 4 years, and now advising executives on cybersecurity issues, Admireal Rogers has a very unique insight into the worldwide cybersecurity landscape and the threats government and commercial organizations face from the most advanced cyber threats in the world. In this presentation, Admiral Rogers will provide an overview of what cybersecurity leaders are facing from the threats allowing leaders to take knowing action to secure their organizations.

9:10 - 9:55 AM Room 206

Be Prepared! Navigating the Global Landscape: Regulations on Cyber Incident Response and Data Handling

This conference presentation will explore the web of international regulations governing cyber incident response and data handling. In an era marked by increasing cyber threats, understanding and complying with diverse regulatory frameworks is paramount for organizations operating on a global scale. This presentation will provide an overview of the key common aspects of these regulations, and will shed light on how one can gain insights into evolving landscape of cybersecurity compliance. Attendees will gain insights into best practices, challenges, and the harmonization efforts underway to create a cohesive and effective framework for cyber incident response and data management in an interconnected world.

9:55 AM- 10:40 AM Room 204

Information Sharing, AI and Privacy

Explore the intersection of technology and privacy and dive deep into the balance between innovation and individual rights, understanding how AI can be harnessed for safe and secure information sharing without compromising privacy. A discussion about digital ethics, data protection and privacy.

11:00 AM- 11:45 AM Room 202

LUNCH

11:45 AM - 1:00 PM Room 206

A Cybersecurity Program to Thwart Nation-State APTs

In the ever-evolving cyber landscape, nation-state actors pose a growing threat with their sophisticated Advanced Persistent Threats (APTs). These relentless attacks demand a robust cybersecurity program specifically designed to counter their cunning tactics. This talk delves into the critical components of such a program, outlining strategies for PRoactive Threat Intelligence, Multi-Layered Defense, User Vigilance Training, Continuous Monitoring and Incident Response, and Collaboration and Information Sharing.

1:15 PM - 2:00 PM Room 204

You Can Stop Stupid: Dealing with the "User Problem"

Explore the intersection of technology and privacy and dive deep into the balance between innovation and individual rights, understanding how AI can be harnessed for safe and secure information sharing without compromising privacy. A discussion about digital ethics, data protection and privacy.

2:15 PM - 3:00 PM Room 206

The Regulatory Landscape for CISOs

Given the proliferation of regulations that are impacting cybersecurity programs, some of which are creating personal civil and criminal liability to cybersecurity leaders, it is critical that executives understand what they are responsible for and what is coming dowm the line with regards to cybersecurity regulations. This presentation will provide an overview of current and pending regulations that will impact cybersecurity programs around the world.

3:15 PM - 4:15 PM Room 206

Reception

4:30 PM - 6:00 PM

3rd Day

February 10, 2025

Leisure Time in Cozumel

View Shore Excursions and Other Adventures HERE

ALL DAY Room 204

4th Day

February 11, 2025

Networking, Breakfast available through cruise

8:30 AM Room 206

Welcome

9:00 AM - 9:10 AM Room 206

Building a Diverse Culture Beyond Lip Service

There is a great deal of talk within cybersecurity programs of the need to increase diversity. While some organizations create diverse organizations that thrive, others create some check the box metrics that leaves all personnel feeling slighted and creates programs that are ineffective that also foster resentment. This presentation will cover the foundations of creating a diverse organization that truly creates measurable impact to cybersecurity program effectiveness

9:10 am - 9:55 AM Room 206

I Believe, I Belong, I Matter - Avoiding CISO Burnout 

A recent Gartner Peer Community survey revealed that 62% of IT and security leaders have experienced burnout, prompting many CISOs to leave their jobs or careers due to unique stressors. In this talk Malcolm shares his journey and learnings from more than three decades of managing high-performing people, leading successful teams, and finding fulfillment in an ideal state. Malcolm will explore his 'I Believe, I Belong, I Matter℠' framework, which is based on his own life lessons, and he'll share how to inspire a sense of purpose, passion, and persistence to avoid burnout.

9:55 am - 10:40 AM Room 206

Mastering Personal Branding: A CISO’s Guide to Influence and Leadership

In an era where personal branding can significantly impact professional opportunities and perceptions, Chief Information Security Officers (CISOs) must navigate how to effectively establish and grow their personal brands. This talk, presented by a CISO renowned for their extensive industry contributions through podcasts, articles, and online courses, explores strategic approaches to personal branding tailored for cybersecurity leaders. It will dive into creating a compelling personal narrative that resonates with both industry peers and the broader business community. The session will offer practical advice on integrating personal branding with professional responsibilities to enhance visibility, influence, and leadership within the cybersecurity industry. Attendees will leave with actionable insights on using personal branding as a tool for career advancement and thought leadership in the evolving landscape of cyber security.

11:00 AM - 11:45 AM Room 206

Lunch

11:45 AM - 1:00 PM Room 206

Roundtable

Channeling personal and team emotions to make more empathetic and intelligent decisions

1:15 PM - 2:00 PM Room 206

Generative AI Security

The use of generative AI is exploding and will grow even more exponentially as the technology improves and evolves. It also creates unintended issues for cybersecurity programs. From data breaches created by well meaning employees uploading data to GenAI systems to incoming deep fakes and other attacks taking advantage of tools to enhance attacks, there is a great deal to secure against. This presentation will highlight the threats from GenAI and provide actionable guidance to mitigate those threats.

2:15 PM -3:00 PM Room 206

Cyber Warfare 2025: Generative AI and Coming Battle of AI

Generative Artificial Intelligence is rapidly advancing, especially with the advent of OpenAI’s Large Language Model GPT-3.5. However, Human Centered Artificial Intelligence ethics, governance, risk, compliance, and regulatory policies are running behind. While organizations race to adopt Generative AI (GenAI), many are doing so without a clear understanding of the risks, rewards, and tradeoffs in adopting this technology. On the other end of the spectrum are the threat actors, which rarely concern themselves with ethical use of technology. Thus, the battlefield is set for the battle of the AIs. In the middle of this battlefield are big tech firms investing billions of dollars in GenAI and organizations seeking agile adoption of GenAI. On the battlefield ends are the cybersecurity defenders leveraging GenAI to prevent cyberattacks, and the threat actors utilizing GenAI to conduct cyber-attacks. Professionals in all sectors and levels, and cybersecurity advisors need to champion a risk based approach in adopting GenAI, while gaining superior advantage with GenAI powered threat defense, and increasing awareness around the adversary use of GenAI to automate sophisticated attacks. Prepare for battle!

3:00 PM -3:45 PM Room 206

Beyond AI:  Effective tools and techniques for security leaders

Artificial intelligence provides the potential for great opportunities to enhance cybersecurity programs. Unfortunately, there is more hype than reality around the benefits of AI tools to cybersecurity programs. This presentation will cover what AI is and practical methods and tools for taking advantage of AI to truly strengthen cybersecurity programs beyond the hype.

4:00 PM -4:45 PM Room 206

5th Day

February 12, 2025

Leisure Time in the Bahamas

View Shore Excursions and Other Adventures HERE

ALL DAY Room 206

6th Day

February 13, 2025

Departure

ALL DAY Room 206

Conference Speakers

Admiral Michael S. Rogers
Dr. Diane M. Janosek
Adriana Antunes Winkler
Bob Flores
Ira WInkler
Kate Kuehn
Larry Whiteside Jr.
Malcolm Harkins
Jerich Beason
Micki Boland
Jimmy Sanders
Sounil Yu

Official Sponsors

Don't miss this unique opportunity to engage with Cybersecurity Practitioners and Executives at this one-of-a-kind Conference.

Get Direction To Port Canaveral

Don’t miss your chance to join the Flagship of Cybersecurity

We look forward to seeing you at CruiseCon 2025.