Our Mission: Connecting, informing, and developing leaders in cybersecurity

SecureWorld events and programming foster Growth, Access, and Excellence among cybersecurity professionals.

SecureWorld is… the stepping stone to grow in your abilities and career path

SecureWorld is… access to the knowledge and solutions you need, in the place you live

SecureWorld is… a unique experience with excellence in both speakers and content

For more than 22 years, SecureWorld has been tackling global cybersecurity issues and sharing critical knowledge and tools needed to protect against ever-evolving threats. Through our network of industry experts, thought leaders, practitioners, and solution providers, we collaborate to produce leading-edge, relevant content.

We host in-person conferences across North America, executive roundtable dinners, and virtual conferences focused on industry verticals and regions, and publish original news and analysis of the InfoSec world. We hope you'll consider becoming part of our community!

Here are 10 reasons attending a SecureWorld conference should be near the top of your list.

SWE_Top10_Reasons_Attend_320x100

Conference Themes
2024
Legacies Untold: Revealing Cybersecurity's Hidden Figures
left-line
right-line
Legacies Untold: Revealing Cybersecurity's Hidden Figures

Throughout history, many people have worked behind the scenes to help humanity reach its potential. Sometimes we hear about these folks; often, they are hidden or even forgotten in time. Information Security is no different. Our 2024 conference theme aims to recognize some of the men and women who helped pioneer the field of cybersecurity—through technological advances or simply by looking at the world differently, likely with a more discerning eye. We celebrate their contributions to InfoSec, elevating everyone in the cybersecurity profession—today's heroes. If you are fighting the good fight against the myriad of digital threats, you too are a cyber hero!

The hidden figures we are recognizing include:

  • Ada Lovelace – First computer programmer
  • Joe Engressia – The Father of Phone Phreaking
  • Claude Elwood Shannon – The Father of Information Theory
  • Dorothy Denning – The Uncelebrated Trailblazing Heroine of Cybersecurity
  • Annie Easley – Cosmic Calculus Crusader of NASA and Cybersecurity Superhero
  • Grace Hopper – Visionary Innovator in Computer Languages
  • Rebecca Bace – The ‘Den Mother’ of Computer Security
  • Hedy Lamarr – Hollywood Star and Secret Inventor
  • Elizebeth Friedman – The Codebreaker Who Saved the World
  • Joseph Weizenbaum – Hero of Cyber and AI Ethics
2023
CyberSonic: Security & Sound Remix

Our theme explores the intersection of sound and music with the world of cybersecurity.

Can sound frequencies be used in cyberattacks? Can a security incident be audibly detected? Do musicians make better coders? What kind of conductor does a security team need? We'll answer these questions and more, and jam to a cool soundtrack along the way! 

left-line
right-line
CyberSonic: Security & Sound Remix
2022
Security in the Wild: Threat Responses in the Animal Kingdom
left-line
right-line
Security in the Wild: Threat Responses in the Animal Kingdom

Biomimicry, or biomimetics, is the imitation of the models, systems, and elements of nature for the purpose of solving complex human problems.

There is only an estimated 12% overlap between biology and technology in terms of the mechanisms used today. Applying the threat responses in animals to the realm of cybersecurity holds great potential for learning and advancement!

2019
KNOWLEDGE IS POWER: The Remarkable Life of Codebreaker Elizebeth Smith Friedman

Elizebeth Smith Friedman was a true pioneer in the field of cryptography, yet without nearly the recognition she deserves. She used her natural talent for decryption to become one of the preeminent codebreakers in U.S. history. From 1916 through World War II, she solved complex ciphers for the highest levels of law enforcement and military intelligence. We will look at her fascinating life and remarkable contributions that have helped lay the foundation for information security today.

left-line
right-line
KNOWLEDGE IS POWER: The Remarkable Life of Codebreaker Elizebeth Smith Friedman
2018
FAST FORWARD ⏩ Predicting & Preparing for Our Cyber Future
left-line
right-line
FAST FORWARD ⏩ Predicting & Preparing for Our Cyber Future

Blink and you just might miss it.

The velocity of change and innovation hurtling towards us—not to mention threats—is phenomenal. And it’s only accelerating. We know that because we’re all experiencing it, but how do we prepare and best respond? Or rather, get out in front of it?

“Prediction is very difficult, especially if it’s about the future,” says the Danish proverb. But the process of predicting—challenging and uncertain as it is—is always worthwhile. And there’s no time like now for our InfoSec community to be doing exactly that. We can’t afford not to. 

Which is why we’ve made this the theme of our 2018 conference season: “FAST FORWARD ⏩ Predicting & Preparing for Our Cyber Future.” Join us at one of our 15 regional events as leading futurists, innovators, and defenders cast a vision for what’s ahead in cybersecurity in 2018, and the decades to come!

We’ll delve into these critical trends and discover the implications together:

⏩ Artificial Intelligence, Machine Learning & Robots
⏩ Connected Devices & the IoT Explosion
⏩ Identifiers & Authentication
⏩ Future Hacking
⏩ Blockchain & Crypto Currency
⏩ Shifting Career Landscape

“Futuring requires crafting a narrative that depicts the intersection of technology with humans. It’s not enough just to imagine a car; one must also envision the traffic jam—the implications of a technology being adopted at scale.”
— Thornton A. May, SecureWorld Keynote, Futurist/Author/Professor

2017
Surviving the Siege: Medieval Lessons in Modern Security

Warfare has advanced considerably since the Middle Ages, but in many ways the principles of fortification remain the same. The great castles of antiquity were ingeniously designed to protect their inhabitants from persistent enemy threats. Their carefully planned and creative defensive measures provide rich metaphors for today’s cyber guardians. What lessons can be applied to securing our sophisticated digital fortresses? SecureWorld attendees will enjoy exploring and learning from the historical anecdotes and tactics in this year’s conference theme, “Surviving the Siege: Medieval Lessons in Modern Security.”

left-line
right-line
Surviving the Siege: Medieval Lessons in Modern Security
2016
The Colorful Cryptography that Consumed Edgar Allan Poe
left-line
right-line
The Colorful Cryptography that Consumed Edgar Allan Poe

Sure, you know Poe as the maniacal author of poems like 'The Raven' and short stories like 'The Tell-Tale Heart.' But you might not know about his fascination with encrypted messaging, science, and the universe, or construction of his works like math problems.

Edgar Allan Poe practiced cryptography and steganography. He wrote an entire short story that essentially outlined the Big Bang Theory. Poe overcame staggering challenges to hone his craft. Yet he died mysteriously—and broke.

Join us at a SecureWorld event near you to learn more about Edgar Allan Poe and his remarkable life. Find out how his contributions are still making a difference in the cybersecurity industry, 167-years after his death. We look forward to sharing his story with you.

2015
The Secret Service

SecureWorld Expo’s 2015 theme explores the rich history and the 150th anniversary of the United States Secret Service. The agency, dating back to the American Civil War, guards not only our world leaders but also our national financial system. Join us as we explore the beginnings and the evolution of one of our most valuable assets.

left-line
right-line
The Secret Service
2014
Beauty, Brains, and Patent #2292387
left-line
right-line
Beauty, Brains, and Patent #2292387

Hedy Lamarr, 1940s Hollywood starlet, helped set the groundwork for some of the most revolutionary technology of our time. Hedy listened quietly while her first husband, a well-known Austrian arms dealer, entertained high-ranking Nazi officials as they discussed submarines, wire-guided torpedoes, and the frequencies used to guide them remotely. This would lay the groundwork for her later invention. The science presented in patent #2292387 serves as the basis for the technology we use today in cell phones, Bluetooth, wireless Internet, defense satellites, and other spread-spectrum devices.

2013
The Many Enigmas of Alan Turing

Alan Turing, one of the UK’s finest minds, is often referred to as the pioneer of modern computing.Turing’s life was full of incident, with his work at Bletchley Park during the Second World War essential to the Allies war effort and helping turn the tide against the Nazi regime that threatened to engulf Europe. While this work is well-documented, and growing in both awareness and appreciation all the time, there are many other facts about Turing you may not be aware of, but paint a picture of what an interesting, intelligent and lasting legacy he’s had on the world at large.

left-line
right-line
The Many Enigmas of Alan Turing
2012
Decrypting the Mayan Code
left-line
right-line
Decrypting the Mayan Code

Only in the last 40 years have scientists discovered the key to understanding the lost Mayan culture of the Yucatan—destroyed 400 years earlier as a consequence of the Spanish conquest of Mexico. Take an expedition with SecureWorld as we give you insight into the ancient Mayan society, with its complex alphabet, advanced numerical and calendar system, and the story behind how this lost culture was found again by a determined group of “decrypters.”

2011
Ciphers of the Civil War

With the attack on Fort Sumter on April 12, 1861, and the outbreak of the Civil War, the need for secure telegraphic communications became paramount. Cyptographers were presented with new challenges in the first war in which the telegraph played an important role. The telegraph greatly increased the number of messages that could be sent and the speed at which they could travel, but the wires were not secure. At any point between the sender and receiver an enemy agent could tap into the line and receive the message without detection. There was little that Civil War armies could do to stop the wire-tappers, so they sought to minimize the danger by encoding their transmissions.

left-line
right-line
Ciphers of the Civil War
Privacy Policy

What information do we collect?
We collect information from you when you register on our site, place an order, subscribe to our newsletter or respond to a survey. When ordering or registering on our site, as appropriate, you may be asked to enter your: name, email address, mailing address, phone number, or credit card information. You may, however, visit our site anonymously.

What do we use your information for?
Any of the information we collect from you may be used in one of the following ways:

  • To process transactions:
    Your information, whether public or private, will not be sold, exchanged, transferred, or given to any other company for any reason whatsoever, without your consent, other than for the express purpose of delivering the purchased product or service requested.

  • To send periodic emails:
    The email address you provide for order processing will only be used to send you information and updates pertaining to your order. If you decide to opt-in to our mailing list, you will receive emails that may include company news, event updates, related product or service information, etc.

    Note: If at any time you would like to unsubscribe from receiving future emails, we include detailed unsubscribe instructions at the bottom of each email.

How do we protect your information?
We implement a variety of security measures to maintain the safety of your personal information. We offer the use of a secure server. All supplied sensitive/credit information is transmitted via Secure Socket Layer (SSL) technology. Only SecureWorld employees have special access rights to this database, and are required to keep the information confidential. After a transaction, your private information (credit cards, social security numbers, financials, etc.) will not be stored on our servers.

Do we use cookies?
Yes. Cookies are small files that a site or its service provider transfers to your computer’s hard drive through your web browser (if you allow) that enable the site’s or service provider’s systems to recognize your browser and capture and remember certain information. We use cookies to help us remember and process the information you are interested in and understand and save your preferences for future visits. If you prefer, you can choose to have your computer warn you each time a cookie is being sent, or you can choose to turn off all cookies via your browser settings. Like most websites, if you turn your cookies off, some of our services may not function properly.

Do we disclose any information to outside parties?
We do not sell, trade, or otherwise transfer to outside parties your personally identifiable information. This does not include trusted third parties who assist us in operating our website, conducting our business, or servicing you, so long as those parties agree to keep this information confidential and comply with all opt-out requests per applicable regulations. We may also release your information when we believe release is appropriate to comply with the law, enforce our site policies, or protect ours or others rights, property, or safety.

Third-party links
Occasionally, at our discretion, we may include or offer third-party products or services on our website. These third-party sites have separate and independent privacy policies. We therefore have no responsibility or liability for the content and activities of these linked sites. Nonetheless, we seek to protect the integrity of our site and welcome any feedback about these sites.

California Consumer Privacy Act Compliance
Because we value your privacy, we have taken the necessary precautions to be in compliance with the California Consumer Privacy Act (CCPA). We therefore will not distribute your personal information to outside parties without your consent. As part of the CCPA, all users of our site may make any changes to their information at any time by contacting SecureWorld.

Children’s Online Privacy Protection Act Compliance
We are in compliance with the requirements of COPPA (Children’s Online Privacy Protection Act). We do not collect any information from anyone under 13 years of age. Our website, products, and services are all directed to people who are at least 13 years old or older.

Online Privacy Policy Only
This online privacy policy applies only to information collected through our website and not to information collected offline.

Your Consent
By using our site, you consent to our privacy policy.

Changes to our Privacy Policy
If we decide to change our privacy policy, we will post those changes on this page, send an email notifying you of any changes, and/or update the Privacy Policy modification date below.

Contacting Us
If you have any questions regarding this privacy policy, please contact us.

Revised August 4, 2020

Press Room

SecureWorld covers the news in InfoSec—and sometimes our events are the news.

Read what others are covering on SecureWorld and the thought leaders who are helping build their security communities.

For press releases about our conferences, click here.

For press inquiries, please contact Content Strategist Karly Tarsia at
503.303.7863 | media@secureworld.io

See what SecureWorld can do for you. Contact us today!
Contact us